Digital Life (Absolut01) - Chapter 80
[eighty.]
After having the money, Lu Zhenyu felt much more at ease.
No matter how much tossing the factory, the 600 million US dollars is enough for them to squander.
The sales of spider walkers have brought huge profits to Digital Totem. Coupled with the popular pet dog Bobo, from June to July, the amazing results in these two months have made Digital Totem employees from top to bottom. All beaming.
After all, among all companies in China, their sales are a miracle.
Lv Zhenyu also quietly announced in the company that globally, the top 100 in this year’s performance points will go to Paris for a week of corruption this fall, and the company will pay.
In addition, an alternative route is provided, that is, to go to Meili Snow Mountain again, and see the true appearance of Kawaberg Peak in the rare opportunity of only one month a year.
As for how you choose, it’s up to you.
Anyway, even if more than 100 people go to Meili Snow Mountain together, there will only be 50 spider walkers. If the spider pioneers come out by then, it will not be so many.
Of course, Lu Zhenyu was not very optimistic about the Spider Pioneer.
The products that Spider Walker upholds are still digital totems. They have always had strong core functions and a style that is extremely free to modify the surrounding area.
The Canadian Forestry Association installed an infrared camera on the spider, which is good for a solid fire, and their method of use is to put the spider in the back of the off-road pickup truck, basically taking into account the high speed of ordinary cars. And the super off-road performance of the spider.
The Swiss military equipped the spider walker with hydraulic shock absorbers, removed the diesel engine and mailbox, installed an M134 transfer machine gun and a 2000-round bomb bay, and the rear salute was converted into a smoke screen launcher. racks and parachute racks.
The spider walker has an airdrop capability in an instant.
This plan has also been followed by some countries that have purchased spider walkers.
Equipped with such a spider walker, which weighs less than 1 ton, it is really the king of mountain warfare for the rapid reaction force.
Although Spider Walker has not yet been released to individual users, there are still some people who have managed to get a piece of the pie from those institutional users.
It is these people that make the modification of the spider walker into an extreme game.
The modification of the spider walker by these individual users is simply incredible.
For example, all aluminum alloy structural parts are removed and replaced with titanium alloy parts to challenge the limit of lightest weight.
For example, replacing the original motor with an American military version of the super motor that I don’t know where to get it, and even some strongmen make their own motors with higher power to drive.
The simplicity of the electric motor makes everyone have great enthusiasm for modification, as if they are not playing a spider walker worth 550,000 US dollars but an Audi 4WD car worth 10 yuan.
…
And these modifications can only play one role, that is, to continue to consolidate the status of the spider walker off-road king when Digital Totem does not launch a new model of the spider platform series.
Although he had come up with an idea for Lu Zhenyu to blackmail foreigners, Bai Qiang shook his head and smiled bitterly when he learned that Lu Zhenyu had sold about 1,100 spider walkers at a unit price of $550,000.
He knows that the Chinese military does not have the financial resources to purchase these spider platforms, and he also knows that if he orders, the price he will get is enough to make the eyes of overseas users fall out.
Lu Zhenyu got stuck on the miniature version of the spider platform.
He installed brushes, water pipes, cleaning fluid nozzles, and a full set of pipelines on the spider cleaner, and even installed a small electric grinder for grinding and polishing, but he really couldn’t figure out how to make the smart core understand when and what to use. tool.
Judging by sight?
This is a little unreliable. The visual judgment method currently mastered by Digital Totem is still not perfect. It is probably no problem to use it for Xiaoyu, but if it is used for spider cleaners with a much lower level, the problem is big.
With the determination of this algorithm, Lu Zhenyu, who has always been diligent in housework, could not think of what to do.
For this small robot, his experience in housework is really out of the question.
Starting from July 10, a piece of news came out, which suddenly attracted the attention of everyone in the IT industry.
“Super Virus Swept New York” – When the headline first appeared on the front page of the New York Times, people who saw it online didn’t realize what a formidable opponent they were up against this time around .
The virus came out of nowhere, first hitting several financial firms on Wall Street, and then the New York stock market.
