Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 247 Prospector Rocket

Chapter 247 Explorer Rocket

There is a place called Cape Canaveral in Florida, USA, which is a well-known aviation coast. There are Kennedy Space Center and Canaveral Air Force Base nearby. All space shuttles and most rockets in the United States are launched from these two places.

Cape Canaveral was chosen as a rocket launch base mainly because it can better utilize the rotation of the earth. The centrifugal force generated by the rotation of the earth near the equator is the greatest. To use this centrifugal force, the rocket must fly eastward after taking off.

Another consideration is that if an accident occurs, the rocket's flight will be sparsely populated areas and will not cause huge damage. The best result is that the crashed rocket falls into the sea. Although there are many places in the United States near the equator and the ocean, such as Hawaii and Puerto Rico, Florida has very convenient logistics and transportation conditions compared to them.

The most cutting-edge of Cape Canaveral is Canaveral Air Force Base.

At this moment, the staff inside the Canaveral Air Force Base were busy at their respective positions early, completing their work meticulously.

Because in a few hours, there will be another launch mission here, and the 15-meter-high prospector rocket will be launched from here, mainly carrying experimental projects from NASA and some universities.

Originally, the Air Force Base launched such a launch every month, but the luck of this project did not seem to be very good. Every time it was its turn, some minor problems always arise. For example, it should have been launched a month ago, but half an hour before the launch, it was found that the computer on the Prospector had a small fault. It took at least several hours to troubleshoot the failure, so the optimal launch time was missed, and the launch plan was postponed.

The launch of the rocket is not possible at any time.

If you miss a time window, you have to wait for the next time.

This wait took one month.

Today, the weather is clear and the sky is cloudless, which is an excellent launch time.

NASA's empire territory is very wide, from Maryland to California, from Europe to Japan, there are NASA's branches or offices. The latest chapter of the Church

Aerospace launch is a very high-end task and must be coordinated and collaborated by major departments to complete it together.

At this moment, the staff at NASA's Goddard Space Flight Center in Maryland have just started work. They greeted each other, then returned to their own actions, soaked a cup of strong coffee to refresh themselves, sat in a chair and turned on the computer. They wanted to log in to their computer, check if there were any extra emails in the email address, and arrange their work schedule for today's day.

However, they found that today's computer seemed to have some problems. After booting, the speed of entering the system was very slow, as if driving an old car.

After finally waiting for the login screen on the monitor to appear, they entered their account number and password, which made another long login process.

The internet speed today also seems to be very slow, and it took them a long time to see the familiar work interface.

They wanted to type in characters and call out their email client, but they found that the computer's response to the keyboard was so slow that it was unbearable. Typing a key would take at least one to two seconds to appear on the monitor.

Besides being slow, it’s still slow!

Slow! Slow! Slow! Slow!

This is simply too bad!

Everyone asked each other and found that this was not an individual phenomenon, and most people were like this.

So they swear words at the same time: "bull**!"

The good mood of a day was completely ruined by the surprisingly slow response speed of the computer in front of me.

Just as they were trying to call the system administrator, a box suddenly popped up on the monitor, with a paragraph of text in the middle of the box:

"yoursystemhasbeenlocked! (Your system is locked!)"

Then the message disappeared, and the following information began to appear line by line on the display:

File deletion...successful!

File deletion...successful!

File deletion...successful!

File name 4) File deletion...successful!

...

The file names displayed in the previous file name are all important file names they save on disk.

After seeing this information, NASA staff immediately became panicked.

Some of them tried to press the shortcut key to terminate the program to terminate it, but the keys did not work at all. The computer completely ignored their input instructions.

The identities and backgrounds of NASA employees vary greatly. There are researchers and scientists. These documents are their work reports, some are the latest research results, and some are the latest observation data. Many files have not been backed up.

In other words, these documents are very important!

In a panic, someone found a small word below the display:

If you don’t want all files to be deleted quickly, please enter your username and password to terminate immediately!

Below this line of text, there is an input box, and a cursor flashes here without listening, prompting the party to enter.

Many users fill in their username and password when they see this information without thinking.

Sure enough, the information that appeared on the monitor just now disappeared immediately, and replaced by the working interface they are usually very familiar with.

Many people immediately check the files on the disk to see if they are still there.

What made those people feel relieved was that these documents were all there, and there were quite a few.

The previous information seems to be just a prank.

Except that the computer is running very slowly now, it seems that it has not suffered any damage at all.

However, is it really a prank?

Many people still report this phenomenon to the system administrator.

This incident immediately attracted the attention of the system administrator.

On this day, staff at the NASA Goddard Aviation Center in Maryland and the NASA Space Physical Analysis Network (Span) Computer Network Security Center were bombarded by countless phone calls as soon as they got to work.

Countless user feedback systems suddenly became as slow as snails, and at the beginning, there was a horrifying prank.

John Edward is an assistant cybersecurity administrator in this center. He manages more than half of the span computer networks in the Goddard Airways Center.

span is the abbreviation of the space physical analysis network. This network is connected with other computer terminals around the world. However, it is not the same as the Internet because the latter is open to the world. span only connects some important institutions in the U.S. national departments, such as NASA, U.S. Department of Energy, U.S. Department of Defense, FBI, and all scientific research institutions including famous universities.

From a technical point of view, the operating systems running on computers are completely different from those on the Internet.

Most of the computers on the Internet use Unix, Apple or Microsoft's operating systems. The span network is mainly composed of VX computers running the VMS operating system. Even the protocols they run are completely different.

Intercom Internet is based on the tcp/ip protocol, while the span network is based on the deccom protocol.

This is also why the span network is called "deccom" Internet. Most of the computers on this network are manufactured by Dec companies in Massachusetts.

John Edward has actually just been transferred here not long ago. He was a member of another NASA research group and has just been transferred here from that group and is still in training.

Today, after he just started work, he received a call from system administrators from various places, and reported this strange phenomenon to him today.

"Prank?" After hanging up the phone, Edward frowned immediately after hearing the news. He had a bad premonition.

Sure enough, another system manager called me soon, this time it was his acquaintance Thomson.

"Man, there's a bad news. We found that there was a strange unauthorized network program that started to spread on the span network, and it looked like a worm. It was currently copying and spreading itself frantically, and many computers have infected this worm..."

"worm?!"

Edward was stunned after hearing this.

This is the first time he has encountered worms on the span network since his work. Before that, all viruses and worms basically appeared on the Internet.

Due to its particularity, ordinary people cannot access vms/vax computers at all, so they do not write viruses and worms, and many people even do not know that there is such an operating system.

The incompatibility of vms/vax computers ensures its security. Therefore, viruses rarely appear on the span network, let alone worms.

And now, the system administrator below actually told him that a worm appeared on the span network!

He immediately realized the seriousness of the truth.

"Damn it, is the author of that worm trying to send his work to space!"

Edward remembered the Prospector rocket to be launched this afternoon, and it seemed that this matter might be delayed again.

Even if the computers on the Prospector are not infected with worms, it is not easy to remove worms from other computers. Without the cooperation of other computers, the rocket launch mission cannot be completed at all.

Edward immediately called the major system administrators to ask them to pay attention to collecting worm samples and then send them to the Network Security Center for analysis.

" target="_blank">http://">
Chapter completed!
Prev Index    Favorite Next
EN