Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 228 Process

Chapter 228 Progress

Han Feng was a little nervous and excited at this moment.

On the plus side, it may be that the pirates have woken up, but there is another possibility - the pirates have an accident.

"Pirate, have you heard it? I am Han Feng." Han Feng said again.

The sound is transmitted to a small software in the server through the microphone. This small software will completely convert the simulated sound into a digital signal and then enter the memory.

"Pirates, please reply when you hear it."

After calling a few more times, Han Feng gave up this method. He directly switched on the console in the server and used the control terminal to enter commands, hoping that this way could be used to contact the pirates.

However, the instructions sent were still unanswered.

Han Feng stopped, sat there and waited for a while, then stood up and walked towards the technical department.

When he arrived at the door of the computer room, Han Feng told Xiao Liu: "Take good care of the pirates as usual."

Xiao Liu quickly patted his chest and nodded: "Hey, I will! Mr. Han, please rest assured, please put it on me!" He did not notice that Han Feng was talking about "pirates", not "pirate servers".

After saying that, Han Feng left.

Xiao Liu then breathed a sigh of relief. Looking at Han Feng's departure back, he whispered: "What is there in this server? Why is Mr. Han looking at it incorrectly? He heard that something happened to it, and he rushed back immediately. Did he hide some secrets? But, if it is a secret, why should it be put online?" Thinking of this, he immediately shook his head and said to himself, "This is not something I need to care about, I just need to be careful about it."

When Han Feng came to the technical department, Liang Jing and the others were busy finding the main reasons for the large-scale restart of the server, but there was no progress. What exactly caused this restart? No clues were found in the log records.

Han Feng also checked it himself. Indeed, he found nothing. No wonder they were helpless in the face of this situation. No matter how skilled he was, he would be helpless.

"Check whether there are any changes in the data in the server before and after restarting." Han Feng suggested.

Liang Jing nodded: "I've asked them to do it, it will take a little time."

The hard disk of each server is raid. There is another backup of all the stored data on the hard disk, and there are even several important data. What the technicians are doing now is to restore the backup data and compare it with the current data to see if you can find any useful clues through this method.

Han Feng also participated in the analysis, and the entire group of people were assigned to part of the work, analyzing every detail as detailed as possible.

After more than an hour, the analysis work finally discovered something. A technician discovered a hidden process that consumed almost no resources in the middle of the system process. This process could not be viewed in commonly used process viewers or commands. It was discovered only by using hacking tools. Moreover, the naming of this process is only a very subtle difference between the system process. Even if it is found, if you don’t pay attention, it may miss it.

This process is too special and cannot be killed at all. It seems that there are "company processes" hidden elsewhere. When one of them is finished, it will communicate with another process and then be reactivated.

After the entire analysis work was completed, only such a suspicious point was found.

"We analyzed it and it seems that this process cannot have any impact on the server, and it has very few functions, and it only has the simplest data exchange function." Liang Jing said to Han Feng, "If it weren't for the restart, I would have thought that this process would be a garbage process that appeared in the operating system."

The so-called garbage process refers to those unnecessary processes that are useless. When a huge system is complex to a certain extent, its controllability begins to decrease. Along with it, some garbage codes that even coders sometimes do not notice. There are many reasons for garbage codes. It may be that the coder forgot it, or it may be that the coder himself knows that it will not affect the system, so let it go. (Note: The garbage process is Xiaoqiang's fictional content, please do not take the position according to the code)

Han Feng suddenly felt a familiar feeling as he watched the process.

The simplest data exchange function...

Han Feng sat in front of the computer, opened two virtual machines, and then placed the part of the server's backup data where the process is located in these two virtual machines to run.

Then, he began to use data interception software to monitor the flow of data in and out between the two virtual machines.

After the data intercepting software is started, it begins to intercept some data packets continuously.

When Liang Jing saw this phenomenon, he suddenly showed a look of surprise on his face because he knew that the machine was not connected to the Internet yet, where did these data packets come from?

Han Feng clicked on the detailed information in the data interception software, and found the source of the data exchange - these two virtual machines based on the IP inside.

"These two virtual machines are exchanging data?!" Liang Jing was shocked this time, "How is this possible... Could it be caused by this process?" Liang Jing began to understand why Han Feng did this now.

Han Feng nodded: "It seems that someone is using our server to do something."

"Experience?" Liang Jing was a little puzzled, but he remembered again how this process came about. "You mean, this process was run by someone else on our server through intrusion?"

"I don't know about this, and it needs further investigation, but from the moment it seems that there is no harm." Han Feng stood up, "Okay, I'll inform my colleagues in the Public Relations Department and let them think about how to explain this restart incident."

Liang Jing looked at Han Feng in a daze, then looked at the server in front of him, and said to himself: "I have been struggling for a long time, but I don't seem to figure out why I restarted, right? Since someone uses our server to do experiments, why is it gone after restarting? Could it be that the other party's experiment has been completed?... The security performance is still not enough, how can others enter and exit at will..." Thinking of this, Liang Jing walked towards the security department and decided to urge them to increase the security factor of the server again.

Han Feng briefly told the person in charge of the Public Relations Department about this matter, asking them to choose a reasonable reason and explain it to the residents. As for the reasons, he naturally did not inform them, nor would he tell them. Anyway, the job of the Public Relations Department is to maintain the company's image as much as possible.

Then, Han Feng asked someone to move the server to his office and then specialize in studying the specific functions of the process.

Looking at the data intercepted in the data intercepting software, Han Feng sat in the chair and fell into deep thought.

The reason why he looked familiar with this process was because he had done similar things before, such as the artificial neural network model that helped Chu Shuai improve, such as the fundamental generation of pirate intelligence - simulated neuron nodes.

In fact, Han Feng thought of this at that time. The function of this strange process is like a neuron, and plays the most basic data exchange function.

"Is anyone using this method to cultivate artificial intelligence?" Han Feng thought, "I actually implanted the process into all servers of my company." If it weren't for this incident, they wouldn't have discovered this process. If it weren't for this incident, Han Feng believed that as long as the other party wrote the intelligent core control program, these "nerve units" scattered throughout the network can be unified, and there is a great possibility of artificial intelligence being generated.

At the beginning, Han Feng actually had this consideration when developing "personal space" and p2p technology. However, before he started to conduct research on this aspect, someone was already ahead of him and was still using the software he wrote.

Although it did not cause any damage to the server, the feeling of being exploited is really not very pleasant.

Then, Han Feng remembered the server restart event again: What exactly caused all servers to restart?

Moreover, after these servers were restarted, the process hidden inside disappeared, which surprised Han Feng very much.

You should know that it is not easy to be clear about this process. It is as tenacious as a virus. To be precise, it is stronger than a virus. You should know that it is hidden in the system in the form of a system process.

Even Han Feng himself took a long time to analyze and monitor, and then he found a way to clear this process.

Could it be that the author of this process did it? Han Feng shook his head. No, even if the experiment has been completed, it will not be so obvious. He will be carried out with great fanfare, as if he is afraid that others will not know.

Just as Han Feng was confused, his cell phone suddenly rang, pulling him back to reality from his contemplation.

When Han Feng saw that the phone showed "Unknown Number". In confusion, Han Feng pressed the answer button.

"Hey, hello, I'm Han Feng."

But after waiting for a long time, there was no sound, just beeping, not the busy sound after hanging up.

Han Feng said a few words again, but the other party still had no sound, so he hung up.

But soon, his cell phone rang again, still an unknown number.

"Hey? Who is it? Talk."

"Dou, dumb--" the earpiece still sounded like this.
Chapter completed!
Prev Index    Favorite Next