Chapter 181: Shock (Medium)

This function can be described as quite powerful, and the reason why Zhang Yang researched this function is that in the production of special effects, in order to save resources, in some specific scenes, directly replace, and then supplement the pixels.

However, even this single feature has one of its biggest drawbacks! As you can see from the introduction, these functions require a huge amount of computing data! If you analyze a picture alone, it's fine, an ordinary home computer can barely calculate, but it also takes more than ten minutes!

If it's a video replacement, then sorry, it requires resources that even a regular server can't provide! If a video is turned into a picture according to the number of frames, then it needs to process the picture and use computer resources, which is absolutely astronomical, I am afraid that it must be a supercomputer, and it must be equipped with a supercomputer with special image processing components to be competent for this job.

In the logical judgment of the infected insect, Zhang Yang thought of the function of this software, seamless replacement! It seems quite simple to say, but the two are fundamentally different, the first is that the image is dead, and your software can analyze and decompile it at will.

But antivirus software doesn't, and if you want to modify the antivirus software, it's quite difficult, after all, the most important thing for any antivirus software is to protect itself.

But Zhang Yang already has an idea, first of all, the concealment and infection ability of the infected insect is quite strong, you can make a fuss about this, at least the current antivirus software can not identify the infected insect, let alone the antivirus, before they get the mutation law of the infected insect, the only antivirus software that can kill the infected insect is Zhang Yang's own brood!

And Zhang Yang is currently mainly written for the mother nest, when the mother nest was written, Zhang Yang just wanted to be able to kill all the viruses, but now that he is writing the infected insects, Zhang Yang wants to be able to kill all the antivirus software, and the strongest spear and shield are held in his hands, this feeling is really strange.

But it has to be said that it is precisely because of this that Zhang Yang's technical strength in these two fields is increasing at a terrifying rate. After pondering for a long time, Zhang Yang began to rewrite what he had written, before Zhang Yang made an active decomposition of the virus from the infected insect, and then recorded the antivirus of the antivirus software, so as to send back the antivirus characteristics of the antivirus software.

But Zhang Yang doesn't want to do this now, and in this way, the infected insect can actively mutate, so as to achieve the ability to evade antivirus software, which is not impossible to do, but it is absolutely impossible to do it now. To actively mutate and avoid the detection and killing of antivirus software, the logical judgment involved in this is too complicated.

Zhang Yang decided to use another ability, that is, mixed mutation and gene exchange, in the past, the gene exchange function of the infected insect, that is, the mutation function, was in contact with the same kind of virus, and then it happened, for example, the virus that Zhang Yang released last time to chase and kill the assassin virus mutated with the infected insect, and the two sides carried out cross-swapping.

And now what Zhang Yang has to do is to strengthen this ability again, but rewrite the functions of the antivirus software that he wrote before, that is, actively analyzed. After the infector detects the antivirus, it will immediately copy the same virus, and when the virus is cleaned up by the antivirus software once, it will mutate along its own mutation pattern.

Then, Zhang Yang also changed the infected worm into a sub-virus, which will contain a powerful sub-virus in the infected insect, the main purpose of this sub-virus is to destroy the source code of the target software, as well as the database file, and at the same time, it can also analyze and capture the code that destroys the target, so as to carry out secondary mutation.

In this way, after the infected insect that has been killed once by the antivirus software mutates once, the source code will be different. When it destroys the antivirus software, after the secondary mutation, the source code will be completely different from before. It then returns, mutates with the original parent virus that split off it, and genetically swaps.

After all these functions were written, Zhang Yang found another problem, that is, the infected worms have become a little bigger! No way, so many functions are combined, although it still seems to be a virus in essence, but its size is already 1.2m in size!

Computer viruses are not so big at all, they are generally tens of kb, hundreds of kb! However, Zhang Yang did not delete it, but quickly copied the virus to his computer, and then established a simulation system, and then put his own firewall and firewall in, Zhang Yang wanted to try how the new infected insect was!

After copying the two to the simulation system, Zhang Yang directly activated the new infecting worm, and then paid close attention to the changes of the infecting worm, and Zhang Yang naturally had a way to control the virus he wrote, and the author of each virus would reserve a deletion control means in the core code of the virus.

