Chapter 228: Process

Han Feng's mood at the moment was a little apprehensive and a little excited.

On the bright side, it may be that the pirate has woken up, but there is another possibility - the pirate has an accident.

"Pirate, did you hear that? I'm Han Feng. Han Feng said again.

The sound is passed through the microphone to a small piece of software in the server, which converts the analog sound completely into a digital signal and then goes into memory.

"Pirate, please hear back. ”

After calling a few more times, Han Feng gave up this method, he directly called up the console in the server, and used the control terminal to enter commands, hoping to contact the pirates in this way.

However, there was still no response to the instructions given.

Han Feng stopped, sat there and waited for a while, then stood up and walked towards the technical department.

When he came to the door of the computer room, Han Feng explained to Xiao Liu: "Take care of the pirates as usual." ”

Xiao Liu hurriedly patted his chest and nodded: "Alas, I will! Mr. Han, please rest assured, wrap it up on me!" He didn't notice that Han Feng was talking about "pirates", not "pirate servers".

After saying that, Han Feng left.

Xiao Liu breathed a sigh of relief, looking at Han Feng's departing back, he whispered: "What is there in this server, why is it that Mr. Han doesn't look at it right? I heard that something happened to it, and I immediately rushed back, is there any secret hidden? However, if it is confidential, why do you want to put it on the Internet?" Thinking of this, he immediately shook his head and said to himself, "This is not something I need to care about." I just have to watch it carefully. ”

When Han Feng came to the technical department, Liang Jing and the others were busy looking for the main reason for this large-scale server restart, but there was no progress, what caused this restart. No clues were found in the logging.

Han Feng also checked it himself, and it was true that he didn't find anything, no wonder they were faced with this situation, even if the technology was powerful, they would be helpless.

"Check if there is any change in the data in the server before and after the restart. Han Feng suggested.

Liang Jing nodded: "I've already let them do it, it will take a little time." ”

Each server's hard disk has a backup of all the data stored on the RAID hard drive. There are even several copies of the important data, and what the technicians are doing now is to restore the backup data. Then compare it with the current data to see if you can find any useful clues in this way.

Han Feng also participated in the analysis, and the entire team was assigned a part of the work, analyzing every detail in as much detail as possible.

More than an hour has passed. The analysis finally revealed that a technician had discovered a hidden process in the middle of the system process that was almost not resource-intensive, and that was not visible at all in the commonly used process viewer or command. He only found out when he used a hacking tool, and there is only a slight difference between the naming of this process and the system process, and even if he finds it, if he doesn't pay attention to the words, he may still leak it.

This process is too special to be killed, and it seems that there are "companion processes" hidden elsewhere when one of them is over. It communicates with another process and is then reactivated.

After the whole analysis was completed, only one suspicious thing was found.

"We analyzed it, and this process doesn't seem to have any impact on the server, and it has very few functions, only the simplest data exchange function. Liang Jing said to Han Feng, "If it weren't for the fact that after the restart, this process could no longer be found, I would definitely think that this was a garbage process in the operating system." ”

The so-called garbage process refers to those redundant processes that have no use, a huge system, when it is complex to a certain extent, its controllability begins to decrease, accompanied by some garbage code that even the coder sometimes does not notice, the garbage code is generated for many reasons, it may be that the coder forgets, or it may be that the coder himself knows, because it will not affect the system, it will go with it. (Note: The garbage process is Xiaoqiang's fictitious content, please do not sit in the opposite number)

Han Feng looked at this process and suddenly had a sense of déjà vu.

The simplest data exchange function......

Han Feng sat in front of the computer, opened the two virtual machines, and then put the part of the backup data of the server where the process was located into the two virtual machines and ran them separately.

He then began using data interception software to monitor the flow of data in and out between the two virtual machines.

As soon as the data interception software was launched, it began to intercept some data packets continuously.

When Liang Jing saw this phenomenon, his face suddenly showed surprise, because he knew that this machine was not connected to the Internet, where did these data packets come from?