Most people don’t know that the computer systems of those financial companies were almost completely destroyed. Although they could recover to the state 10 days ago by means of remote backup, the data loss in these 10 days was enough to cause damage to these companies. A very heavy loss.
Most people wouldn’t know that if they didn’t get the news in time, when the virus first started attacking the New York stock market and began to eat up those thousands of dollars’ worth of data, it would gradually shut down important servers until it was announced that the market would be closed for a day due to a computer failure. The New York stock market will do the same.
The virus attack this time was very strange. It only attacked one target at the same time. So far, it has not replicated or infected. It just attacked one computer at a time, destroyed all the data on the hard disk and ran away.
Moreover, the selection of targets has great proximity characteristics and randomness.
The virus has already invaded without those powerful firewalls noticing abnormal data.
By the time the owners of those machines began to notice anomalies in the data, the situation had reached an irreversible point.
What happened on July 14th brought this strange virus to the attention of the world.
The virus took over the main room of Dutch Telecom, and then left safely, before the Dutch Telecom started the backup computer room, and the telephone and network service in the whole Netherlands was interrupted for a full six hours.
Some people suspected that this was the operation of an extremely sophisticated hacker group, but it was finally confirmed that this rumor was not true.
On July 17th, when the network administrator of a data service company in Sweden noticed that the host was attacked, he directly unplugged the network cable. However, the progress of the virus destroying data did not change. It was still so rampant, still rampant. Showing a hint of composure.
This virus simply looks like an evil conspirator.
After the network manager in Sweden unplugged the network cable, thinking that the horizontal and vertical data could not be recovered, he restarted the computer and directly formatted the hard disk.
…He thought he had succeeded until he saw on the news the next day that the virus had found a new target.
Baudelaire – this is the name the virus has earned for itself with its evil beauty everywhere.
By July 23, the situation had changed.
Baudelaire copied it the first time, then a second time, and a third time.
The replication is very strange. It does not replicate unrestrictedly like a normal virus, but divides every once in a while, changing from one to two.
This situation is simply the division and proliferation of unicellular animals.
When the virus first appeared, Lu Zhenyu adjusted the connection between the company and the Internet according to the situation of the virus, and deployed two servers with the Don Quixote operating system at the company’s entrance.
Although I don’t know the principle of the virus, if it is a virus attack against the vulnerabilities of the operating system, the unfinished Don Quixote operating system will be more secure than a series of operating systems such as Windows and Linux that are currently popular.
Not because of how perfect Don Quixote is now, but because of this unreleased operating system, no one has done a very detailed study of him.
“Xiaoyu, what do you think is going on? The replication method of this virus is too similar to cell division. Moreover, this level of intelligence should not be achieved by ordinary people.”
Yue Yu was silent for a long time, and went on for a long time. After the calculation, he said, “There is a possibility.”
“Oh?”
“Someone has made something according to your nonsense theory. If someone made a very large-scale simulation according to your chaotic collision theory, plus a very close approximation to Miraculous luck, then it is possible to make this kind of thing.””
“Baudelaire’s intelligence, if calculated, is almost equivalent to the G-class sample in our hands. Do you think it is really true to use the chaotic collision theory? Is it possible to make such a thing?” Lu Zhenyu was taken aback.
If so, he made a huge mistake.
Although the other party created a demon this time, God knows if there will be another chance for a pie to fall from the sky and let people make something that can be applied.
“This is just a possibility.” Yue Yu said, “Although you have said some interesting theories about me, it is undeniable that this chaotic collision theory is indeed a relatively new kind of artificial intelligence. The method, but this method is not applicable in the current era, with this level of computing technology.”
“Anyway… Let’s strengthen the security system on our side first. Please wait and see the news. There will definitely be news from various aspects of the serious virus attack.” Lu Zhenyu didn’t know what to say for a while, so he could only wait and watch.
Anyway, now he can’t do anything about Baudelaire’s sample.
While Lu Zhenyu was making various speculations, Baudelaire was destroying at a faster and faster rate.
