Chapter 246: Worms

readx;

Chapter 246 Worms

Special thanks to Xiaobao Baozi 588 tip, Honglong Dragon 10000 tip!

On the fifth day after the summer vacation, Lin Hong officially moved out of Arthur's house. Pen ~ Fun ~ Pavilion www.biquge.info Church

He didn't even rent another house, and lived in Mrs. Rama's house.

These days, he spends most of his time in the MIT library, except for some simple tests with Madame Rama.

He made a detailed schedule for himself and arranged his time slowly.

He had already decided that the task in the summer vacation was to read like crazy.

His field was not limited to electronics and computers, but also included social sciences and psychology, and after meeting Hedy Lamarr, he added physics, biology and philosophy.

Madame Rama has been working on a lot of little experiments against him these days.

For example, there is a meditation experiment to measure the strength of the "Tesla waves" emitted by Lin Hong's brain.

According to Tesla's theory, the human brain emits a very special kind of waves, which are similar to electromagnetic waves but completely different.

According to Maxwell's electromagnetic equation, an electromagnetic wave is a transverse wave that vibrates up and down.

In addition to transverse waves, there is also a longitudinal wave in nature, which vibrates in the same direction as the direction of propagation, the most common being sound waves and seismic waves.

Tesla believes that the waves emitted by the human brain are also a special kind of longitudinal waves, and the frequency of this wave can be controlled by the brain to achieve different energy transmission. Heidi Lamarr called this wave "Tesla wave".

Like sonic resonance, Tesla waves also have resonance.

Once the Tesla wave and the etheric medium resonate, it can have an effect on the ghost field, and even manipulate the energy inside to achieve its own goals.

It is said that Tesla has managed to find a way to generate such waves using electronic and mechanical devices, resulting in a very mysterious power. (《》7*

It was one day in 1903 that Tesla was testing his wireless energy transmitter at full load.

The experiment took place at midnight. On this night, New Yorkers witnessed countless dazzling beams of electricity connecting the transmitter tower to the sky for hundreds of miles, creating a dazzling view in the sky.

What exactly you have seen, but it is no longer known, and all the information has been hidden and eliminated by people with intentions.

Hedy Lamarr wanted to repeat Tesla's experiments, but her research on electronics was not deep enough, and she had been trying to reinvent such a device, but all failed.

This time, she decided to settle for the next best thing, no longer using artificial devices, but letting someone with strong mental strength test it.

This experiment was conducted in two phases.

In the first stage, she sat Lin Hong in the middle of a uniform magnetic field, and then meditated progressively according to a set of methods she invented, training Lin Hong to control the frequency of "Tesla waves".

After Lin Hong was more proficient in this area, he carried out the second stage of experiment, that is, to use the resonance and superposition of longitudinal waves to influence and manipulate external objects.

Of course, this experiment was not easy.

Experiments have shown that Lin Hong's brain can indeed produce Tesla waves, which Heidi measured using a modified seismic wave measurement device.

However, it is very difficult to control the frequency of Tesla waves, and the experiment has not been able to break through at this step.

At night, Lin Hong spends most of his time programming or surfing the Internet.

After moving out of Arthur's house, he immediately went to a computer store to buy an IBM laptop and installed Linux, which he had perfected and optimized.

He is now completely out of the minix platform and everything can be done under Linux.

Although the configuration of the notebook is not as good as that of the desktop, it is lightweight and easy to carry.

In addition, Lin Hong has specially optimized the hardware of the notebook, and the running speed is also very fast, which is much more efficient than the popular Microsoft and Apple operating systems on the market. (《》)

Under the influence of Hedy Lamarr, Lin Hong became very interested in Nicolas Tesla, and his curiosity and admiration for Tesla even surpassed that of Leonardo da Vinci.

After much consideration, Lin Hong decided to do one thing - to write his first worm.

Lin Hong now has a deeper understanding of the virus.

Since he started using the computer, he has been poisoned many times.

Of course, that was when he was a newbie.

Later, because he used minix and linux, which were not compatible with other computers, he was rarely poisoned.

In fact, Lin Hong has been paying attention to the virus.

Strictly speaking, this is a special kind of computer program code.

What Lin Hong finds interesting is that this code can replicate itself, just like a biological cell.