Han Feng clicked on the details in the data interception software, and found the source of data exchange according to the IP in it - these two virtual machines.

————

"These two virtual machines are exchanging data?!" Liang Jing was shocked this time, "how is this possible...... Could it be because of this process?" Liang Jing now began to understand a little bit why Han Feng did this.

Han Feng nodded: "It seems that someone is using our server to do some experiments. ”

"Experiment?" Liang Jing was a little puzzled when he heard this, but he remembered how this process came about, "You mean, this process was run on our server by someone else through intrusion?"

"I don't know about this, and it needs to be further investigated, but at the moment, it doesn't seem to be harmful. Han Feng stood up, "Okay, I'll go and inform my colleagues in the public relations department and ask them to think about how to explain this restart incident." ”

Liang Jing looked at Han Feng in a bit of a daze, then looked at the server in front of him, and said to himself: "I've been tossing for a long time, and I don't seem to have figured out why I restarted, right? Since someone is using our server for experiments, why is there no more after the restart? Could it be that the other party's experiment has been completed?...... The security performance is still not enough, how can you let others enter and exit casually......' Thinking of this, Liang Jing walked towards the security department and decided to urge them to improve the security factor of the server again.

Han Feng told the person in charge of the public relations department a little bit about this matter, and asked them to pick a reasonable reason and explain the matter to the residents, as for what the reason, he naturally did not inform them, and he would not tell them, anyway, the job of the public relations department is how to maintain the company's image as much as possible.

Then, Han Feng had the server moved to his office and then worked on the specific functions of the process.

Looking at the data intercepted in the data interception software, Han Feng sat on the chair and fell into deep thought.

The reason why this process looked familiar to him was because he had done similar things before, such as the artificial neural network model that helped Chu Shuai perfect, such as the foundation of pirate intelligence - simulating neuron nodes.

In fact, Han Feng thought of this at that time, this strange process, its function, just like a neuron, plays the most basic data exchange function.

"Is someone cultivating artificial intelligence in this way?" Han Feng thought, "and actually implanted the process into all of my company's servers." If it weren't for this incident, they really wouldn't have been able to discover this process, and as a result, Han Feng believes that as long as the other party writes the control program of the intelligent core, it can unify these "neural units" scattered throughout the network, and it is very likely that artificial intelligence will be generated.

At the beginning, the reason why Han Feng wanted to develop "personal space" and P2P tricks was actually in this regard, but before he began to start researching this aspect, there were already people who were ahead of him and were still using the software he had written.

It didn't cause any damage to the server, but it didn't feel like it was being taken advantage of.

Then, Han Feng remembered the server restart incident: what caused all the servers to restart?

Moreover, after these servers were restarted, the process hidden inside was gone, which surprised Han Feng very much.

You know, it's not easy to understand this process, it's just as tenacious as a virus, to be precise, more powerful than a virus, you know, it's hidden in the system in the way of a system process.

Even Han Feng himself spent a long time analyzing and monitoring before he found a way to clear this process.

Could it be that the author of this process did it? Han Feng shook his head, no, even if the experiment was over, it would not be so obvious, and it would be carried out with great fanfare, as if he was afraid that others would not know.

Just as Han Feng was thinking in a daze, his mobile phone suddenly rang, pulling him back to reality from his contemplation.

Han Feng saw that the mobile phone showed an "unknown number", and in confusion, Han Feng pressed the answer button.

"Hey, hello, I'm Han Feng. ”

But after waiting for a long time, there was no sound in it, just a beep, not a busy sound after hanging up.

Han Feng said a few words again, but the other party still had no sound, so he hung it up.

But soon, his phone rang again, and it was still an unknown number.

"Hey, who is it? ”

"Toot, beet—" The earpiece still sounded.

Han Feng couldn't help but be a little impatient, so he took away the phone and wanted to press the shutdown button, but at this time, his hand suddenly stopped, because he reacted, and the previous "beep" sound seemed to be Morse code......

(Zilang Literature)