09 Start of Anti-Virus (M)

09 Start of Anti-Virus (M)

Left Zhang Zhen's mental health clinic.

Later, Zhang Zhen helped his classmate book a ticket back to the capital online, but he found that the online booking platform of a domestic flight company they commonly used could not open.

Zhang Zhen smiled and said, "Could it be that the server computer of this airline company has also been infected with a virus like your computer, right?" ”

The classmate shook his head with a wry smile, how could he know about such a thing.

In desperation, the two of them could only choose to book a ticket back to the capital on another flight company and online ticketing platform.

In fact, Zhang Zhen was really right by his crow's mouth this time.

They just visited the online ticketing platform of China's 'Huaxia Northern Airlines Co., Ltd.'.

At this time, the central computer room of the server data center of Huaxia Northern Airlines Co., Ltd. was indeed in a passive state of paralysis.

As a result, most of the online websites of Huaxia Northern Airlines Co., Ltd. have collapsed.

And that's not all, what's worse is that all the files and data on the computer are maliciously locked.

As a result, all users who have booked tickets online are likely to be unable to link the data to the computer at the airport when they pick up their tickets at the airport.

It will delay the user's boarding time.

"Damn, can't you crack it quickly?"

The general person in charge of the web data center of Huaxia Northern Airlines Co., Ltd. shouted at his subordinate 'technical director'.

Let the other party retort weakly, "This is a man-made malicious virus infection, when I found out that the spread of virus files will use the company's internal LAN channel, I cut off the port channel in time." ”

"Moreover, this virus is a malicious encryption of computer files, and the virus can only be solved by obtaining the corresponding key of the file, which can be said to be a virus file that takes advantage of the encryption security of the computer system......

According to the words of the technical director with an annual salary of one million, there is no way to solve it, you see who to find to get it, who to find to get it, and they can't do anything about it.

The person in charge was so angry that he wanted to scold his mother, but the person under his command was the technical director, so he had to be so straightforward when he spoke for the company.

"If you can't get it, don't waste your time here, hurry up and pay that money for a total of three hundred dollars?"

Obviously, the person in charge also saw the ransom message from the virus file, and he could only pay the ransom of $300 when there was nothing anyone under his command could do.

All in all, as long as this matter is resolved in the shortest possible time, it is best not to be known to the people at the headquarters during this period.

Even if they knew, then they had to deal with it as soon as possible.

"It's not just a matter of $300, it's a computer server that has to pay a $300 ransom."

Looking at the person in charge in a state of irritability, the technician couldn't help but remind.

"What do you mean?"

"Because the virus files are encrypted with the core files of the computer, so that the computer server is shocked, but each computer host corresponds to a different key, which means that it is impossible to pay 300 dollars to eliminate all the computer viruses in the entire data center."

The technician went on to say that "it can only be one server, which corresponds to the price of a $300 ransom." ”

"Shhh The chief executive gasped.

In short, all computers in the world, including computers, are divided into several basic types: microcomputers, minicomputers, medium-sized computers, mainframes, giant computers, and supercomputers.

Giant: Executes the orders of millions of users at the same time, generally used in the National Information Center (E.G CCTV), defense, military.

Large: Executes the instructions of tens of thousands of users at the same time, and generally the servers of larger websites fall into this category.

Small: Executes hundreds of users' instructions simultaneously, general school, SME/office web server.

Micro: generally a single user, can also execute the instructions of several users, PC/notebook/workstation.

As for more powerful supercomputers, for example, the world's first and second largest supercomputers are all independently developed by China.

Their simultaneous executions are in the hundreds of millions.

Supercomputer countries like this are mainly used for astronomical exploration and satellite control, as well as data communication transmission, among others......

The price of a small computer is millions of RMB, the price of a medium-sized machine multiplied by ten times, the price of a mainframe machine is ten times the price, and the supercomputer and the giant computer are multiplied by ten times the price of each other.

Enterprise companies simply can't afford to use supercomputers and supercomputers independently.

Therefore, the general domestic large enterprises are medium-sized computers as the central general control center, and then there are hundreds of small computers or tens of thousands of micro computers, connected together to coordinate the work.

Similar to Huaxia Northern Airlines Co., Ltd., it could not afford to buy and use supercomputers on its own, so it built a 'data center building'.

It can also be said to be a data station.

For a civil aviation company, using a giant machine or supercomputer is a luxury and a waste.

The so-called data center building is just an ordinary high-rise building on the outside, but what is housed inside is nearly 10,000 data processing computer servers.

China Southern Airlines Co., Ltd., in this data center building in Hebei, has a medium-sized machine that is the central main computer.

5,000 microcomputer servers are installed throughout the building for data processing and coordination.

Then some people may ask, how is it possible for 5,000 computers to achieve coordinated data processing and distribution.

This has to be mentioned that an international Internet tycoon-level company in the United States is Google.

Google has developed a set of open-source data coordination and synchronization software, which can easily link several computers to increase efficiency.

In short, a hundred computers can not do the core work of the minicomputer, but they can definitely complete the basic tasks that the minicomputer can do.

And now that the entire data center is infected by the virus, it is equivalent to more than 5,000 computers having to pay a ransom.

The amount of $300 for a unit is $150,000 when multiplied.

Converted into RMB, it is more than one million.

The person in charge felt his scalp tingle.

Originally, I just thought it was only three hundred dollars, so I made up the money and paid it, so don't go to the headquarters.

Now, if you need to pay a ransom of more than one million, then you must report to the headquarters as soon as possible.

Which person in charge gritted his teeth, and finally glanced at the technical director hatefully, he always thought that with this group of technicians, he would be very leisurely when he came here to be in charge of the management position.

But I didn't expect that there was really a big problem, and they would have something that they couldn't solve.

When the time comes, if he reports this matter to the headquarters, what will the headquarters think of him who has entrusted him with a heavy responsibility?

The technical director also felt very embarrassed that this kind of computer virus terror that used the security encryption of the computer system could not be solved not only by them, but also by many people in China.

It's not that they don't have enough power.

Rather, the computer's encrypted file system itself is an unsolvable protection measure, and it can only be opened unless you get a unique key.

This makes them unable to break the computer's built-in protection system even if they have great ability.