Super Weapon Swap System

C2944 108 Bytes



C2944 108 Bytes

3Any kind of being-poison has a surface, for example, quite a bit of being-poison. It can infect the folder and turn it into an executable file for Exe. When attacking the folder twice, one would not open the folder. Instead, it would trigger the operation of the poison.    
2

    

Now, when he opened the attachment, there was no reaction from the attachment. It might be a prank, but this attachment was completely fine. It could also be that this attachment was Bing-Poison!    

    

With the poison, what should he do?    

    

If it was an ordinary person, the best way would be to immediately turn off the computer. Take off the hard drive, hang it on another computer and use anti-virus software to kill it. However, if it was a new type of virus, then the anti-virus software did not have a special database for this type of virus. It could not be killed at all. Moreover, they were the world's top computer system experts. How could they be scared by a small type of poison?    

    

When they discovered that there was a poison, they naturally had to first investigate what kind of damage this poison would cause to the computer system. See if their system started loading, and if there were more options to start the system. They wanted to see if some of the file names had been changed, and so on.    

    

Gates was seriously searching. As long as he found out what the other party had done, he would be able to solve the problem.    

    

However, he did not find anything. This computer of his... It seemed like it had not been damaged at all. Therefore, Gates could only pick up the phone." Hello, Robert, you just sent me an email. What's in it?"    

    

"Send it to you? No. " Robert said curiously, "No."    

    

No? Was this email automatically sent out? Gates immediately understood. "Attention, everyone in the company must be careful not to open any mail. Do not click on the email's attachment! There is a kind of poison that we have never seen before that is spreading on our computer network! "    

    

If this poison had been sent to Gates from the very beginning, perhaps this kind of large-scale dissemination would have been avoided. But it is not the case now. Gates is not the first one to receive it. Many people in the company saw the email sent by their colleagues. Naturally, they opened it without any doubt. When they opened it, they found nothing. They only thought that this email was a prank. Or perhaps this email was sent incorrectly. The attachment that came over was not a program that could be run. So, he didn't pay much attention to it and continued to do his own work.    

    

After all, they didn't realize that their computers were poisoned. After a computer was poisoned, it should at least show that the system was slowing down, right? Or perhaps the files were destroyed, but right now, there was no problem with their computers. Naturally, I will continue working. They do not know that my computer... Not only did it become a sacrifice, but it also took the risk of their own name... Send emails to more friends, as long as they have been sent before... This Bing-Toxin will continue to be sent out. Now, with Microsoft's headquarters as the source, the Bing-Toxin had started to spread to all the computers installed with Microsoft operating system at a very fast speed.    

    

When Gates sent out this warning, everyone was stunned. They had already been infected by the Bing-Poison? They did not notice?    

    

Their computers weren't affected at all.    

    

"Everyone, immediately put down the work in your hands and look for traces of this Bing-poison. You must find it from our computer system!" Gates said.    

    

He was very clear about the recent cyber attacks against Han Chip Technology Company. And now, was this poison the other party's revenge? However, if it was the other party's revenge, then how was he going to exact revenge? What were the characteristics of this poison?    

    

What was it trying to destroy?    

    

No one knew.    

    

A whole day had passed, and another night had passed. Everyone's eyes were red. They were from Microsoft. They were all the best in the computer program. Now, they were analyzing the entire computer system to find out where they were infected.    

    

But they didn't get anything.    

    

Time was still passing.    

    

When everyone could not hold on any longer and even thought that Gates was making a big deal out of nothing, a small prank, or even a meaningless move, it was Gates himself who discovered something.    

    

"Look here."    

    

Gates carefully compared all the documents in the computer. When he found the Win32 document, he found that there was something wrong with the document.    

    

"What's wrong?"    

    

No one found anything wrong.    

    

"This document has 108 more words than our normal documents!" Gates said.    

    

The size of each file was determined. Now, as the creator of the system, he could see that there were 108 more words in this file.    

    

Robert, who was standing beside him, did not think it was a big deal. "Now, our hard drive is just a few words. It will not take up much space. If we can say such a small byte... I really admire them."    

    

Robert did not think that it would be useful. No matter how smart a programmer was, if they wrote Bing-Poison, it would not be less than 500 words. That was a pretty smart move. Now... One hundred and eight words could produce a Bing-type poison?    

    

Impossible, of course not.    

    

"What if this is only a fragment? The other party split a poison that exceeds 500 bytes into several segments and hid it in our system files? " Gates said.    

    

Other than causing damage, the computer poison could also be hidden. How to hide oneself was a technical job. It was the most common way to use a hidden folder. Those are all low level, high level methods, naturally hidden in the system files. After all, under normal circumstances, no one would pay attention to the system file. To them, those were just a bunch of useless, rotten documents.    

    

Fragments? How many segments?    

    

"Find, compare all the documents!"    

    

Sure enough, when they started moving, they finally got something out of it. On the document, as expected, a line of code was added. Every paragraph had 108 bytes!    

    

108, what was the meaning of this?    

    

No one knew.    

    

When they found the eighth, ninth, or even tenth section, it meant that a 1080 byte poison appeared before their eyes.    

    

"It's too hidden, so hard to find." Robert murmured, "But it's in a concealed state now, isn't it? We haven't found any damage to our computer system yet. We just need to design a patch. We just need to get rid of these program segments. That should be enough. "    

    

The poison in the computer isn't necessarily acting up immediately, it can also be hidden. If it wasn't for Gates's high vigilance, his computer might have received an email. If he couldn't open the attachment, he would have given up. He wouldn't have noticed that the computer had been poisoned. This way, it would be very covert, and it might take effect at a fixed time. If he got hit, he didn't know why.    

    

This must be the situation right now, right?    

    

If that was the case, they still had time to remedy it. Hurry up and patch up the system.    

    


Tip: You can use left, right, A and D keyboard keys to browse between chapters.