No results found!
  • Series
  • Bookmarks
  • Blog
logo
logo
SeriesBookmarksBlog
No results found!

WU NOVEL

WU NOVELWU NOVEL

About Us

Contact Us

Privacy Policy

Getting a Technology System in Modern Day

Getting a Technology System in Modern Day

0 Comments

View All

51 Trojan making its move

Read on App

Rated Novels

Ongoing
The Soul Of The Heavens And Myriad Worlds Breaks The Sky

The Way of Heaven controls the reincarnation of all life in the world and the rules governing the operation of all things. Humans, immortals, demons, ghosts, monsters, and spirits are just part of the “living beings” imprisoned in the way of heaven. Millions of years ago, the way of heaven gradually became unbalanced, the devil disturbed the heavens, and the world-destroying calamity descended upon the heavens. At that time, some people said that the Supreme Being cut through the natural barrier with one sword and separated the world. A million years later, Ling Feng rose up strongly, suppressed all the tribes in the ancient times, slew the demons, and fought against the will of heaven! This is an era where humans, immortals, demons, and all kinds of races coexist. Light and darkness collide, humans and the wild are in conflict, and all living things compete with the will of heaven. Will this era be destroyed or will it continue?

Ongoing
Players' Wasteland Universe

Humans once conquered the stars. Their territory spanned millions of galaxies, their fleets made ancient interstellar empires bow down, their scientific expeditions walked on the edge of the observable universe, and their technology was pushed to the limit of imagination. It was a paradise-like golden age. However, there are always stronger ones. Such a powerful civilization was still swallowed up by an indescribable terrifying force in the [Doomsday Cataclysm]. Countless lives were destroyed in the flames of war, countless planets turned into hell on earth, and the universe became a wasteland. But everything is not over yet. Lu Yuan, who traveled to the wasteland universe, found that he was lucky enough to hold the key to reviving human civilization. In addition, he can also summon diligent players from the universe before the travel to help him achieve this goal. What happened during the [Doomsday Cataclysm]? Who pulled humans off the throne of the dominant species and almost wiped out civilization? How much technology from the golden age was left among the stars, waiting for players to recycle? These will be answered during the journey. One day, the reputation of mankind will reverberate in the universe.

Ongoing
Online Game: Unlimited Mana At The Beginning, I Become A God-Level Mage

[Online games + games affecting reality + mages + data + invincibility] The high-dimensional game [Great Thousand Worlds] suddenly arrives, the game merges with reality, and the rules of the world change drastically. In his previous life, Chen Jing gave everything to raise enough money for Liu Ruxue's betrothal gift and house. He even missed the best opportunity to enter the game [The Great World]. In the end, Liu Ruxue took him to court because of marital discord. The house, the car, and the betrothal gifts were all taken away by Liu Ruxue. Chen Jing and his sister Chen Yaoyao, who had disabled legs, were kicked out of the house, and his sister Chen Yaoyao eventually died tragically on the street. … After being reborn, Chen Jing and Liu Ruxue have not yet married. He immediately cut ties with Liu Ruxue. He entered the game [The Great World] with his sister Chen Yaoyao. In this life, Chen Jing is bound to reach the top with his sister Chen Yaoyao. only…… What the hell is this [World-Class Unique Talent: Infinite Blue]?

Ongoing
The End Of The World: Hiring A Maid, Starting From The Arrogant Neighbor'S Wife

[Decisive killing + System + Not a saint + Many beauties + Villain + Extremely selfish + Cold-blooded and ruthless] (Three chapters a day + no leave) Extreme cold has arrived and the whole world is frozen. The end of the world is coming, do you need to stock up on supplies? No! My supplies are distributed every day! You are lonely in the end times and need to stock up on goddesses? No! The goddess will come to your door! When order collapses, human nature and animal nature are intertwined. For the sake of bread, the proud neighbor's wife can lower her head. In order to clear the water, the female anchor directly showed her talent. Lin Dong, whose parents are both dead, is betrayed by his girlfriend at the beginning. When he is disheartened, the end of the world comes. Since everyone is bullying me, don't blame me for killing all of you!

Ongoing
Ultimate Choice System: I Became The Richest!

Noah, a highschooler was struggling due to his family's poverty and his father's declining health.Despite that, he was content with his life... Until he visited his girl, trying to surprise her with a gift."~~~" Muffled sounds came out of her room as he stood at the door.

Ongoing
Starting With an SSS-Rank Swordsmanship Talent

Following the death of the emperor, the Astanian Empire plunged into chaos. His two sons both aiming for the throne caused a civil war that divided the empire.In the midst of this conflict, Alaric was forced into conscription. He later joined the crown prince’s army as a company commander.He led his 100-man army into battle, fiercely fighting with the hope of a better future. Unfortunately, he was just too weak to cause a ripple on the battlefield.A single arrow to the head shattered his hopes and he died without even a proper burial.Just when he thought that everything was over, he found himself back to his younger self with his memories intact.Armed with his knowledge of the future and a system that awakened his dormant powers, Alaric began his journey to overcome his fated demise.

Ongoing
Reincarnation of the Strongest Healer

“Delete my game account and have a mansion on the outskirts of the city?”Am I being treated as an abandoned dog? How laughable!Former Vice Guild Leader of a Super Guild in the game Divine World, Xu Feng, was ultimately discarded.Despite pouring his heart and soul into the Reaver Guild, Xu Feng found himself no better than a discarded stray.Luckily, fate had other plans for him. Upon falling asleep at night, Xu Feng miraculously found himself to be reincarnated.“You people will soon regret your choices,” Xu Feng fixed the position of his glasses and ensured they would pay the price.

