Chapter 253: Killing Creep with Creep

readx;

Chapter 253 to Creep and Creep

Thanks for the 10,000 yuan tip of the nerve-wracking children's shoes!

At night, Lin Hong sat in front of the computer, checking the messages and files delivered back from the bit messenger. Pen Fun Pavilion www.biquge.info (7*

The efficiency of the ghost worm is very high, and the keywords set by Lin Hong are mainly related to Tesla, such as his name, "ether", "wireless energy transmission", "Tesla coil", "Tesla wave", ......

Once the ghost worm finds a file or picture related to these terms, it will send it to the designated bit messenger file, and then use the file sharing and information transfer functions inside to send it directly to Lin Hong's computer.

Due to Lin Hong's restriction on the exclusivity of the worm, each computer is only allowed to run one ghost instance, so it will only occupy a small amount of memory and disk space.

Ghost can be both latent and running.

Usually, it is stored on the disk in the form of a static file, of course, it does not exist in the data structure of the disk file system, it is hidden from both users and system administrators, and the existing file detection tools cannot detect it.

In the latent state, only a very subtle monitoring thread runs hidden in the background of the system, so that the memory and CPU resources consumed can reach the minimum standard, even if they are compared one by one, they cannot be detected at all.

The hidden technology used by Lin Hong is his own original, which directly modifies the data structure of the process in memory, and the system's own detection mechanism cannot detect it at all. It wasn't until much later that someone explicitly proposed a technology called "rootkit", somewhat similar to the one used by Lin Hong.

Once the monitoring thread discovers what it is monitoring, that is, the trigger condition is reached, the ghost main thread will be automatically started to complete some functions.

At this moment, the ghost will briefly appear in the system process space and then disappear due to the need to start the ghost.

In other words, the only time it can be discovered is the moment the ghost is activated.

In addition to the exclusivity mechanism, in order to prevent ghosts from being too flooded, Lin Hong can also control the total number of ghosts, so that they can be controlled within a certain range. (《》7*

In addition, Ghost also helps the server with antivirus.

Because Lin Hong is worried that if other viruses or worms interfere, the server will be abnormal, and then it will attract the attention of the system administrator, which is not conducive to the collection of data.

So, Lin Hong added some additional functions to the ghost, which can be regarded as doing a good deed to help the other party strengthen its defense.

In this way, it is like sprinkling antivirus on the server, and basically any program with the characteristics of a virus or worm tries to break in, and it will be immediately killed by ghost.

These days, Lin Hong has collected so much information that his disk can no longer be stored.

He had to go to the computer and electronics market in search of bigger hard drives.

Fortunately, he is very knowledgeable about hardware technology, and although his laptop lacks the necessary scalability, he has managed to expand the hard disk space of his laptop and connect it to the laptop through a custom interface that he has personally customized.

Except for some bizarre experiments with Mrs. Hedy Lamarr these days, he basically stays in his room and reads these materials.

Tesla's voice is so legendary, and the work he did and invented so much that his data alone filled several 40MB hard drives.

Most of them are in the form of image scans, and some of them are blurry, and in many cases there are stains and missing pages, which brings great difficulties to Lin Hong's reading and research.

Many of Mrs. Rama's theories about Tesla are indeed not groundless, Lin Hong has found a lot of information as evidence, and even the ghost field has found a prototype, that is, the ether energy network.

Tesla's work in his later years was all about studying how to "borrow" endless energy from the ubiquitous ether.

According to Tesla's original plan, he planned to build a world-less "Tesla Energy Tower", with New York being the first, the second in Amsterdam, the third in China, and the fourth and fifth in the South and North Poles, respectively. Templar

From Tesla's notes, Lin Hong saw his vision of the establishment of these five energy towers, and he believed that at that time the earth would become a unified system, and it could be controlled by his preset oscillators, and obtaining endless energy was only one of the most basic functions, and at that time, he could even achieve some abilities that can only be seen in myths and legends.

Tesla's energy tower is also something that some scientists are focusing on.

Lin Hong has seen many other scientists' research, speculation and investigation of Tesla's energy tower.

Many people believe that Tesla's first energy tower did some of its functions, as evidenced by what New Yorkers saw at the time. Later, someone once surveyed the inhabitants around the first energy tower and obtained first-hand information.

Lin Hong took a general look, and those information had a relatively large degree of credibility, and the life, age and address of the person investigated were very detailed.

Some scientists even suspect that the Tunguska explosion that occurred in the Siberian forests of Russia in 1908 was Tesla's masterpiece. The explosion was as devastating as 15 million to 20 million tonnes of TNT** and brought down more than 60 million trees over more than 2,000 square kilometres.

