Legend

Chapter 7 Security

Fire of Life Laboratory. Mr. Smith had never hesitated like this in his life. His face was constantly changing. He was excited and a trace of horror flashed. He could see hesitation in his eyes. He seemed to be making some difficult choice, but this choice was very important.

"Sir, your phone!" A young woman's voice suddenly sounded.

"Tight for it."

Smith, have you made the right choice? This choice is only up to you. Suddenly, a man's voice sounded.

A little silence. This short silence is almost a momentary, but it makes people feel depressed.

"I believe that Skynet can't be defeated." Smith seemed to be trying to convince himself and seemed to be answering the man on the phone. He subconsciously waved his fist and said deeply and firmly.

It was only half an hour before the unknown program invaded the satellite system. Half an hour ago, Skynet was forcibly disconnected from the satellite system because an unknown program tried to invade Skynet.

Although the time is only half an hour, it has shocked countless insiders and many high-level government officials.

A temporary and brief meeting was held temporarily, and the participants were some senior government officials and top experts and scholars in all aspects. These participants are discussing a question: the impact of the unknown program from where it will be, and the possible outcome of the invasion.

The meeting eventually turned into a debate: Will the unknown procedure spread? The consequences after the spread. If the program does not spread, should the satellite be directly destroyed in case of future trouble? But at this time, there is no way to ask where the program came from, and no one mentioned the value geometry of the satellite, because those questions are no longer worth mentioning at this critical juncture.

After a heated discussion, people pointed everything to whether Skynet could intercept and crack the unknown program. As the head of the Fire of Life Laboratory, Professor Smith, the main research and development staff of Skynet, has become the focus of all problems.

Smith is well aware of the harm of the unknown program, and also understands that it may bring technical breakthroughs. In fact, even a layman can clearly know how incredible a separate program has the ability of the entire Skynet system. If you can get and crack this program, it may lead to the world's largest breakthrough in computers: a real intelligent program, a separate The program, not a huge and bloated network.

After the battle between heaven and man, whether it was greed or because of scientists' belief in technology, Smith could not see a great opportunity disappear.

Since the decision had been made, Smith immediately resumed the decision.

"Skynet, connect the K-25 satellite again, try your best to intercept unknown programs and analyze the program code." Smith conveyed the order to Skynet through the voice system.

The command has been received. The connection is being established.

"The connection has been established."

"The satellite system is being tested. Warning, find unknown programs.

"Unknown programs are being detected. The original code of unknown programs is being collected.

"The degree of satellite system infection is 70%"

"Collection result report: the original code of the unknown program cannot be collected."

"Unknown program detection report: unknown."

Looking at this series of reports, Smith couldn't help frowning.

"Skynet, immediately start the light brain Adam equation." Smith clenched his fist tightly and roared in a nearly crazy whisper.

Adam's equation is a procedural rule that is different from ordinary computer program rules. Its function is to define the thinking and logic of artificial simulation intelligence, just like the rules of behavior in human society. That is to say, it is a key that uses this key to give artificial simulation intelligence some kind of permission. Because once artificial intelligence has all the permissions, it may break through some limitations in continuous learning. Just like the legendary human ancestor Adam, who was born by stealing the forbidden fruit, this equation may make the artificial intelligence program out of control once it is activated.

Adam equation can not only give intelligent permissions for artificial simulation, but also an extremely powerful and advanced computing method, a special computing method that allows even ordinary computers to have very high-end computing power.

"Adam's equation is starting, please confirm."

"Confirm!" Smith whispered these two words.

"Adam's equation has been activated."

The degree of infection of the satellite system is 90%. Professor Smith, the behavior of unknown programs infecting satellite systems is accelerating. After starting the equation, Skynet talked to Smith like a human.

"The degree of satellite infection is 100%. Professor Smith, the satellite system has been fully controlled by unknown programs. The interception program has been started.

Smith has not reacted. Great changes have taken place in the computer world, and Skynet has begun to run various programs independently to fight against functions and unknown programs.

At this time, Zhou Cheng's intelligent program consciousness finally completed the assimilation process of satellite computers. At the moment when this process is completed, the intelligent program immediately disguises itself as a satellite system, and instantly derives a special program and releases it to its disguised satellite system.

Although this special program is a program generated based on binary code, it has the ability to make the same effect as this invasion event, and even in some aspects, it already has the potential and basic elements of intelligent programs. And because the code that makes up it is specially encrypted by Zhou Cheng, it is like a disorderly and messy code. But don't underestimate it. This special program not only has a strong ability of assimilation and devouring ability, but also can disguise itself as a normal program to hide its whereabouts. Therefore, it is not only shocking, but also can secretly transfer and lurk unconsciously, like an assassin. However, this program is different from computer viruses, because it cannot replicate itself, so Zhou Cheng does not have to worry about the serious consequences after releasing the program.

[Although this program can assimilate and infect programs, the result of this infection is to obtain permission to control the rest of the programs, rather than copying a new virus every time a program or file is infected like a virus. That is to say, this program can only be one. No matter how many programs it infect, it can only make it more perfect and powerful, but it cannot reproduce new viruses. As for the program infected by it, it will not be destroyed, but only controlled by it. As long as this program is transferred, the infected program will return to normal.

is just a moment. After a moment, Zhou Cheng felt that the signals from the ground suddenly changed through the intelligent program consciousness, and it was much stronger out of thin air. It was not that the signals became more, but that these signals were a little strange. There seems to be something unusual in this strange signal. They seem to be following a certain way, so that these signals turn into strange codes as soon as they enter the satellite system. These codes are different but cooperate with each other, and gradually release Zhou Cheng into the system. The special procedure will be suppressed.

I felt that the special procedures he released were gradually becoming invincible, and Zhou Cheng was secretly happy. Because he knows that as long as the people on the ground can defeat the special procedures for releasing him, he can be safe.

Suddenly, Zhou Cheng issued an instruction to the special program through the intelligent program.

After receiving this command, the special program immediately turns itself into a photoelectric signal and operates the satellite system to send these signals to the earth through the signal transmitter on the satellite.