typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 28 Power outage

"I don't care if CTOS has cancer or something?" Charlotte didn't want to hear this nonsense at all. She only cared about one thing, "It is AIDS. Can you get rid of this virus?"

"It has covered the entire system! Do you understand?" The man in the suit also understood Charlotte's heart. It is impossible for the president of an Internet company to not understand the Internet. She just couldn't believe it subconsciously, "This virus program uses

It is far beyond the level of this world. It cannot be the creation of an ordinary civilian hacker. Make a decision. They are almost successful in invading it."

"Um...ahhh!" Charlotte knew that it was useless to shirk the responsibility and cover up the situation now, so she could only issue a destruction order, "Execute Order Zero and destroy all data!"

All the people in the hall immediately started to prepare for the operation, but they soon stopped because their computers were completely stuck in a black screen with only a big ellipsis.

Then everyone looked at the ellipsis for a long time. Suddenly, the ellipsis turned into a progress bar with a sentence written on it:

"Copying...0%"

"Execute the power-off procedure! Execute the power-off procedure immediately!" Charlotte was completely panicked. She leaned on the rostrum and issued the order hysterically, "Hurry up and notify the security department, notify the police, notify the Southern Company, and protect the CTOs of the three nodes.

Central security, search for all suspicious persons!"

"You!" She pointed at everyone in the security hall and gave an ultimatum with a look like a dead person. "Hurry up and find a way to deal with this... virus, otherwise there will be no way for all of us to survive."

Immediately, the hall that was so quiet that you could hear a pin drop suddenly became as noisy as a vegetable market. People tried desperately to make the computer respond by using all kinds of actions: they kept typing on the keyboard to open the source code page, restarting the computer, and even directly disconnecting the computer.

electricity.

Let’s not talk about whether it is useful or not. Charlotte, who had just left the security hall and was about to accept questions from shareholders and dignitaries in the conference room, received a piece of news that made matters worse:

"What! One of the nodes has been reset!"

Shocking news, absolutely shocking news. Charlotte, who was originally in an anxious mood, was about to faint from heartache when she received the news.

But she used her willpower to slow down and gave the men who reported the news the loudest roar in her life: "Protect the remaining two nodes immediately and tell everyone that if we can't protect us, we will all die!"

We only have 15 minutes."

She glanced at the life countdown in the hall:

Copying...6%



At the same time, in an ordinary house in the South District, there were processors filling the entire room, and a middle-aged man wearing a blue-gray denim vest, with long hair and beard, and his chin beard tied with a metal ring was concentrating.

He was typing on the keyboard in front of the screen, analyzing the unknown virus he had just intercepted.

At the same time that the virus began to scan the entire CTOS system, t-bone, one of the founders of the entire system, also received the information that the system had been invaded for the first time.

As T-bone, who has long distanced himself from Bloom Company, his life will not be in danger if the system is completely invaded...well, a little bit, but the impact is not big. He has long been a "living dead"

Already.

But because of the hard work and emotion he put into the system he built, he regarded the system as his own heir. At the same time, out of the curiosity of a senior hacker, he also invested in the operation of anti-virus programs.

To this end, he also called one of the other founders, Tobias, over. However, Tobias himself was getting older and was mentally traumatized by Bloom's persecution. His hacking skills were no longer what they used to be.

But he has a wealth of knowledge and can sometimes give some unexpected answers.

Computer viruses have several characteristics: reproductive, destructive, contagious, latent, and triggerable. But their essence is a set of instruction sets or program codes compiled by taking advantage of the inherent vulnerabilities of computer software and hardware. They are human-written.

.

As long as it is a creation programmed by humans, there will definitely be weaknesses. Even if no solution can be found to contain it in a short period of time, through brainstorming and constant attempts, no virus will ever be able to be prevented.

But as he analyzed the viruses he collected, and after constant firewall tests, he discovered to his horror that no matter what kind of detailed and complicated firewall algorithms or anti-virus software, there was no way to resist this unknown computer virus.

.

"It's like water or air, no, even water and air have an impenetrable surface." T-Bone said to himself in disbelief about his discovery.

"But the virus program can be integrated with the anti-virus program in a very short period of time, making it impossible to identify or target it. By the time he wants to do anything, he has been completely invaded by the virus."

"How can it be adapted to any anti-virus software? Does this program have intelligence in itself?"

"Then it might not be a virus designed by humans." Suddenly a voice rang in his ears.

It was Tobias who had been watching for a long time. Tobias was a bald old man wearing pajamas. Under normal circumstances, his eyes were panicked and evasive.

But at this moment, his eyes were like sharp eagles.

"Oops," T-Bone said in panic. The roller-skating office chair almost fell over backwards, and it took a long time to flip back.

"You almost scared me to death!" T-Bone glared at Tobias angrily, but Tobias did not respond to T-Bone's complaint, but looked attentively at this code that was constantly changing like an amoeba.

of viruses.

It took him a while before he came to his senses and asked t-bone seriously: "Do you know when this program was uploaded?"

"I don't know. I only know that this thing easily broke through the firewall that CTOs strictly guarded, and it was never discovered until it was discovered by the backdoor detection program I installed when it was about to scan the entire system."

T-Bone narrated the entire process of encountering the virus, and also described his failure with disappointment: “I immediately notified the network security hall after receiving the warning, but it was still too late. The virus had completely scanned the entire system and

The entire system is copied and transferred.”

"Where is the end point of its transmission?" Tobias immediately asked.

"You should ask, where is it not?" T-Bone turned the virus-research monitor in front of Tobias and switched the screen.

Then Tobias saw a very beautiful scene, a fish-like creature swimming in an ocean composed of tens of thousands of network data lines.

But the attentive Tobias understood the meaning of the t-bone. The constantly swimming fish creatures were actually huge data streams stolen by the virus.

But this fish is constantly swimming in the data ocean composed of various areas of CTOS, constantly absorbing every small node - the data in everyone's mobile phone, and then "excreting" it into the mobile phone, completing the exchange of a large amount of data

.

"Cunning virus." Tobias shook his head. He knew that he would not be able to find the final flow of the data in a short time.

T-Bone raised his phone and showed it to Tobias: "My phone is heating up slightly." He turned back to the memory display page, which showed 45%. "Now even my phone is constantly uploading and downloading data.

, don’t call yourself an ordinary person.”

"Have you thought of any solution?" Tobias asked his old friend. He knew that although T-Bone didn't like Bloom, he would never give up CTOS.

"Now I only have two ways to locate the virus publisher," T-bone announced his battle plan to his old friend. "First, I have been looking at the surveillance video around the CTO tower for the past hour. This is slow work.

But you can definitely find someone.

The second one is to keep an eye on the three major nodes, which are the tools of the maintenance department of those idiots in Bloom. If there is a problem there, if you find the person who destroyed the node, you will basically find the relevant people."

Regarding these two plans, t-bone seemed confident, but Tobias said to him: "Then you can find it quickly. Your computer just showed that the first node has been reset."

"What!"



At this time, Xie Yuan, who was wearing a built-in body armor, quietly came out of the second node-ctos center.

Standing in the distance, looking at the security forces and police cars that immediately surrounded the entire CTOS center, I thought:

"A fierce battle is expected to break out at the third node."

This chapter has been completed!
Previous Bookshelf directory Bookmark Next