Self-replication and propagation, which are characteristic of living organisms, are now present in computers.

It seems that there has never been such an example in history.

Since Lin Hong was poisoned for the first time, he began to pay attention to this aspect intentionally or unintentionally.

In particular, the last April Fool's Day music virus actually caused other members of the SAM Association to be recruited, which had a particularly big impact on Lin Hong.

From that point on, he decided to delve into this technology, which is a bit evil in nature.

In fact, the virus was not originally intended for destruction, but was a game written by three young engineers at Bell Labs called "Core Wars".

The game itself is written to imitate nature, the two sides face off, at the beginning there is only one point, and then devour and copy Zhou Wei's things, whoever devours all the resources, including the opponent, wins.

Later, after the continuous optimization and expansion of computer engineers, the technology of computer viruses was completely opened.

Hackers like this kind of stuff because it's more technical and it's more interesting.

Writing about a virus, like creating a new species, gives them a sense of accomplishment in acting as a creator.

Among computer viruses, there is a special kind of virus called worms.

The difference between a worm and a normal virus is that it has the characteristics of a network and is able to spread on the network autonomously. Moreover, the worm can exist autonomously, does not need to be attached to other programs, and does not need to be manually executed by others, these things, it can do it itself.

Compared to ordinary viruses, worms are closer to an organism.

The original worm was an aid invented by computer engineers to ease their workload. The design is designed to allow the program to "wander" from computer to computer when the network is idle without causing any harm. When a machine is overloaded, the program can "borrow" resources from idle computers to achieve load balancing of the network.

However, in 1988, this changed.

At Cornell University, a first-year graduate student named Robert Morris wrote an experimental program to see if a computer program could replicate itself between different computers.

In order for the program to enter another computer, he wrote a piece of code to crack the user's password.

At 5 a.m. on November 2, 1988, the program, known as "" (the worm), began its journey, and it lived up to Morris's expectations: it crawled into thousands of computers, crashed them, and caused a record $96 million in financial losses.

Two years later, Morris was sentenced to three years of probation, fined $10,000, and volunteered to serve the new district for 400 hours for creating the "Morris" worm.

The Morris incident shocked American society and the whole world.

What is more impactful and far-reaching than the incident is that hackers have truly become black, hacker ethics have lost their restraints, and hacker traditions have begun to be interrupted. Moreover, computer viruses have officially entered the stage of computer history.

Lin Hong read this story in a computer magazine.

This story gave him an inspiration to solve one of the things he had been thinking about for the past few days.

Since the information about Tesla has basically been sealed by the Mei government, Lin Hong decided to collect this information through hacking technology.

He believes that with the popularity of computers now, there must be a detailed file about Tesla stored in the hard drive of a government agency's computer.

However, he couldn't do anything about which computer it was.

There are so many computers on the network now, it is impossible for him to hack them one by one.

The "Morris Worm" gave him an inspiration - he decided to write a "Tesla Worm" as well, which would be used to gather information about him.

Lin Hong learned from Kevin that most of the computer systems used by the intelligence agencies or the military of the Mei government were VAX/VMS series. So, he decided to write a worm that would only target the vax/vms platform, so that it would have less impact on mass society.

Lin Hong carefully analyzed the Morris worm and felt that there were many areas that could be improved.

For example, the Morris worm can cause computer failures, but Lin Hong is reluctant to attract the attention of others.

His purpose was only to gather intelligence, of course, "sneaking into the village, and shooting people don't want to shoot". Therefore, he has to make the worm exclusive on the same computer, that is, when there is a worm on the computer, there is no need to continue to self-replicate, otherwise it may cause too many resources to be taken up and affect the normal operation of the computer.

Second, because it is to collect information, the content found must be sent.

The most common way to do this is, naturally, to use email.

But this method is easy to be traced, and once it is traced to an email server, it is easy to discover the true purpose of the worm.

And Lin Hong collects Tesla's information, hoping to keep it secret so as not to attract the attention of others.

Therefore, he decided to combine this worm with Bit Messenger, and once the information is discovered, it will be transmitted to another online client through Bit Messenger, so that even if others find out about the existence of the worm, they will not be able to trace the whereabouts and content of the specific information.