Super Mothership

Chapter 452: Electronic Warfare Harassment

Gustav ’s flagship was rear-ended, looking at the damage, and could only be towed with the Hive to the spaceport dock in the rear for repair.

However, he no longer cares about his distressed ship, thinking that he has caught the flaw of the spy. Gustav immediately organized the technical force to use all his strength, targeting the Hive, and began to reverse the virus and electronic attacks. .

But the development of the next thing is far beyond Gustav's expectations ...

"Report to your commander! Just now, our fleet was once again attacked by hackers. At the same time, a large-scale electronic virus paralysis attack broke out, and bomb viruses were found on dozens of battleships!" The deputy hurriedly Xiang Gu Stafford reported.

"What ?! Dozens?" Gustav was startled.

A rear-end collision almost paralyzed two warships. If dozens of warships were involved in the accident at the same time, the commander himself would basically streak.

"How is the loss?" He asked hurriedly.

When the losses of the following warships were reported, the adjutant suddenly looked strange.

"Uh ... Generally speaking, the loss is not big. After the rear-end incident of the Hive, we have immediately ordered everyone to pay attention to the enemy's electronic intrusion. At present, all attacks are blocked from the core firewall of Zhinao. "

Gustav breathed a sigh of relief, but the adjutant went on to say, "Although the core functional modules of Wisdom are not subject to electronic intrusion, the other party is very cunningly bypassing our key arming area and specializing in some peripheral functions. The module started, so, uh ... caused some confusion ... "

...

The hive was unexpectedly coded and beat Gemini by surprise, but when the Gemini was prepared, the two sides were completely hard-powered.

In electronic warfare, it can be roughly divided into red and blue domains. Red domain represents intrusion, including electronic viruses, infiltration, compilation, decompilation, etc. It is the domain of hackers we are familiar with!

The blue domain is the opposite. Firewall technology, anti-virus software technology, tracking and anti-tracking, vulnerability research, etc., this is the field of network security experts.

As a newly born intelligent life, the codename has unparalleled talent in the field of hacking.

If the two sides of the electronic warfare are likened to martial arts masters, then there are three factors to measure their force value: "internal force", "stroke", "equipment"!

The internal force is strong and the moves are exquisite. If you add the Heaven Sword Dragon Slaughter, then it is the best standard template in the world.

The computing power of the two sides is equivalent to the "internal power" of the martial arts master. The stronger the computing power, the stronger the natural strength. Even if it exceeds a certain level, it will be able to drop ten times!

In this regard, as the large-scale supercomputing center of the moon, backed by the codename of the huge computing resources of the machine worm, it has far surpassed the shipborne intelligent brain only as a combat auxiliary.

The offensive and defensive skills of the two sides can be compared to various martial arts "techniques". The tricks are exquisite. Naturally, they can use four or two pounds to find the defensive loopholes of the other party, and they will kill in one blow!

For the codename that introduced the Gemini encoding method and just upgraded the system, she is like a virtual bamboo that has just gained a hundred years of skill. Although it is powerful, it is completely a white in the move. This is also Nie Yun ’s desire to make the codename in One of the reasons for stealing divisions from each other in electronic warfare to enhance the ability of hackers.

The learning ability brought by wisdom allows the code to adapt to the situation and the moves are flexible. In contrast, the Gemini wisdom brain can only use step-by-step dead tricks. There is a world-wide difference in talent between the two.

Intelligent life is a sprite born in the code, driving the code is like eating and drinking, is an innate talent! As long as you give the code some time to study, the gap between the two sides will only increase.

Of course, the potential of the codename is quite huge, but the hacker experience in the Gemini network is insufficient after all. In order to avoid being faced with Ko from the beginning, the codename chose the same method as the virtual bamboo at the time, that is, a remote attack-lost hidden weapon!

Gemini Zhinao has an advantage at home, and has a defensive copper wall and iron wall—firewall! But the codename also created a thunderous hidden weapon-"bomb virus"!

Firewalls and viruses are a type of "equipment" and belong to a preset program that enhances one's own electronic warfare capabilities.

