Chapter 454
Chapter 454
Chapter 453 Electronic Warfare Harassment
Gustav’s flagship was rear-end tragically, and depending on the damage, it could only be towed with the Hive to the spaceport dock behind for repairs.
However, he could no longer care about his distressed own ship, thinking that he had caught the spy’s flaws, Gustav immediately organized the technology force to use all his forces to target the Honeycomb and began to backtrack the virus and electronic attacks.
But what happened next went far beyond Gustav’s expectations…
“Report your commander! Just now, our fleet was attacked by hackers again, and at the same time a large-scale electronic virus paralysis attack broke out inside, and bomb viruses were successively discovered on dozens of warships!” The adjutant hurriedly Xianggu Staff Report reports.
“What?! Dozens of ships?” Gustav was startled.
A rear-end collision almost paralyzed two warships. If dozens of warships were involved in an accident at the same time, the commander himself would basically have to run naked.
“How about the loss?” he asked hastily.
When the loss of the battleships below was reported, the adjutant looked a little strange.
“Uh… Generally speaking, the loss is not great. After the Hive rear-end incident, we have immediately ordered everyone to pay attention to the enemy’s electronic intrusion. At present, all attacks have been blocked by the core firewall of the brain. ”
Gustav was relieved when he heard the words, but the adjutant continued, “Although the core functional modules of the brain have not been electronically invaded, the other party has slyly bypassed our key defense areas and selected some peripheral functions. The module started, so, uh… caused some confusion…”
…
The code name on the Hive was unexpected and caught Gemini by surprise, but when Gemini was prepared, the two sides were completely hard-powered.
In electronic warfare, it can be roughly divided into two realms, red and blue. The red domain represents invasion, including electronic viruses, infiltration, compilation, decompilation, and so on. It is the Realm of hackers that we are familiar with!
The blue domain is the complete opposite, firewall technology, anti-virus software technology, tracking and anti-tracking, vulnerability research, etc. This is the Realm of network security experts.
As a newly born intelligent life, the code name has unparalleled talent in hacking Realm.
If the two sides of electronic warfare are compared to Martial Forest masters, then there are three factors that measure their strength: “Internal Energy”, “Strokes”, and “Equipment”!
Internal Energy is strong and sophisticated. If you add the Yitian Sword and Dragon Slaying Sword, it will be the best standard template in the world.
The computing power of both parties is equivalent to the “Internal Energy” of Martial Forest masters. The stronger the computing power, the stronger the strength will naturally be. Even beyond a certain level, it can be reduced for ten times!
In this regard, as a large-scale supercomputing center on the moon, the code name backed by huge mechanical bug computing resources has far surpassed the ship-borne brain that is only used as a combat aid.
The offensive and defensive skills of the two sides can be compared to various martial arts “movements”. They are exquisite, and they can naturally make a lot of effort to find the opponent’s defensive loopholes, and they can kill with one blow!
For the code name that introduced the Gemini coding method and just upgraded the system, she is now like a virtual bamboo who has just obtained a hundred years of skill. Although she is strong, she is completely a novice in the style of moves. This is also what Nie Yun wants to make the code name in Stealing teachers from the opponent in electronic warfare is one of the reasons for enhancing the ability of hackers.
The learning ability brought by wisdom allows the code name to be adaptable, and the moves are flexible. In contrast, Gemini Brain can only use death moves step by step. There is a huge difference in talent between the two.
Intelligent life is the genie born in the code, driving the code is like eating and drinking water, it is an innate talent! As long as the code names are given some time to learn, the gap between the two parties will only grow wider.
Of course, although the potential of the code name is quite huge, the hacker experience in the Gemini network is not enough after all. In order to avoid being KO in the first place, the code name chose the same method as the virtual bamboo at the time, that is, remote attack-lost. Hidden Weapons!
Gemini Brains have the home court advantage, with strong defenses—the firewall! But the code name also created the Hidden Weapons—”bomb virus”!
Firewalls and viruses are a type of “equipment”, and are a preset program that enhances one’s own electronic warfare capabilities.