……

"Didi-"

Lin Hong, who was reading the information, couldn't help but be stunned, and switched to the bit messenger client interface that had been running in the background.

An alarm came from his laptop speaker, which meant that his ghost worm had been discovered.

Soon, an IP address was sent to the Bit Messenger interface.

Lin Hong hesitated for a moment, and finally copied the IP address, started the proxy function of Bit Messenger, and then launched a small tool to scan and analyze this IP......

A few minutes later, he quietly managed to hack into the server that had entered the target IP.

"I discovered the existence of ghost so quickly, and the technology of this network management is not bad."

Lin Hong stayed quietly and observed for a while, and suddenly couldn't help but feel a little embarrassed.

Unexpectedly, the way the other party found the ghost was to use bait to lure it, and after discovering the abnormality, it was detected and analyzed in a targeted manner.

It's a really effective way.

Lin Hong continued to observe for a while, and what surprised him was that the other party didn't seem to plan to kill the ghost at all, but kept using worms to lure the ghost to stimulate it, analyze its reactions and movements, and finally use these stimuli to try to copy the ghost.

"What the hell are they trying to do?"

Lin Hong saw that their other computer was connected to this server, and the other party seemed to want Ghost to infect that computer as well.

Lin Hong looked at the computer out of curiosity, and finally found an abnormality, it turned out that the machine had been infected with a large number of worms, and it almost came to a standstill.

"They actually want to use ghost to kill these worms, and use ghost as an anti-virus program."

When Lin Hong learned of this result, he immediately cried and laughed.

He easily checked the situation of other nodes, and then monitored the online conversation of the other party, only to find out that the entire SPAN network was facing a very serious worm crisis at this moment.

And the worm, which they call Tree, seems to have the same purpose as Ghost, which is to steal confidential information.

It's just that this worm is too ugly to eat, not only hungry, but also indiscriminately multiplied, perhaps only in this way can more information be collected in a short period of time.

The cybersecurity experts were helpless about the worm crisis, and finally stumbled upon the existence of Ghost, so they entrusted the task of driving out the worm to Ghost.

"The information this time is almost collected, since you have discovered the existence of ghost, let's do you a favor, and use it as the cost of these materials."

Lin Hong originally wanted to wait for the data collection to be over, and then let the ghost god self-destruct unknowingly, but now he decided to help them, and it was a good thing.

So, he immediately activated a function that had been written long ago, and completely turned off the ghost's information transmission function, so that even if the other party captured a sample of ghost, he couldn't analyze ghost's true intentions at all.

Then, he lifted the limit on the number of ghosts.

Completing these two steps is very simple, just two switches. The bit messenger he used himself integrates the IRC command function, and directly uses the bit messenger's network to transmit commands and instruct the ghost to generate actions.

It's no secret that other people, after looking at the source code and protocol of BitMessenger, can also develop software for it, and the API is ready-made. As for whether it is used for good deeds or bad deeds, this is not something that Lin Hong can control.

Ever since he decided to make BitMessenger an official open-source, he has stopped maintaining it. It's up to the community to do it themselves.

He built a platform where people can use it to do what they want to do. Just like the computer platform of the TI series, only in this way can the wisdom of many people be gathered, after all, the power of one person is always limited.

With Lin Hong's lifting of the limit on the number of ghosts, Edward of the SPAN Cyber Security Lab also cheered in surprise, because his experiment on luring the ghost worm had been successful, and another server infected with the Tree worm was back to normal in almost a short time.

It's not easy to say, in order to study ghost, Edward took the hard drive from Fermi Lab and brought it back directly. Fortunately, the machines of DEC company are all configured in the same configuration, otherwise, he may have to ship the entire Taitai server back.

After bringing it back, he has been conducting various experiments on this new server, but nothing has happened, and Ghost has stayed honestly in his own turf and never runs outside.

Later, Edward remembered the network characteristics of the worm, and his heart moved, and he connected it to the network, but the effect was immediate, and the ghost worm finally took the initiative to kill the damn tree worms on the other server.

Edward saw that his way was feasible, and there was hope for killing the tree worms, and he was in a good mood.

At this time, the phone next to him rang, and he picked it up: "Hey? I'm Edward from the Cyber Security Center. ”

"Mr. Edward, what the hell are you doing, didn't you just come here before? Why did you send someone again? There are several more at once, do we still want our laboratory to operate normally? Anthony whined in a gruff voice over the phone.

Edward was stunned when he heard this, and sent someone over again? How did I not know?