The virus developed by the code name also incorporates the ideas and technology of artificial intelligence, giving the virus the strongest ability in the later period ... Evolution!

It can hybridize, mutate, and exchange information with its own homologous mutant viruses, thereby further perfecting its own programs and making itself more concealed and more destructive.

This virus is like a chronic poison. The longer the latency time, the deeper the poisoning!

In addition, this bomb virus can use the surrounding data to disguise and mutate itself, like a chameleon, so it is extremely difficult to be found by antivirus software. Even if it is found, if there is no specific activation method, it means that the bomb disassembly fails, and the other party will talk about it. Do not explode immediately!

The communication process between the two sides is probably like this ...

Anti-virus software: "Haha! I found you"

Bomb virus: "Password?"

antivirus software:"???"

"boom!"

...

This self-exploding virus undoubtedly caused considerable difficulty in the anti-tracking of Gemini.

Taken together, "internal force", "stroke", and "equipment", the code name and the other party are half a catty, each with its own advantages.

The small test of the Beehive from the Beehive shows that the codename has the ability to pose a threat to the Gemini shipborne wisdom brain, but this time the mission of the codename is to harass and distract Gemini ’s attention, so she did not make too fierce confrontation. action.

What she did was just to bypass the main defense area of ​​the other party's firewall, and then guide the latent virus to carry out targeted blasting at key locations!

It should be known that every explosion of this bomb virus means that a large piece of stored data around it is exploded into a pile of garbled characters, and the lost data is also likely to cause the control of the local terminal to be disordered.

For example, the automatic maintenance system of ship-borne drones on the Hive, due to the large amount of data lost due to virus bombs, has led to the drastic maintenance of unmanned drones that are clearly not needed for maintenance, but the unmanned drones are ignored.

Another example is the failure of the automatic storage system, the occurrence of repeated storage, which led to the collision of two drones and damaged the Oolong incident.

What is even more troublesome is the access control system on the battleship. Just now, when a female officer on a battleship took a bath in the public bathroom, the automatic door suddenly opened, directly leaving the two male officers who passed by dumbfounded.

This sudden welfare has also been staged in many places, causing screaming and whistling everywhere ...

Not only the entrance guard, but also the various lights above the head fell into a carnival. The studio, which was supposed to be a serious military theme, jumped directly to the scene of the Happy Carnival.

All the unpredictable Hai nationality officers looked at the various automatic doors and gorgeous stage lights around them, and they only looked at each other with blank faces ...

Although these attacks on peripheral functional modules could not cause any substantial damage to the warship, such shameless harassment caused great trouble to the daily work of the warship. The warships interfered by the virus almost fell into management chaos, and they were completely Use chicken flying dog to describe!

...

After listening to various reports, Gustav could no longer look dark.

provocative! This is naked provocation!

Although the other party has not launched a substantial military operation, he is hitting his face in this way!

"Can't we just watch the other party spreading wildly on our heads like this ?!" Gustav said coldly.

"Your Excellency! Sandbox analysis of the virus is in progress, but we still need some time ..." The adjutant wiped the cold sweat on his forehead.

"Has the source of the hacking attack been found? Are the technical departments all having a meal?" Gustav's anger was more intense.

"The other party's hacker used a terminal infected by the virus to arm it. We can't find his exact location in a short time, but what is certain is that the source of the attack is in our internal network!" Said the deputy official.

Gustav bowed his head for a long time, and wanted to seize the spy's urgency to let him completely put aside his personal honor and disgrace, he finally sullenly said, "Bring me Isaal, I request network support ! "

Compared with the Hai nationality, the electronic technology of the Yu nationality is even better, but it is less than a last resort. Gustav is definitely not willing to bow his head to ask for help.

"Uh ... this, after the Yu people just received the news, they were worried that they were also infected by the virus. Not long ago, they just disconnected most of our network data connections. I want to contact His Excellency, currently only available Your private communication authority. "The adjutant smiled.

Gustav: "..."