Chapter 693: Chess Meets Opponents

readx;

Just as Lin Hong was reading the security analysis report, he received a call from Summer. Pen × fun × Pavilion www. biquge。 info

"Mr. Lin, the server at our company's headquarters has been poisoned, it's Grady virus!"

Lin Hong couldn't help frowning when he heard this: "Are you sure?" ”

At this time, the superbrain system received the virus sample code sent by the summer.

Summer said: "According to the code analysis, there is no doubt that it is Grady virus!" ”

Lin Hong didn't check the decompiled code of the virus sample, it wasn't that he didn't believe it just now, he just felt a little surprised.

All the operating systems within the company are LINX, and they have been specially customized, even if someone has specially written a virus for the LINX system, it is just a dream to run inside the company, because they have added a very strict permission control mechanism to the internal system, and other foreign programs cannot run at all without the corresponding permissions.

Could it be that the other party has broken the internal permission control mechanism of Linx?

This mechanism, they are not open to the public, and its source code is kept secret. Unless someone leaks the source code, the probability of this happening is very low, unless the other party is indeed a top expert.

Of course, Lin Hong was not so confident that no one could break through the security defense line of the three-color fire company, but he was just surprised, especially since the other party did not trigger the security alarm set by Lin Hong at all.

Lin Hong asked, "What is the situation at the Yangqi Peak base?" I didn't get an intrusion alert from my side. ”

"I've checked, and there's no problem at the base."

Hearing this news, Lin Hong was a little relieved. Although there is not much confidential content in the server, some information leaked out, after all, will still cause a certain impact and loss, at least let others know some important information within the three-color fire company.

"This virus is so difficult that a few of us got together for hours without a clue......

Summer was embarrassed to trouble Lin Hong for everything, and asked him to come forward to solve it.

This feeling is like a child crying for their parents when they encounter a problem.

But the stakes were high, and they found that there was nothing they could do. I can only inform Lin Hong.

Ending the call, Lin Hong immediately began to study the source code of the Grady virus.

The current source code is certainly not the original code, but has become binary, and in order to analyze it, it must be decompiled and restored from binary to assembly form, so that the human brain can easily understand it.

Lin Hong dealt with it preliminarily, and decompiled it directly in his mind. There are nearly tens of thousands of pieces of assembly code that appear on the retina screen.

Of course, there is a lot of waste code in this, and it is necessary to break points according to the actual situation, and then disassemble them in a targeted manner.

Looking at it, Lin Hong felt that it was a little familiar.

Before he could come to his senses, he suddenly received a warning that a key node of the Bitcoin network in Switzerland had been compromised.

These key nodes, which are actually servers that Bitcoin enthusiasts voluntarily contribute to the development of Bitcoin, are dedicated to accelerating the confirmation of Bitcoin payment transactions.

There are so many of these key nodes all over the world that other Bitcoin supporters often support these server contributors by donating.

Lin Hong deployed intrusion detection mechanisms in some critical servers. As soon as something unusual happens, it triggers, and he knows it right away.

Lin Hong originally didn't want to pay attention to this signal. But to his surprise, the other party easily broke through the first line of defense, and then destroyed it and completed the occupation of the server in an instant.

This phenomenon made Lin Hong's heart move.

"What's going on? Why does it seem that all of a sudden all the masters have appeared? ”

The virtual terminal of the server is connected to through the network of bit messenger agents.

Lin Hong's appearance obviously immediately aroused the other party's awareness, and all operations immediately stopped, as if he was burglarizing, and suddenly ran into the master coming home, and was so frightened that he didn't dare to move.

Lin Hong directly used Sigan to input instructions. It's many times faster than manual input, and he wants to find out who the other party is.

And when Lin Hong was making a quick inquiry, the other party woke up from a big dream and began to act. The purpose was to prevent Lin Hong from discovering useful information and traces.

For a long time, the invasion and anti-invasion process that Lin Hong encountered was actually extremely boring, and basically after a few instructions, the outcome of the victory and defeat had already been determined.

But this time was different.

Lin Hong used his super brain plus his super thinking and sensibility, and he actually fought with the other party.

Invasion and counter-invasion between the two sides. Tracking and anti-tracking, contention and counter-contention, unexpectedly contested the taste of gunsmoke.

