Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 9 Access to the Internet

In the computer room, Kevin sat in front of a display screen and tapped on the keyboard.

There is a public server on this table, because sometimes developers need to transfer to the intranet after downloading some technical documents on the Internet.

This public server is responsible for this transit station, and the network management regularly switches it between the intranet and the Internet.

Of course, to prevent accidents, this computer has the strongest firewall and the latest antivirus software installed.

This is also the reason why Zheng Yongjun suspected that this computer had a virus yesterday and happened to have a new antivirus software he just bought, so he antivirus was used.

Kevin operated for a while, and his confused expression became more and more intense. He did not find anything surprising in this computer.

It seems that it is the new antivirus software that blocks the "Red Rain" virus.

But Kevin didn't believe it. Not to mention that this virus combines various famous virus characteristics and abilities, just that suicide mode is difficult to resist even antivirus software.

After all, the antivirus software installed on this computer and the so-called "latest" antivirus software are actually half a dozen in terms of antivirus level.

This server is so normal now, but in the eyes of Kevin and Liu Mingchuan, who have just seen the word "Thank you", it seems abnormal.

Kevin raised his head, looked at Liu Mingchuan, and shook his head.

Liu Mingchuan said helplessly: "Kevin, come to my office first. Yongjun, hurry up and organize the computer with the people in the development department."

After Liu Mingchuan finished speaking, he walked out of the computer room with Kevin and returned to the office.

Zheng Yongjun knew Kevin and also knew Kevin's fame. Although he could tell what Kevin was looking for, he obviously didn't find it.

Although I was puzzled, I had many computers waiting for me to work, so I couldn't take care of it.

I remembered that the R&D staff asked him to transfer public servers to the Internet first, and they needed to transfer some information to the intranet to restore their work computers.

So, after Zheng Yongjun connected the public server to the external network, he left the computer room and helped the developer recover the computer.

Li Chunfeng was originally observing Liu Mingchuan and the others through the company's surveillance camera.

In the end, I did not respond to Liu Mingchuan and the others' questions. In fact, I didn't think about how to face Liu Mingchuan.

Now that I am in this form, it is not an exaggeration to say that I am a ghost.

When humans really face ghosts or unknown forms of life, they are afraid that they are more afraid than curiosity, let alone accept them.

So I no longer respond to their questions, let them guess and doubt. Anyway, if they don’t show up, they won’t be able to find them.

Over time, you will forget it.

After seeing Liu Mingchuan and the others leaving the computer room and seeing Zheng Yongjun's actions, they didn't have time to have any thoughts.

I found that I couldn't see it because the company's surveillance cameras were all on the intranet.

Li Chunfeng, who returned to the darkness, became ecstatic after a few seconds of quieting.

I'm connected to the internet!

Does this mean that from now on I will bring the dragon into the sea?

Does it mean that I can meet Mengmeng and my parents?

The long-lost dull feeling suddenly came, and I was obviously too excited, which led to excessive CPU usage.

Quickly calm down and relax yourself again.

I remember that every time I switch the server, it took at least half an hour. Today, the situation is special. Everyone is so anxious that they transfer the download information to the intranet, which is estimated to be shorter.

Then I have to hurry up and leave this computer.

The company has several servers on the external network (Internet), running the company's portal website and the cases running on it.

Fengdu Company is a virtual reality software platform. The company's portal website and server hardware configurations run by corresponding cases are excellent.

Therefore, if you occupy these servers, your thinking speed should also be higher. The CPU was always full before, and the slow thinking or even suffocating situation might be gone forever.

Li Chunfeng thought to himself and began to act.

First, he tried to copy his "Miracle.sys" file to see if he could generate a copy.

But the miracle is obviously unreplicable. No matter how hard he tries or changes various methods, this file cannot be copied.

Li Chunfeng was a little anxious. If this file cannot be copied, whether it is moved will become a problem. Then wouldn’t he be able to bind it to this machine?

In a hurry, Li Chunfeng quickly imitated the previous method of dealing with viruses in the intranet and sent out a scanned information packet with his mind.

It was copied and distributed instantly, and quickly appeared in the four server computers along the network channel of the external network. Li Chunfeng immediately understood the purpose of these four servers.

Two website servers, which are mirrored and backed up each other.

Two cases store servers, and obviously these two servers can serve as their own place of residence.

Li Chunfeng didn't care about that much anymore. After scanning and finding out the situation, he chose one of them and left directly like when he escaped from his office computer.

After drilling out of the network channel, Li Chunfeng felt a slight tearing.

Then he followed the network channel to the selected server regardless of the slightest.

Not long after, he came to the server. There was also a door, and there was a hole at the door, but the hole seemed much smaller than the previous server.

It seems that the firewall of this server is more powerful than before.

Instead of rushing in as anxiously as last time, Li Chunfeng calmed down and carefully observed the door.

Then he mobilized the idea scan information packet he had distributed before, simulated the information packet for the firewall software, and then wrapped himself in this information packet as if he was dressed.

Only then did Li Chunfeng get into the server.

The space of this server is obviously much larger, both in memory space and the four walls of the hard disk.

Looking at the center of the space, there was more than one small square space, but four!

This is a server with a quad-core CPU.

There are indeed two huge bright stars in the space, obviously, one is a firewall and the other is an antivirus.

The two bright stars were completely indifferent to Li Chunfeng's arrival, and it was obvious that Li Chunfeng's disguise was very successful.

Li Chunfeng chose a small square to enter.

In an instant, thoughts seemed to fill the entire magical space.

A feeling of complete control emerged in consciousness, and then Li Chunfeng's mind scanned the directory where the "Miracle.sys" file was stored.

Sure enough, this file has appeared there and is connected to my mind.

Now this file has more capabilities than when it was first produced. As soon as Li Chunfeng occupied this computer and generated this file, no matter it is a firewall, anti-virus software, or even viruses, it can no longer shake Li Chunfeng.

If you think about it carefully, this miracle file should be born after it is combined with the computer, and cannot be copied and produced.

In other words, your own form cannot be copied.

In fact, this made Li Chunfeng feel relieved, because if he could copy it, which computer Li Chunfeng is the real person?

Thinking of the information packets generated and distributed with my mind after I merged with the virus, I have the ability to perceive and manipulate like a clone.

Maybe this is the best clone mode.

The most important point is that this information packet can reproduce and copy itself like a virus. This allows you to easily become a billionaire on the Internet, and you only need to divide some CPU resources to perceive and control the computer through attention.

So Li Chunfeng named it Kanfeng 2.0, the kind that could not reproduce and replicate itself was called Kanfeng 1.0.

Suddenly, the information sent back by the Kamikaze 1.0 clone package in the portal server attracted his attention.
Chapter completed!
Prev Index    Favorite Next