Super Mothership

Chapter 452 Electronic warfare harassment

Gustav's flagship was tragically rear-ended, and depending on the damage, it could only be towed to the rear spaceport dock for repairs along with the Hive.

However, he no longer cares about his own ship, and thinks he has caught the spy's flaw. Gustav immediately organized the technical force to use all his strength, targeting the Hive, and began to reverse the tracking of viruses and electronic attacks. .

But what happened next far exceeded Gustav's expectations...

"Report to Your Excellency Commander! Just now, our fleet was attacked by hackers again. At the same time, a large-scale electronic virus paralysis attack broke out inside. Bomb viruses have been found on dozens of warships!" Staffordshire reports.

"What?! Dozens of ships?" Gustav was startled.

A rear-end collision almost paralyzed two warships. If dozens of warships had an accident at the same time, the commander himself would basically run naked.

"How's the loss?" he asked hastily.

When the loss of the battleships below was reported, the adjutant suddenly looked a little strange.

"Uh... Generally speaking, the loss is not big. After the Hive rear-end incident, we have immediately ordered everyone to pay attention to the enemy's electronic intrusion. At present, all attacks are blocked from the core firewall of Zhinao. "

Gustav breathed a sigh of relief, but the adjutant continued, "Although the core functional modules of the brain were not electronically invaded, the other party slyly bypassed our key defense areas and selected some peripheral functions. Modules started, so, uh… caused some confusion…”

...

The code name on the Hive was unexpected, and Gemini was caught off guard, but when Gemini was prepared, the two sides were completely in a competition of hard power.

In electronic warfare, it can be roughly divided into two fields: red and blue. The red field represents intrusion, including electronic viruses, penetration, compilation, decompilation, etc. It is the field of hackers that we are familiar with!

The blue domain is the complete opposite, firewall technology, anti-virus software technology, tracking and anti-tracking, vulnerability research, etc., this is the field of network security experts.

As a newly born intelligent life, the code name has an unparalleled talent in the field of hacking.

If the two sides of electronic warfare are compared to martial arts masters, then there are three factors to measure their force value: "internal strength", "movement", and "equipment"!

strong inner strength,

The moves are exquisite. If you add the Heavenly Sword and Dragon Saber, it will be the standard template of the number one in the world.

The computing power of both sides is equivalent to the "internal power" of martial arts masters.

In this regard, as a large-scale supercomputing center on the moon, the code name of the huge mechanical worm computing resources backing has far surpassed the shipboard intelligence that is only used as a combat aid.

The offensive and defensive skills of both sides can be compared to various martial arts "movements". The moves are exquisite, and they can naturally move a thousand pounds. If you find the opponent's defense loopholes, you can kill with one strike!

As for the code name of the system that has just been upgraded with the introduction of the Gemini coding method, she is like a virtual bamboo who has just acquired a hundred years of skill. Although she is powerful, she is completely a noob in terms of moves. This is why Nie Yun wants the code name to be in One of the reasons for stealing from the other side in electronic warfare and enhancing hacking capabilities.

The learning ability brought by wisdom allows the code name to be adaptable and flexible in moves. In contrast, Gemini Zhinao can only use deadly moves step by step, and there is a huge gap in talent between the two.

Intelligent life is an elves born in code. Driving the code is like eating and drinking water. It is an innate talent! As long as the codenames are given some learning time, the gap between the two sides will only grow wider.

Of course, although the potential of the code name is quite huge, the hacker experience in the Gemini network is not enough. hidden weapon!

The Gemini Brain has the home field advantage, and there is a fortified copper wall and an iron wall - the firewall! But the code name also produced a hidden weapon that bombarded the sky - "bomb virus"!

Firewalls and viruses are a kind of "equipment" and are a preset program to enhance one's own electronic warfare capabilities.

The code-named virus also integrates the ideas and technologies of artificial intelligence, giving the virus the strongest late-stage ability... evolution!

It can hybridize, mutate, and exchange information with its own homologous mutant virus, thereby further improving its own programs, making itself more hidden and more destructive.

This virus is like a chronic poison, the longer the incubation time, the deeper the poisoning!

In addition, this bomb virus can use the surrounding data to camouflage and mutate itself, like a chameleon, so it is extremely difficult to be discovered by anti-virus software. Not to mention blew up immediately!

The communication process between the two parties is probably like this...

Antivirus software: "Haha! I found you"

Bomb Virus: "Password?"

antivirus software:"???"

"boom!"

...

This kind of virus that blew itself up without a word has undoubtedly brought considerable difficulty to Gemini's anti-tracking.

"Internal strength", "movements", and "equipment" are considered together, and the code name is half a catty with the opponent, and each has its own advantages.

From the Beehive's little test, it shows that the code name has the ability to pose a threat to the Gemini ship's intelligence, but the task of this code name is to harass and distract Gemini, so she did not make too fierce confrontation action.

All she did was to bypass the main defense area of ​​the other party's firewall, and then guide the latent virus to carry out fixed-point blasting at key locations!

You must know that every time this bomb virus explodes, it means that a large area of ​​storage data around is bombed into a pile of garbled codes, and the lost data can easily cause the control of local terminals to be disordered.

For example, the automatic maintenance system of the carrier-based drones on the Hive has lost a lot of data due to virus bombs. As a result, the drones that obviously do not need maintenance are repaired, while the faulty drones are ignored.

Another example is the failure of the automatic storage system, and there was an oolong incident in which two drones collided and damaged due to repeated warehouse loading.

What is even more troublesome is the access control system on the warship. Just now, when a female officer on a warship was taking a shower in the public bathroom, the automatic door suddenly opened, directly stunned by the two male officers who happened to pass by.

This sudden benefit is still being staged in many places, causing screams and whistles to fly everywhere...

Not only the access control, but also all kinds of lights above the head were caught in a carnival. It should have been a serious military theme studio, and jumped directly to the scene of the happy carnival.

All the officers of the sea tribe who were caught off guard looked at the various automatic doors and the gorgeous stage lights that were constantly opening and closing all around, and could only stare at each other blankly...

Although these attacks on peripheral functional modules cannot cause any substantial damage to the warship, such shameless harassment has caused great trouble to the daily work of the warship. The warship disturbed by the virus has almost fallen into management chaos. Describe it with chickens flying dogs!

...

Gustav's face was already black after listening to various reports.

provocative! This is blatant provocation!

Although the other party did not launch any substantive military action, they were hitting him in the face in this way!

"Can't we just watch each other run wild on us?!" Gustav said coldly.

"Your Excellency! The sandbox analysis of the virus is in progress, but we still need some time..." The adjutant wiped the cold sweat from his forehead.

"Has the source of the hacking attack been found? Are the technical departments all for free?" Gustav was even more furious.

"The other party's hacker used the virus-infected terminal to deploy layer by layer. In a short period of time, we could not find out his exact location, but we can be sure that the source of the attack is in our internal network!" the adjutant said.

Gustav lowered his head and pondered for a long time, the eagerness to catch the spy made him completely put aside his personal honor and disgrace, he finally said with a dark face, "Pick up Isael for me, I will ask for technical support from the Internet. !"

Compared with the sea clan, the electronic technology of the feather clan is even higher, but Gustav is absolutely reluctant to lower his head and ask Ishaer for help unless it is a last resort.

"Uh... this, after the feathers just received the news, they were worried that they were also infected by the virus. They just disconnected most of our network data connections not long ago. If you want to contact Your Excellency Isha, you can only use the Your private communication rights." The adjutant smiled dryly.

Gustav: "..."

( = )

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like