Chapter 301 From today onwards, all of our company's procedures will be changed to the Hongmeng system

Jiang Fan found a computer, and then asked Tang Siyu to call the others out.

Although Tang Siyu didn't understand what method Jiang Fan had to deal with this matter, he still followed what he said, and asked the others to put down their work and go to rest for an hour first.

When everyone heard the general manager's words, they were also very puzzled, knowing that their company was attacked by hackers now, so let them leave at this time。。。。。

However, at this time, the leader's plan, no matter what they do, they have to leave the program department.

After they all left, Tang Siyu came to Jiang Fan's side and wondered, "Jiang Fan, do you have a way?"

"Not bad. ”

Jiang Fan nodded, took out the USB flash drive, plugged it into the computer, and directly on the screen, a box appeared, Jiang Fan tapped on the keyboard and entered the password.

After opening it, Jiang Fan continued to type on the keyboard, and a series of codes appeared on the computer screen.

Looking at these codes, Tang Siyu frowned, some of these codes, she still knows a little, but more is still not enough to understand.

However, it can also be seen that Jiang Fan is very away.

Tang Siyu went to the water dispenser, took a paper cup, and got a glass of water for Jiang Fan.

Jiang Fan looked at the code on the computer screen seriously, he mastered the top hacking technology, so he could naturally understand this.

A few minutes later, Jiang Fan knocked the enter key, let go of his finger, and said with a slight smile: "Okay." ”

"That's it?"

Tang Siyu looked at the computer screen, there was a small box rotating, very surprised.

That's too fast, isn't it?

"Siyu, from today onwards, our company officially launched the Hongmeng system, Hongmeng system, as long as it is used, even if it is me, it is difficult to crack. ”

"The program is exactly the same as the one we used in our previous company. ”

"Okay, listen to you. ”

"Next, I'm ready to deal with the so-called hackers. ”

Jiang Fan shook his head, and his fingers continued to be on the keyboard, tapping quickly.

In addition to attacking the hacker, he also plans to get a virus.

A computer virus is a set of computer instructions or program code that can be self-replicated and self-replicating that is inserted into a computer program by the compiler to destroy computer functions or data, affect the use of the computer, and can be self-replicated.

Computer viruses are transmissible, hidden, infectious, latent, excitable, expressive, or destructive. Life Cycle of a Computer Virus:

The development period → infectious period→ incubation period→ attack period→ discovery period→ digestive period→ extinction period.

Unlike "viruses" in medicine, computer viruses are not naturally occurring, but are a set of instructions or program code that some people have compiled to take advantage of the inherent vulnerabilities of computer software and hardware.

It can be latent in the computer's storage medium (or program) in some way, and when certain conditions are reached, it will be activated, and it will be put into other programs by modifying the exact copy of itself or the form that may evolve into other programs.

The so-called virus is caused by man-made and is very harmful to other users.

Computer viruses first appeared in the 70s David Gerrold sci-fi... wasOne.

The earliest scientific definition appeared in 1983.

FredCohe's Ph.D. thesis "Computer Virus Experiments" "A Computer Program That Can Inject Itself (or Evolved) into Other Programs" Boot Zone Virus.

Macro viruses and script viruses are the same concept, and the propagation mechanism is similar to that of biological viruses.

(1) Computer viruses are a new derivative form of computer crime

Computer viruses are high-tech crimes, which are instantaneous, dynamic and random. It is not easy to obtain evidence, and the risk is small and the damage is large, which stimulates criminal awareness and criminal activities. It is the manifestation of some people's mischief and revenge mentality in the field of computer applications;

(2) The vulnerability of computer software and hardware products is the fundamental technical reason

Computers are electronic products. Data is easy to enter, tamper, lose, falsify and destroy data from input, storage, processing, and output, and programs are easy to be deleted and rewritten.

The manual way of computer software design is inefficient and the production cycle is long; people have not been able to know in advance whether a program has errors, and can only find and modify errors in operation, and do not know how many errors and defects are still hidden in it.

These vulnerabilities facilitate the invasion of the virus.

Computer viruses are not only destructive in themselves, but also contagious, and once the virus is replicated or varied, it is difficult to prevent it.

Infectivity is a fundamental characteristic of viruses, and in the biological world, viruses spread from one organism to another through infection.

Under the right conditions, it can multiply in large numbers and cause infected organisms to show illness or even death.

Similarly, computer viruses can spread from infected computers to uninfected computers through various channels, causing infected computers to malfunction or even paralyze in some cases.

Different from biological viruses, a computer virus is a piece of artificially programmed computer program code, once this program code enters the computer and can be executed, it will search for other programs or storage media that meet its infection conditions, determine the target, and then insert its own code into it to achieve the purpose of self-reproduction.

As long as a computer is infected with a virus, if it is not dealt with in time, the virus will spread rapidly on the computer, and the computer virus can infect other computers through various possible channels, such as floppy disks and computer networks.

When you find a virus on a machine, it is often the floppy disk that you used on that computer that is infected with the virus, and other computers connected to the machine may also be infected with the virus.

Whether a program is infectious or not is the most important condition for determining whether a program is a computer virus or not.

Since they dared to attack their company's program, it was impossible for Jiang Fan to watch it like this, so naturally he had to repay him well.

Soon, Jiang Fan wrote a virus, as long as this virus is used, if the company program connected to his subordinates, it will also collapse directly, and there is no way to recover.

Moreover, the virus written by Jiang Fan cannot be traced by any person or department.

More than ten minutes later, Jiang Fan finished writing, found the location of the last computer used by the hacker, connected the route of his attack, and Jiang Fan sent the virus over.

"Godfather, no, I don't know what means were used over there, so I can't invade. Xiaohua looked at Wu Junming, shook her head and said.

"Oh, you're a hacker, and there's something you can't hack into?" Wu Junming didn't frown when he heard this.

The two were discussing, and at this moment, the computer suddenly emitted white smoke and made a rattling sound, and then all the electronic devices in the villa were also scrapped at this time.