Baudelaire does not destroy hardware, but only deletes data. Although business users can now restore through backups, the time difference between damage and restoration is a problem for companies that are hundreds of thousands of dollars a second. , enough to cause a devastating blow.
Moreover, even if the data is restored, God knows when Baudelaire will kill him again.
When the virus raged for more than half a month this time, several major security service companies still failed to come up with any effective plan to deal with Baudelaire.
Computer users all over the world are in some kind of panic. Is it possible that as long as they go online, they will be attacked by Baudelaire who does not know when?
This kind of panic is really not a pleasant thing.
Moreover, in terms of the nature of Baudelaire, the longer the delay, the greater the number of copies of Baudelaire, when 1 becomes 2, two become 4, and 4 becomes 8 One, multiplied by such a geometric series, sooner or later the entire network will become a killing field for Baudelaire.
That would be the end of the Internet.
Therefore, whether it is a business or an individual, everyone starts to back up data when the computer is fine, and can restore it in case the computer is attacked.
And some companies that do not rely on the Internet simply cut off the company’s connection to the Internet.
On August 1, Lu Zhenyu, who stepped into the office early in the morning, noticed a strange atmosphere.
Shelved in his office, the server unit where Yue Yu was living was humming, a row of hard disk lights kept flashing, and the hard disk made a non-stop reading sound.
What’s wrong?
Lu Zhenyu hurriedly turned on the computer on his desk, and asked into the microphone, “What’s wrong?”
This time, Yue Yu didn’t answer her with her calm and soft voice.
A dialog box flashed on Lu Zhenyu’s computer screen: “I’m poisoned.”
These four words seemed to hit Lu Zhenyu’s head with a huge hammer, and Lu Zhenyu’s whole brain pounded. This was a huge blow. At that moment, Lu Zhenyu couldn’t recall a single word in his mind.
Lu Zhenyu slumped down on the comfortable swivel chair, and after a while, he asked, “Then what should I do?”
After half a minute, Yue Yu replied on the screen, “It’s important I have already copied the technical data into your computer, and I have to fight Baudelaire, don’t worry, I’m fine.”
Yue Yu is directly connected to the network, not through the company’s entrance. Regardless of whether the portal server installed with Don Quixote is useful or not, at least it did not provide minimum protection for Yue Yu.
For some reason, Baudelaire found Yue Yu.
Yue Yu obviously maintained considerable control over his entire system, and after sensing Baudelaire’s attack, he backed up important technical data.
However, in Lu Zhenyu’s mind, there is no technical data that can be compared with Yue Yu himself, and Yue Yu, she has always insisted that she is the only one, and only herself has no backup.
UU reading www.
What should sonicmtl.com
do?
Lu Zhenyu fell into a panic.
Although he did not have access to Baudelaire’s samples these days, he knew about Baudelaire’s attack from Microsoft, from programmers in other countries, and from all the friends he met at the global it summit forum. Way, also know the terrible of Baudelaire.
In any case, he couldn’t sit idly by.
Lu Zhenyu suddenly stood up.
And at this moment, Yue Yu restored the connection with his computer in an instant, and then cut off the connection after sending a message.
The message is an email address and a password…
Lu Zhenyu immediately took out his laptop from his backpack, turned it on and connected to the Internet from the company’s intranet. Although it was in crisis, there were still some extremely secure mail servers.
For example, the address Yue Yu gave him came from the internal mail server of a well-known hacker organization.
This server is powered on for 2 minutes every hour, and only within these two minutes can registered users send and receive emails.
…the server’s very few users can support this extremely extreme security approach.
Lu Zhenyu waited anxiously for those two minutes before downloading the email.
There is only one e-mail in the entire mailbox, which is in the drafts folder. The e-mail starts like this:
“I don’t want this situation to happen, so I have to let you see this letter….”
u003ca href=u003eUUReading Welcome readers to come and read, the latest, fastest and most popular serial works can be read in UU!
u003c/au003e
[End of this Chapter]
***Commenting is only available on the Novel Description Page.