Chapter 453

Gustav's flagship suffered a rear end collision. Depending on the damage, it could only be towed to the rear spaceport dock with the honeycomb for repair.

However, he did not care about his ship and thought he had caught the flaw of the spy. Gustav immediately organized technical forces to use all forces to target the honeycomb and began to track back the virus and electronic attacks.

But the next thing happened, but it was far beyond Gustav's expectation

"Report, commander! Just now, our fleet was attacked by hackers again. At the same time, a large-scale electronic virus paralysis attack broke out, and bomb viruses were found on dozens of warships!" the adjutant hurriedly reported to Gustav.

"What?! dozens?" gustavton was startled.

One rear end collision almost paralyzed two warships. If dozens of warships had an accident at the same time, his commander would basically run naked.

"What about the loss?" he asked hurriedly.

When the losses of the following warships were reported, the adjutant suddenly looked strange.

"Er... On the whole, the loss is not big. After the honeycomb rear end collision, we have immediately ordered everyone to pay attention to the enemy's electronic intrusion. At present, all attacks are blocked outside the core firewall of smart brain."

Gustav was relieved when he heard the speech, but the adjutant continued, "although the core functional modules of smart brain were not invaded by electronics, the other party cunningly bypassed our key deployment areas and chose some peripheral functional modules, so, er... Caused some confusion..."

……

The code on the beehive took Gemini by surprise, but when Gemini was ready, the two sides were completely competing for hard power.

In electronic warfare, it can be roughly divided into two fields: red and blue. The red field represents intrusion, including electronic virus, penetration, compilation, decompilation, etc. it is the field of hackers we are familiar with!

The blue domain is completely opposite. Firewall technology, anti-virus software technology, tracking and anti tracking, vulnerability research and so on are the fields of network security experts.

As a newly born intelligent life, code has unparalleled talent in the field of hacker intrusion.

If the two sides of electronic warfare are compared to Wulin experts, there are three factors to measure their force value: "internal power", "moves" and "equipment"!

It has strong internal power and exquisite moves. If you add the heaven reliant sword and dragon slaying knife, it is the first standard template in the world.

The computing power of both sides is equivalent to the "internal power" of Wulin experts. The stronger the computing power is, the stronger the strength is naturally. Even if it exceeds a certain degree, it can be reduced by ten times!

In this regard, as a large Supercomputing Center on the moon, the code name relying on huge mechanical insect computing resources has far exceeded the shipborne intelligent brain only as a combat aid.

The offensive and defensive skills of both sides can be compared with various martial arts "moves". The moves are exquisite. Naturally, they can pull a thousand pounds in four or two, find the other party's defensive loopholes, and kill with one blow!

For the code that has just upgraded the system after introducing the Gemini coding method, she is like a bamboo that has just obtained 100 years of skill. Although she is powerful, she is completely a little white in her moves. This is also one of the reasons why Nie Yun wants the code to steal from each other in electronic warfare and enhance her hacker ability.

The learning ability brought by wisdom enables the code to be flexible and move flexibly. In contrast, the Gemini smart brain can only use dead moves step by step. There is a world-wide gap in talent between the two.

Intelligent life is an elf born in the code. Driving the code is like eating and drinking water. It is an innate talent! As long as you give code some learning time, the gap between the two sides will only become larger and larger.

Of course, although the potential of the code is quite huge, the hacker experience in the Gemini network is insufficient after all. In order to avoid being directly Ko at the beginning, the code chose the same method as the false bamboo at that time, that is, long-range attack - throwing concealed weapons!

Gemini smart brain occupies the home advantage and has a heavily defended iron wall - firewall! But the code also created a thunderous concealed weapon - "Bomb virus"!

Firewalls and viruses are a kind of "equipment", which belongs to a preset program to enhance one's own electronic warfare capability.

The virus developed by the code also integrates the ideas and technologies of artificial intelligence, giving the virus the strongest late ability... Evolution!

It can hybridize, mutate, and exchange information with its own homologous mutated virus, so as to further improve its own program and make itself more hidden and destructive.

This virus is like a chronic poison. The longer the latent time, the deeper the poisoning!

In addition, this bomb virus can use the surrounding data to disguise and mutate itself, just like a chameleon, so it is very difficult to be found by anti-virus software. Even if it is found, if there is no specific activation method, it means that the bomb removal fails, and the other party will explode immediately without saying a word!

The communication process between the two sides is probably like this

Antivirus software: "ha ha! I found you"

Bomb virus: "password?"

Antivirus software:

"Bang!"

……

This kind of virus that explodes in a word undoubtedly brings great difficulty to the anti tracking of Gemini.

From the perspective of "internal power", "moves" and "equipment", the code is half the weight of the other party, and each has its own advantages.

The trial of the beehive shows that the code has the ability to pose a threat to the Gemini carrier's intelligent brain. However, this code's task is to harass and distract Gemini's attention, so she did not make too fierce confrontation.

What she did was just to bypass the main defense area of the other party's firewall, and then guide the latent virus to conduct fixed-point blasting at a key position!

You know, every explosion of this bomb virus means that a large area of stored data around is blown into a pile of random code, and the lost data is also easy to cause the control disorder of local terminals.

For example, the automatic maintenance system of the carrier based UAV on the honeycomb caused a large amount of data loss due to the virus bomb, resulting in the tragic maintenance of the UAV that clearly did not need maintenance, while the faulty UAV was ignored.

Another example is the failure of the automatic storage system. There was an Oolong incident of repeated loading, resulting in the collision and damage of two UAVs.

What's more troublesome is the access control system on the warship. Just now, when a female officer on a warship was taking a bath in the public bathroom, the automatic door suddenly opened, which directly stunned the two male officers who happened to pass by.

This sudden welfare is still staged in many places, leading to screams and whistles everywhere

Not only the entrance guard, but also the lights overhead fell into a carnival. Originally, it was a film set with serious military themes, and jumped directly to the scene of the happy carnival.

All the Marine officers who were caught off guard looked at the constantly opening and closing automatic doors and gorgeous stage lights around, and could only look at each other blankly

Although these attacks on peripheral function modules can not cause any substantive damage to the warship, such shameless harassment has caused great trouble to the warship's daily work. The warship disturbed by the virus has almost fallen into management confusion, which can be described as chicken flying dog jumping!

……

Gustav's face was black after listening to the reports.

Provocation! This is a naked provocation!

Although the other party did not launch substantive military action, it was beating him in the face in this way!

"Can we only watch each other play wild on our heads?" Gustav said coldly.

"Sir! The sandbox analysis of the virus is in progress, but we still need some time..." the adjutant wiped the cold sweat on his forehead.

"Have you found the source of hacker attacks? Are the technical departments idle?" Gustav was even more angry.

"The other party's hacker used the virus infected terminal to deploy defense layer by layer. In a short time, we can't find his exact location, but it's certain that the attack source is in our internal network!" the Deputy official said.

Gustav bowed his head and pondered for a long time. The urgency of trying to catch the spy made him completely put aside his personal honor and disgrace. Finally, he said with a black face, "connect me with ISAR, and I ask for networking technical support!"

Compared with the sea family, the electronic technology of the Yu family is even higher, but Gustav is absolutely unwilling to bow his head to ISAR for help.

"Er... Well, after receiving the news, the feather nationality was worried that they were also infected by the virus. They just disconnected most of our network data connections not long ago. If they want to contact your excellency ISAR, they can only use your private communication permission at present." the adjutant laughed.

Gustav: "