Super Weapon Exchange System

Chapter 2944: 108 bytes

Any bing virus has its appearance. For example, many bing viruses can infect folders and turn the folder into an exe executable file. When you double-click the folder, it will not open the folder, but will Trigger the operation of bing poison.

Now, he opened the attachment, but there is no response to the attachment. Maybe this is a prank, and there is nothing wrong with this attachment. It is also possible that this attachment is bing!

Bing is poisonous, what should I do?

If it is an ordinary person, the best way is to shut down the computer immediately, take off the hard disk, and hang it on another computer to use anti-virus software to kill the virus. However, if it is a new bing virus, the bing virus library of the anti-virus software does not have this The signature database of the bing virus cannot be killed at all. Moreover, they are the world's top computer system experts. How could they be frightened by a small bing virus?

When they find that there is a bing virus, they naturally have to study the damage the bing virus will bring to the computer system for the first time, to see if their system startup add-ons, whether more startup options are artificially added, and some Whether the file name has been modified, etc.

Gates is looking for it seriously, as long as he finds what the other party has done, it can be solved.

However, he didn’t find anything. His computer didn’t seem to have been damaged in any way, so Gates could only pick up the phone: "Hey, Robert, the email you just sent to me. What is it?"

"Send an email to you? No." Robert said strangely, "No."

No? Is this email sent automatically? Gates immediately understood: "Attention, everyone in the entire company must be careful not to open any emails or click on the attachments of the emails! There is a bing virus that we have not seen before, which is spreading in our computer network!"

If the bing virus was originally sent to Gates, it may be able to avoid this large-scale spread, but it is not the case now. Gates is not the first recipient. Many people in the company see colleagues send The incoming mail was naturally opened without any doubt. When it was opened, it was found that there was nothing but thought that the mail was a prank, or the mail was sent incorrectly, and the incoming attachment was not a program that could run. Don't pay much attention to it, continue to do your own work.

After all, they didn't find that their computer was infected with bing. After a computer was infected with bing, at least it should show that the system slowed down, right? Or the file is damaged or something, but now, there is no problem with their computer, so they continue to work naturally. They don’t know that their computer has not only become a victim, but also in their own name, give more Many friends send emails, as long as they have been sent before, the bing virus will continue to be sent out. Now, with the headquarters of Microsoft as the source, the entire bing virus has begun to spread to all computers equipped with Microsoft operating systems. , The speed is quite fast.

When Gates issued this warning, everyone was stunned. They have been poisoned by bing? Didn't find it?

My computer has not been affected in any way.

"Everyone, immediately put down their existing work and look for the traces of this bing virus, and we must find it out of our computer system!" Gates said.

He is aware of the recent cyber attack on Hanxin Technology, and now, is this bing virus a means of revenge? However, if the other party retaliates, how do you retaliate? What are the characteristics of this bing virus?

What is it going to destroy?

Nobody knows.

A whole day has passed, and a night has passed. Everyone is red-eyed. The people in Microsoft are also the best in computer programs. Now they are analyzing the entire computer system. , To find out the infected place.

However, they got nothing.

Time is still passing.

When everyone couldn't hold on to it, and even thought that Gates had made a fuss, a small prank, or even a purely meaningless act, it was Gates who discovered something himself.

"look here."

Gates was carefully comparing all the files inside the computer. When he found the WIN32 file, he found that the file was wrong.

"what happened?"

No one found any problems.

"This file is 108 bytes longer than our normal file!" Gates said.

The size of each file is determined, and now, as the writer of the system, this file has 108 bytes more, he can see it.

But Robert on the side was a bit disapproving: "Now, our hard disk is easily a few GB, these few bytes, it will not take up much space, if it can be on such a small byte, we can create a bing Poison, then I really admire them."

Robert doesn't think it is so useful. No matter how smart a programmer writes a bing virus, it cannot be less than 500 bytes. That is already a very clever technique. Now, 108 bytes can produce a bing virus?

Impossible, of course impossible.

"What if this is just a fragment? The other party divides a bing virus that exceeds 500 bytes into several segments and hides them in our system files?" Gates said.

In addition to destroying computer bing, it can also be hidden. How to hide yourself is a technical task. The most common way of using hidden folders is low-level. Advanced methods are naturally hidden in system files. After all, under normal circumstances, no one pays attention to system files. For them, that bunch of bad files are just useless.

Fragment? Divide into several paragraphs?

"Find and compare all files!"

Sure enough, when they acted, they finally got a reward. On their files, they saw that a piece of code was added, each of which was 108 bytes!

108, does this make any sense?

Nobody knows.

When they found paragraph 8, paragraph 9, and even after paragraph 10, it meant that a 1080-byte bing virus appeared before their eyes.

"It's too hidden, it's hard to find." Robert murmured: "However, it is in the hidden stage now? No damage to our computer system has been found for the time being. We only need to design a patch to put these Clear the program segment, that's it."

The computer bing virus does not necessarily occur immediately, or it may be hidden. If it is not for Gates' high alertness, it may be that his computer received an e-mail and could not open the attachment, and would give up, and would not pay attention to the computer at all. It has been poisoned, and it is so concealed. It may happen at a fixed time in the future, and people will be caught. I don't know why.

Is this the case now?

If this is the case, they still have time to remedy the situation and quickly patch the system.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like