The code-named virus also integrates the ideas and technology of artificial intelligence, giving the virus the strongest late stage ability…evolution!
It can be hybridized, upgraded, and can exchange information with the upgraded virus of the same origin, thereby further improving the own program, making itself more concealed and more destructive.
This virus is like a chronic poison. The longer the incubation time, the deeper the poisoning!
In addition, this bomb virus can use the surrounding data to disguise itself and upgrade, like a chameleon, so it is extremely difficult to be discovered by anti-virus software. Even if it is found, if there is no specific activation method, it means that the bomb has failed. Not to mention immediately blew up!
The communication process between the two parties is probably like this…
Antivirus software: “Haha! I found you”
Bomb virus: “Password?”
antivirus software:”???”
“boom!”
…
This kind of virus that explodes itself at a disagreement has undoubtedly brought considerable difficulty to the anti-tracking of Gemini.
From a comprehensive perspective of “Internal Energy”, “Strokes” and “Equipment”, the code name is equal to the opponent, and each has its own advantages.
From the sledgehammer test of the Hive, it shows that the codename has the ability to threaten Gemini’s ship-borne brains, but this time the task of the codename is to harass and distract Gemini, so she did not make too fierce confrontation. action.
What she did was just bypass the main defense area of the opponent’s firewall, and then guide the latent virus to carry out targeted blasting at key locations!
We must know that every time this bomb virus explodes, it means that a large area of stored data around it is blown into a pile of garbled codes, and the lost data can easily cause the control disorder of the local terminal.
For example, the automatic maintenance system of ship-borne drones on the Hive, due to virus bombs caused a large amount of data loss, resulting in unmanned aerial vehicles that clearly did not require maintenance, but failed drones were unattended.
Another example is the failure of the automatic storage system and the occurrence of repeated loading of the warehouse, resulting in the collision and damage of two drones.
What is even more troublesome is the access control system on the battleship. Just now, when a female officer on a battleship was taking a bath in the public bathroom, the automatic door suddenly opened, which directly stunned the two male officers who happened to pass by.
This sudden welfare is still performed in many places, causing screams and whistles everywhere…
Not only the access control, but the various lights above the head also fell into a carnival. It was supposed to be a serious military-themed studio, but directly jumped to the scene of the joyous carnival.
All the sea officers who were caught off guard looked at the various automatic doors and the brilliant stage lights that were constantly closing around, and they could only stare at each other blankly…
Although these attacks on peripheral function modules cannot cause any substantial damage to the warship, such shameless harassment has caused great troubles to the daily work of the warship. The warships that have been interfered by the virus have almost fallen into management chaos. Describe it with Ji Fei Gou Jump!
…
After listening to the reports, Gustav’s face was already dark and could not be darker.
provocative! This is a naked provocation!
Although the opponent did not launch a substantial military action, they were hitting him in the face in this way!
“Can we only watch the other side run wild on us like this?!” Gustav said coldly.
“Your Excellency! The sandbox analysis of the virus is in progress, but we still need some time…” The adjutant wiped cold sweat from his forehead.
“Have you found the source of the hacking? Do the technology departments eat idle meals?” Gustav became more angry.
“The other party’s hacker used a virus-infected terminal to deploy layers of defenses. In a short time, we could not find his exact location, but it is certain that the source of the attack is in our internal network!” the adjutant said.
Gustav lowered his head and thought for a long time. The eagerness to catch this spy made him completely abandon his personal honor and disgrace. He finally said with a black face, “Give me Ishar, I ask the Internet for technology support. !”
Compared with the Sea Clan, the Yu Clan’s electronic technology is even higher, but as a last resort, Gustav is absolutely unwilling to bow his head to ask Ishar for help.
“Uh… this, after receiving the news, the Yu clan was worried that they were also infected by the virus. Not long ago, they disconnected most of the network data connection with us. If you want to contact Your Excellency, I can only use it at the moment. Your private communication authority.” The adjutant smiled dryly.
Gustav: “…”
novelraw