Cyber Heroes

Chapter 365 Hartmann

"Hello." Xiang Shan crossed his arms and greeted Hartman in a friendly manner.

Hartman was distracted. But he reacted immediately. He immediately stood up and said loudly: "Yes, sir."

"Um...I'm not your commander..."

"Head of the Hanuman working group, Xiangshan. It's you. You are my commander now."

Xiangshan didn't expect that this hacker would have such a strict character. He felt a little embarrassed and just asked: "What are you doing now?"

"Are you asking about the progress of the work, sir?"

Hartman's voice was quite loud, and several people from the security department not far away heard it. They took a look and found out it was Xiang Shan, so they left it alone.

After all, Xiangshan is indeed the boss now. Moreover, the boss has been trying to "exchange academic knowledge with those hackers" for the past few days. Now that Hartman is here, it is natural for the boss to ask.

After all, there really wasn't anything he couldn't ask.

"I am scanning these electronic devices to deduce the spread of electronic viruses, sir."

Only then did Xiangshan notice that there were indeed many personal devices piled on this table.

"Did you find anything?"

"It's still being scanned, sir. I just screened out the files in the 'whitelist'. The remaining suspicious objects are being analyzed using the toolkit." Hartman said, "Actually, I can probably guess the method, but I won’t make a judgment until I know for sure.”

Xiang Shan asked: "Can you tell me?"

"I speculate that it should be a kind of Trojan. It knows the common characteristics of research data, searches the entire computer for data that matches the characteristics, and then sends it to the designated location when there is a public network. After completing all this, the Trojan It will be automatically deleted to prevent itself from being retrieved. Therefore, if you check those scholars who have had leaks, you will definitely not be able to find the virus. But it will leave traces."

Human immunity is divided into "non-specific immunity" and "specific immunity". Non-specific immunity will eliminate the "non-self" in the entire person. Specific immunity, on the other hand, only targets specific pathogens. Generally speaking, after pathogens enter the human body, they are attacked by non-specific immunity. A malicious piece of RNA can't get itself into a cell directly, so it needs a protein shell - this is a virus.

Pathogens such as viruses will disguise themselves to activate receptors on the surface of human cells, pretending to be substances needed by certain cells, and enter the cells. A large number of viruses will activate the resistance of the specific immune system. Helper T cells recognize the antigen and in turn read the encoded records in the memory T cells to produce the antigen.

This set of logic can also be roughly applied to computers and computer viruses. Computer systems are defined by engineers as "legal operations" and "illegal operations", and some operations are naturally difficult to perform. It is difficult for pure malicious code to take effect directly. So hackers will add "shells" to malicious code. The virus either extracts permissions or exploits vulnerabilities to disguise its modifications as "legitimate operations." Anti-virus software and analysis software can retrieve the codes of these "shells" and compare them with virus databases to detect and kill them. Security software and virus databases represent helper T cells and memory T cells.

However, viruses written by humans are the product of intelligent design, so they often have "sexy operations" that are unimaginable for naturally evolving things - such as self-deletion.

The virus destroys its own "shell" and does not give the immune system a chance to recognize it.

The spread of computer viruses also follows infectious diseases. However, a virus that “disappears and does not produce antibodies” will definitely make it difficult to identify “Patient Zero”.

But "Agni" seems to be able to find "trace of modifications of the virus" - or "records of symptoms", and then use the "records" to infer the transmission trajectory.

Speaking of this, Hartman was a little proud: "Actually, I still know a little about 'Zhurong'."

Xiang Shan felt a little strange: "Are you friends? Or do you have enmity?"

"I don't know him." Hartman shrugged: "But I have studied him."

"Have you studied him? Then why didn't you catch him?" Xiang Shan felt very strange: "If you had caught this guy earlier, wouldn't there be so many problems?"

"I'm neither a policeman nor a member of the IRS (U.S. Internal Revenue Service)." Hartman was also very surprised: "If there is no order, what is the purpose of arresting this economic criminal?"

"Economic criminal..." Xiang Shan was completely confused. In the eyes of this hacker, can the behavior of "Zhu Rong" be summed up as an economic crime...

No...it does seem to meet the definition of economic criminal, but...

Xiang Shan asked: "Then why are you studying it?"

"Hackers are people who look for loopholes in systems. Some people are good at finding holes accidentally left by construction workers, and some people like to drill holes themselves." Hartman said: "Following the footsteps of other hackers, it is easy to find them." It’s a hole. I have studied other hackers’ methods. But I rarely take the initiative. Usually I just follow them and look for things that can be exploited.”

Xiang Shan had indeed heard of such a thing. Some little black hats, who are like traffickers and pawns at the bottom of the world, will only learn some very basic technologies from some big hackers. [They may even only use scripts written by big hackers, called "script kiddies\

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like