Chapter 452: Electronic Warfare Harassment
Gustav's flagship was tragically rear-ended, and depending on the damage, he had to be towed to the rear spaceport dockyard with the Hive for repairs.
However, he no longer cared about feeling sorry for his ship, thinking that he had caught the spy's flaw, Gustav immediately organized technical troops to use all their forces to target the Hive, and began to trace the virus and electronic attacks in reverse.
But what happened next turned out far beyond Gustav's expectations......
"Report to Your Excellency the Commander! Just now, our fleet was attacked by hackers again, and at the same time, a large-scale electronic virus paralysis attack broke out inside, and bomb viruses were found on dozens of warships one after another! The adjutant hurriedly reported to Gustav.
"What?! Dozens? Gustav was taken aback.
A rear-end collision almost paralyzed two warships, and if dozens of battleships had an accident at the same time, his commander would basically run naked.
"What about the losses?" He asked hurriedly.
When the losses of the warships below were reported, the adjutant's face suddenly became a little strange.
"Uh...... Overall, the damage is not large, after the rear-end collision of the Hive, we have immediately ordered everyone to pay attention to the enemy's electronic intrusion, and all attacks are currently blocked from the core firewall of the brain. ”
Gustav breathed a sigh of relief when he heard this, but the adjutant continued, "Although the core functional modules of the brain have not been invaded by electronics, the other party has cunningly bypassed our key arming areas and picked out some peripheral functional modules to attack, so, uh...... Caused some confusion ......"
……
The code name on the Hive was unexpected, and the twin stars were caught off guard, but when the twin stars were prepared, the two sides were completely a hard power competition.
In electronic warfare, it can be roughly divided into two major fields: red and blue, and the red domain represents intrusion, including electronic viruses, infiltration, compilation, decompilation, etc., which is the domain of hackers that we are familiar with!
Blue Domain, on the other hand, is the complete opposite, firewall technology, anti-virus technology, tracking and anti-tracking, vulnerability research, etc., which is the domain of cybersecurity experts.
Codename, as a newly born intelligent life, has an unparalleled talent in the field of hacking.
If the two sides of electronic warfare are compared to martial arts masters, then there are three factors to measure their force value: "internal force", "moves", and "equipment"!
The internal force is strong, the moves are exquisite, if you add the Heavenly Sword Dragon Slaying Knife, it is the standard template for the first in the world.
The computing power of both sides is equivalent to the "internal force" of a martial arts master, the stronger the computing power, the stronger the strength will naturally be, and even beyond a certain level, it can be reduced by ten times in one force!
In this regard, as a large-scale supercomputing center on the moon, the code name backed by huge mechanical bug computing resources has far surpassed the shipborne intelligent brain that is only used as a combat aid.
The offensive and defensive skills of both sides can be compared to various martial arts "moves", the moves are exquisite, and they can naturally move thousands of pounds in four or two, find the opponent's defensive loopholes, and you can kill with one blow!
For the codename that has just upgraded the system after introducing the Gemini coding method, she is like a virtual bamboo who has just obtained a hundred years of skill at the moment, although her strength is strong, she is completely a novice in moves, which is also one of the reasons why Nie Yun wants the codename to steal from the other party in electronic warfare and enhance her hacking ability.
The learning ability brought by wisdom allows the code name to be improvised, and the moves are flexible, in contrast, the Gemini Star Brain can only use dead moves step by step, and there is a world of difference between the two in terms of talent.
Intelligent life is born out of the code, and driving the code is like eating and drinking, it is an innate talent! As long as you give the codename some time to learn, the gap between the two sides will only get wider.
Of course, although the potential of the code name is quite huge, but the hacker experience in the Gemini network is not enough after all, in order to avoid being knocked out head-on at the beginning, the code name chose the same method as the virtual bamboo at that time, that is, a long-range attack - lose the hidden weapon!
Gemini Smart Brain occupies the home field advantage, with a well-defended copper wall - the firewall! But the code name also created a thunderous hidden weapon - "Bomb Virus"!