Because the flamboyant firewall also has anti-virus functions, it can be regarded as a combination of anti-virus software and firewall! After Zhang Yang activated the virus, Zhang Yang immediately activated the infected worm. At the moment of activation, Zhang Yang immediately found that the CPU usage of the entire computer was climbing at a terrifying rate.

"Damn!" Zhang Yang first froze for a moment, and then he couldn't help but scream, he suddenly remembered a key problem, just when writing the infected insect, the infected insect copied a virus when it detected the antivirus software and went out to test the antivirus software, Zhang Yang forgot a key surname problem!

That's the number of replicating viruses! I'm dizzy! Zhang Yang was a little dizzy, he immediately began to work in a hurry, but soon Zhang Yang found himself a tragedy, because in the short time that Zhang Yang reacted, the infected insects did not know how many viruses had copied out, to detect the firewall, and the firewall was a constant alarm, antivirus, and the CPU usage rate immediately reached 100%.

The computer's reaction speed has become almost slower than that of a snail, and the flamboyant computer can't react at all! "I'm going to go." Zhang Yang screamed depressedly, now Zhang Yang can't do anything, he can only wait for the computer's system to crash, and then he can deal with it. The entire computer screen has been completely frozen, and all Zhang Yang can hear is the "buzzing" sound left by the high-speed operation of the server hard drive.

There was no movement on the screen for a long time,Zhang Yang wondered if he wanted to turn off the computer,It's already crashed anyway,But if the system is not damaged,Even if you turn it on, it's the same reason.,Although it's a virus running in the simulation system,But the simulation system also occupies server resources,This is a truthใ€‚

Virus,It's not a person.,Before Zhang Yang doesn't control it,It's not going to be distinguished.,This is your own master's computer.,Or someone else's computer.,As long as it's a computer, it's going to be infected.,Now the problem is.,Even if it's turned on.,As long as it's restarted.,I'm afraid as long as the system is not damaged.,The problem just now will happen immediately.ใ€‚

Say! Zhang Yang couldn't help but burst into a foul language, a carelessness, it led to this result, not good, I'm afraid Zhang Yang has to redo the system, the problem is that there are a lot of written software stored in this computer, if you redo the system, I'm afraid these things will be over!

What's more, Zhang Yang is also afraid of another problem, that is, it seems that the infected insect is also a hard disk resident virus, unless Zhang Yang deeply formats the hard disk.

After struggling for more than ten minutes, Zhang Yang didn't make up his mind, mainly because the server uses a hard disk array, and the hard disks are centrally managed, Zhang Yang has no way to distinguish which data is on which hard disk, if it is deeply formatted, if the hard disk that stores the disordered array is formatted, then Zhang Yang will be a tragedy.

Just when Zhang Yang was entangled, suddenly the computer screen changed suddenly, Zhang Yang was stunned for a moment, and then immediately found that the CPU usage rate displayed in the CPU detection window he opened before was declining rapidly, and soon dropped to a normal level.

What's going on? After a pause, Zhang Yang quickly began to check for the infective virus, just twenty minutes, Zhang Yang didn't know how many files the infective worm copied, and he didn't know why it stopped, but the entire server resources were probably used by the infective worm.

After finding the information of the infected insect he had written, Zhang Yang quickly entered his own control program, and after successfully removing the activation state of the infected insect, Zhang Yang began to check its status, this check did not matter, Zhang Yang almost fell off the chair! The whole infected worm has completely changed!

Its source code has almost no familiar things for Zhang Yang, as for how it mutated, I can't say for sure, and its size has changed, originally it was about 1.2m in size, but now, it has become about 3m in size, and not only that, just now Zhang Yang used to test the simulation system and his firewall that the infected insect was completely killed by the infected worm!

The firewall used for testing was tested first, and after the detection, Zhang Yang was speechless for a while, the entire firewall has now become a sieve, full of holes, and more than 90% of the functions are unusable because of the lack of key surname files, and the entire firewall software cannot be completely operated.

Needless to say, these holes must have been "gnawed" by infected insects. And it's not just the firewall that has a problem, but even the environment used for testing, the entire simulation system has been infected with wormholes! It even affected Zhang Yang's real system, as for why the replication speed of the infected worm slowed down, Zhang Yang had to do the test to know.

(To be continued)