Interesting!

Lin Hong became more and more courageous.

On the Internet, he had never encountered such a situation.

When he was very skilled, he didn't have the opportunity to meet a master at all, and when his skills grew, he left others far behind.

Never before has I been able to meet an opponent of equal weight.

Lin Hong completely let go of his hands and feet, and concentrated all his mind to deal with this battle that was thousands of miles away.

I have to admit that the other party's skills are superb, if you follow the way of seeing and dismantling moves, Lin Hong can't help the other party at all.

However, after this lasted for a while, Lin Hong's mind was divided into two, one part was used to defend against the other party's invasion, and the other part was quietly outflanked from another angle.

When Lin Hong was about to discover the truth behind the other party, he was stunned:

"Grady worm virus?!"

He never imagined that the opponent who had just been fighting with him for so long turned out to be Grady worm virus!

How is this possible?

Judging from the previous offensive and defensive methods, the other party is undoubtedly an experienced and highly skilled top hacker.

Lin Hong checked it again with some reluctance, and it was obvious that he was not mistaken.

Don't......

Lin Hong had a thought in his heart that he himself was a little unacceptable - could it be that it produced intelligence?

The other party obviously discovered Lin Hong's investigation from the side, and immediately stopped fighting and quit the server.

Lin Hong tracked all the way, and finally lost the whereabouts of the other party in a computer in the United States.

However, this tracking made him further confirm that the other party was indeed Grady worm!

For this situation, Lin Hong's mind was full of questions.

How could such a thing come about?

Who does it belong to? Which institution? Which force?

Lin Hong is actually quite happy about this situation, after all, its appearance means that artificial intelligence research is likely to have achieved a qualitative breakthrough.

This is definitely an event that can shock the world, and if it can be used well, human society may immediately produce extremely huge changes.

The field of artificial intelligence has always been a field that Lin Hong wants to study in depth, and he has basically understood all the existing theories, and learning and reading materials has always been his strength, and it does not take much time.

However, in his view, the existing theories of artificial intelligence are flawed, and if they could create artificial intelligence life, they would have come out a long time ago.

This is also the reason why he has never really calmed down to conduct research, after all, he has too many things to do, and too many puzzles are waiting for him to solve.

According to his judgment, it will take at least ten or twenty years to develop artificial intelligence life with autonomous intelligence.

But he never thought that he had met one today, and it seemed that the level of intelligence was still very high.

Of course, while he was happy, he felt that the form was very grim.

Because he didn't know who the "person" who created this artificial intelligence was, and what kind of impact it would have on the three-color fire company.

Lin Hong no longer cares if Grady hacks into Bitcoin network nodes elsewhere in the world, but immediately begins to analyze its source code.

There are so many variations of Grady that the code is different for each sample.

But Lin Hong is not worried, a lot of code is always confusing, and the core code will definitely not change.

He collected dozens of sample codes of Grady virus from all over the world, then decompiled them all, disassembled them and read them.

This process makes full use of his ability to multitask.

The Retina screen has been cut into eight zones at the moment, each of which is a small display.

The four blocks in the upper area are constantly swiping upwards with the disassembled code.

When a critical code snippet is encountered, it stops immediately, and the corresponding lower window starts to recompile at the lower breakpoint, and then updates to the upper window in real time.

Soon, Lin Hong found a similar core code from the dazzling code.

He put these similar codes together and compared them, and the more he analyzed them, the more weird the expression on his face became.

"These codes...... How is it so familiar? ”

Lin Hong looked at these codes and couldn't help but be a little stunned.

Some of the code was all too familiar to him - the key snippets he used in the Super Worm.

Everyone has their own style of coding, just as writers have their own style and composers have their own style.

Lin Hong also has his own coding style, especially when implementing the core functions, writing code will subconsciously use the way he is most familiar with.

The last time he upgraded the Super Worm, Lin Hong deliberately avoided this aspect and used a completely different style to write the new Super Worm Core, which was completely different from the previously written software such as Bit Messenger and Bitcoin.

It was precisely because of this that he was sure that this code in Grady's code was definitely his own.

What's going on?

Grady is a super worm?

Or did it devour the super worm and evolve? (To be continued)