Firewalls and viruses are a kind of "equipment" and belong to a kind of preset program to enhance one's own electronic warfare capabilities.
And the virus developed by Codename also integrates the ideas and technologies of artificial intelligence, giving the virus the strongest late-stage ability...... Evolve!
It can hybridize, mutate, and exchange information with its own homologous mutant viruses, so as to further improve its own programs and make itself more stealthy and destructive.
This virus is like a chronic poison, the longer it is incubated, the deeper the poison!
In addition, this bomb virus can use the surrounding data to camouflage and mutate itself, like a chameleon, so it is extremely difficult to be detected by antivirus software, even if it is discovered, if there is no specific activation method, it means that the bomb disposal fails, and the other party will explode immediately without saying a word!
The process of communication between the two sides is roughly like this......
Antivirus: "Haha! I found you."
Bomb Virus: "Password? ”
Antivirus: "??? ”
"Bang!"
……
This kind of virus, which explodes at the slightest disagreement, undoubtedly brings considerable difficulty to the anti-tracking of Gemini.
"Internal force", "moves", and "equipment" are taken together, and the code name and the other party have their own advantages.
From the Beehive's knife test, it shows that the codename already has the ability to pose a threat to the Gemini ship's intelligent brain, but this time the task of the codename is to harass and distract the Gemini, so she did not make too fierce confrontational actions.
All she did was bypass the main defense area of the opponent's firewall, and then guide the latent virus to blast at a key location!
You must know that every time this bomb virus explodes, it means that a large area of stored data around it is blown into a bunch of garbled characters, and the lost data can easily cause the control disorder of local terminals.
For example, the automatic maintenance system of the carrier-based drone on the Hive, due to a large amount of data loss caused by virus bombs, resulting in the miserable repair of drones that obviously have no maintenance needs, while the faulty drones are ignored.
Another example is the failure of the automatic storage system, and there was an oolong incident of repeated storage, resulting in the collision and damage of two drones.
What's even more troublesome is the access control system on the battleship, just now, when a female officer on a battleship was taking a shower in the public bathroom, the automatic door suddenly opened, directly making the two male officers who happened to pass by stunned.
This sudden perk is still playing out in many places, causing screams and whistles to fly everywhere......
Not only the access control, but also the various lights overhead fell into a carnival, and the set, which was supposed to be a serious military theme, jumped directly to the scene of the happy carnival.
All the Sea Clan officers who were caught off guard could only look at each other blankly as they looked at the various automatic doors that were constantly opening and closing around them and the brilliant stage lights......
Although these attacks on peripheral functional modules cannot cause any substantial damage to the battleship, such shameless harassment has caused great trouble to the daily work of the battleship, and the battleship that has been interfered with by the virus has almost fallen into management chaos, which can be described as chicken-fly-dog jumping!
……
After listening to the various reports, Gustav's face was already dark.
Provocation! This is a blatant provocation!
Although the other party did not launch a substantive military operation, they were slapping him in the face in this way!
"Can we just watch each other go wild on our heads?!" Gustav said coldly.
"Your Excellency! Sandbox analysis of the virus is ongoing, but we still need some time......" The lieutenant wiped the cold sweat from his forehead.
"Has the source of the hack been found? Are the technical departments all idle? Gustav was furious.
"The other party's hackers used a virus-infected terminal to arm it layer by layer, and in a short period of time, we couldn't find out his exact location, but we can be sure that the source of the attack is in our internal network!" Adjutant said.
Gustav lowered his head and pondered for a long time, his eagerness to catch this spy made him completely put aside his personal shame, and he finally said with a dark face, "Pick up Ishaar for me, I ask for technical support from the Internet!" ”
Compared to the Sea Clan, the Feather Clan's electronic technology is even higher, but Gustav is definitely unwilling to bow his head and ask Ishar for help unless it is absolutely necessary.
"Uh...... This, after the Feather Clan just received the news, they were worried that they were also infected by the virus, and they just disconnected most of their network data connections from us not long ago, and if they want to contact His Excellency Isar, they can only use your private communication permission at present. The adjutant laughed dryly.
Gustav: "......"