Chapter 453

Name:Supercarriers Author:空长青
Gustav's flagship was badly hit. Judging from the damage, Gustav's flagship could only be towed to the spaceport dock in the rear for repair along with the beehive.

However, he did not care about his ship. He thought that he had caught the spy's flaw. Gustav immediately organized the technical forces to use all forces to target the beehive, and began to reverse track the virus and electronic attacks.

But then things went far beyond Gustav's expectations

"Report to the commander! Just now, our fleet was attacked by hackers again. At the same time, a large-scale electronic virus paralysis attack broke out inside. Dozens of warships have successively found bomb viruses! " The adjutant hastily reports to Gustav.

"What?! Dozens of them? " Gustav was shocked.

One rear end almost paralyzed two warships. If dozens of warships had an accident at the same time, he would have been running naked.

"What's the loss?" He asked in a hurry.

When the loss of the following warships was reported, the adjutant's face was strange.

"Er On the whole, the loss is not big. After the beehive collision, we have immediately ordered everyone to pay attention to the enemy's electronic intrusion. At present, all attacks are blocked out of the core firewall of the smart brain. "

Gustav breathed a sigh of relief, but the adjutant went on, "although the core function modules of the brain have not been invaded by electronic technology, the other side has slyly bypassed our key defense areas and selected some peripheral functional modules to attack, so, er It caused some confusion... "

……

Beehive code on surprise, hit Gemini a surprise, but when Gemini is ready, both sides are completely hard power competition.

In electronic warfare, it can be roughly divided into red and blue fields. Red domain represents intrusion, including electronic virus, penetration, compilation, decompiling and so on. It is a familiar domain of hackers!

The blue domain is the opposite, firewall technology, anti-virus software technology, tracing and anti tracking, vulnerability research and so on. This is the domain of network security experts.

Code, as a newly born intelligent life, has incomparable talent in the field of hacker intrusion.

If the two sides of electronic warfare are compared to martial arts experts, there are three factors to measure their force value: "internal force", "moves", "equipment"!

It has strong internal force and exquisite moves. If you add the sword of relying on heaven to kill the dragon, it will be the first standard template in the world.

The calculation ability of both sides is equivalent to the "internal force" of martial arts experts. The stronger the calculation power is, the stronger the strength will naturally be. Even if it exceeds a certain degree, it will be able to reduce ten skills!

In this regard, as a large-scale Supercomputing Center on the moon, the code name of huge robot computing resources has gone far beyond the shipborne intelligent brain which is only used as a combat aid.

The attack and defense skills of both sides can be compared with various martial arts "moves". The moves are exquisite. Naturally, they can push a thousand pounds to find the defensive loopholes of the other side, and they can kill each other with one attack!

For the introduction of Gemini code, just upgraded the system code, she is just like a virtual bamboo who has just gained a hundred years of skill. Although she is powerful, she is a little white in her moves. This is one of the reasons why Nie Yun wants the code to steal teachers from the other party in electronic warfare and enhance the ability of hackers.

Wisdom brings learning ability, so that the code can be flexible, flexible moves, in contrast, Gemini brain can only step-by-step with the dead move, there is a huge difference in talent between the two.

Intelligent life is the spirit born in the code, driving the code is like eating and drinking water, which is an inborn talent! As long as you give the code some time to learn, the gap between the two sides will only grow.

Of course, although the potential of the code is quite huge, the hacker experience in the Gemini network is not enough after all. In order to avoid being positive Ko at the beginning, the codename chose the same method as the bamboo at that time, that is, long-range attack - throwing hidden weapon!

Gemini intelligent brain occupy the home advantage, there is a strong defense - firewall! But the code also created a thunderbolt like hidden weapon - "Bomb virus"!

Firewalls and viruses are one kind of "equipment", which belong to a kind of preset program to enhance the electronic warfare capability of one's own side.

The virus developed by codename also integrates the idea and technology of artificial intelligence, giving the virus the strongest ability in the later stage Evolution!

It can hybridize, mutate, and exchange information with its homologous mutated virus, so as to further improve its own program and make itself more hidden and more destructive.

This kind of virus is like a kind of chronic poison, the longer the incubation time, the deeper the poisoning!

In addition, this kind of bomb virus can use the surrounding data to camouflage and mutate itself, just like a chameleon. Therefore, it is extremely difficult to be detected by anti-virus software. Even if it is found, if there is no specific activation method, it means that the bomb dismantling fails, and the other party will explode immediately without saying a word!

The process of communication between the two sides is like thisAnti virus software: "ha ha! I found you "

bomb virus:" password? "

Antivirus software:

"Bang!"

……

This kind of virus that explodes on its own will undoubtedly bring great difficulty to the anti tracking of Gemini.

"Internal force", "moves" and "equipment" in a comprehensive view, the code is half as good as the other party, and each has its own advantages.

From the beehive's small test, it shows that the code has the ability to pose a threat to the intelligence and brain of the Gemini carrier. However, this time, the code name's task is to harass and distract the attention of Gemini, so she did not make too fierce confrontation.

What she has done is just to bypass the main defense area of the other party's firewall, and then guide the latent virus to carry out fixed-point explosion in the key position!

We should know that every time the bomb virus explodes, it means that a large area of stored data around is exploded into a pile of random code, and the lost data is also easy to cause local terminal control disorder.

For example, the automatic maintenance system of Shipborne UAVs on the beehive has caused a large amount of data loss due to virus bombs, resulting in the repair of UAVs without maintenance needs, while the UAVs with faults are ignored.

Another example is the failure of the automatic storage system, which leads to the Wulong incident that two UAVs collide and damage.

Even more disturbing is the access control system on the warship. Just a moment ago, when a female officer on a warship was taking a bath in a public bathroom, the automatic door suddenly opened, which made the two male officers who happened to pass by gape.

This kind of sudden welfare is still staged in many places, leading to screams and whistles everywhere

It was not only the entrance guard, but also the lights on the top of the head. It was supposed to be a serious military theme set, and jumped directly to the scene of the carnival.

All the officers who were caught off guard could only look at each other blankly at the various automatic doors opening and closing and the gorgeous stage lights

Although these attacks on peripheral function modules can not cause any substantial damage to the warship, such shameless harassment has caused great trouble to the daily work of warships. The warships disturbed by the virus are almost in chaos of management, which can be described as "flying around like a dog and a fowl"!

……

Gustav's face was as black as he could be after hearing all kinds of reports.

Provocation! This is a naked provocation!

Although the other side did not launch a substantive military action, it was beating him in the face in this way!

"Can't we just watch each other go wild over our heads?" Gustav cold voice.

"Sir! Sandbox analysis of the virus is in progress, but we still need some time... " The adjutant wiped the sweat from his forehead.

"Has the source of the hacking been found? Are the technical departments all idle? " Gustav was more angry.

"The other party's hacker used the virus infected terminal layer by layer, we can not find his exact location in a short time, but we can be sure that the source of the attack is in our internal network!" Deputy official.

Gustav bowed his head and pondered for a long time. His eagerness to catch the spy made him completely forget his personal honor and disgrace. Finally, he said with a black face, "get ISAR for me, I need technical support from the Internet!"

Compared with the sea people, the electronic technology of the feather tribe is even higher. However, Gustav is not willing to bow down to ask for help from ISAR.

"Er Well, just after receiving the news, the Yu people are worried that they are also infected by the virus. Not long ago, they have just disconnected most of our network data connection. If you want to contact Mr. ISAR, you can only use your private communication authority. " The adjutant said with a dry smile.

Gustav:

www.novelhold.com , the fastest update of the webnovel!