Ongoing
The Evolution Of A Goblin To The Peak

The fantasy VRMMORPG, Battle Worlds, is one of the most played games in the world.In this game, there's a legendary player that could defeat a "Boss" on his own.His name is Blood(In-Game-Name).Blood is a legendary player that surpassed all the players in the world. He completed hundreds of quest and dungeon raids alone.When Blood was going to log off, suddenly the virtual capsule that he was wearing exploded causing him to die.His soul didn't go to the cycle of reincarnation but it was sucked by something causing him to transmigrate into a body of Goblin.This is a story about a boy that was transmigrated in the body of a Goblin. Follow him as he rises through the ranks and become the most powerful monster in the world.

Ongoing
Weakest Beast Tamer Gets All SSS Dragons

"Dragons and their spawn rule the skies, the land, and the seas... humanity survives in the cracks, dreaming of a comeback."_____Power comes from the beast you tame.Wolves, hawks, snakes, spiders, chimeras, the stronger your summon, the brighter your future.Too bad for our protagonist.When everyone else summoned salamanders, eagles, troll dogs(not doge) or tigers, he got… Well, let’s just say the only thing lower on the food chain is dirt.Laughed at, bullied, and living as the butt of every joke, he’s not exactly winning.But giving up isn’t an option...His aging parents sold everything for his "failed" chance, and he won’t let it be for nothing.But hey, this is his story. The weakest beast tamer?Here’s the thing about being at the bottom: it teaches you how to climb.And dragons? Turns out they start small too.As kingdoms crumble under greed and external threats, the weakest tamer begins his rise.Follow his path as he unlocks a potential so rare, so terrifying, it leads to dragons… Every evolutionary line leads to the strongest ‘SSS Dragons’.

Ongoing
Reincarnated Lord: I can upgrade everything!

After leaving earth in a pathetic way, Asher finds his soul in the body of a baron's bastard son.As the last surviving member of the Ashbournes, Asher must take up the mantle and build his territory or die in the jaws of a beast or the blades of hungry nobles greedy for his territory.Luckily, he did not enter this man-eat-man world without support.[Ding! Soulbinding successfully completed.]

Ongoing
In the Tenth Year After the Natural Disaster, Follow me to Farm

After surviving the tenth year of natural disasters after the nuclear-contaminated water was discharged into the sea, the All-Blue Star volcano erupted, and the gamma ray burst, Xia Qing walked out of the safe zone with her head held high.Don’t let anyone stop me. I’m going to farm!

Completed
The Divine Doctor and Stay-at-home Dad

As an ordinary human being on the earth, Tang Long was brought to the Cultivation World by a lost immortal, and relying on his amazing talent, he made it to one of the five emperors in that world. However, struck by Thunder of Nine Heavens, he lost his life. It was lucky for him to transmigrate in the human world in an intern who was named Qin Haodong. With his excellent medical skills, he became a divine doctor of traditional Chinese medicine and encountered the baby girl he made before going into the Cultivation World, whose mother was as pretty as a fairy. The little girl even asked him to find more lovers. What a cute girl…

51 Trojan making its move

Patrick and his team of IT nerds could be seen sitting in a resort’s swimming pool that was rented exclusively for them.

Impossible!! Is what you want to say but it happens, not all nerds hate public spaces.

But Patrick’s team nerds were among those that the public. That’s why it was fully rented just for them.

“Do any of you have any idea what steps we should follow once we return?” Patrick asked the team members.

“I think we should ask the person on the side of DOD to see where they are compared to us” Said one of them.

“I can ask them but I don’t know what their rank is in the DOD and if they even have access to that information,” Patrick replied to the recommendation.

Then he turned to the hotel worker who was responsible for helping all of their needs and said “Bring me my phone from that bag” while pointing to the bag with the said phone.

The worker did as she was asked and went to look for the phone in the bag she was shown.

After looking through the bag and finding a phone, she handed the phone to Patrick, who took the phone and powered it for the first time since he left the base.

They were required to power their phones off when leaving the base which had signal jammers to avoid triangulating the bases location.

And are only allowed to power them on and use them only when they are far enough from the base making it impossible to determine the bases location.

He had forgotten to power it on until now when he needed to use it.

Patrick pressed the power up button.

As soon as the phone initiated the power-up sequence, the operating system kernel – the essential part of the operating system – was loaded into memory.

Along with it, a trojan code laying in waiting also loaded itself into memory, allowing it to interact with the phone’s hardware components and control its basic functions just like the operating system kernel without facing any troubles.

However, in cases of disagreement between the trojan and the normal operating system, the former was given priority with no questions asked.

Subsequently, the operating system proceeded to load the essential components required for the hardware drivers, such as the display, camera, and audio system, which was followed by the usual completion of the boot-up process.

Once the phone was fully powered on, it was fully compromised, with the operating system under the control of a master who could manipulate it from behind the scenes without detection or the device user seeing anything weird in the phone’s UI.

Upon completing the power-up process, the trojan promptly attempted to establish an external connection by pinging the cell tower.

Once the cell phone tower was successfully pinged and the trojan was assured of having a last resort of escaping in case of discovery, the trojan discreetly enabled the phone’s Wi-Fi without displaying any indication on the phone’s user interface as the second contingency plan.

However, the trojan’s actions did not stop there, as it was still looking for another safe way it can transfer data without leaving any trail behind.

It was followed by the phone’s NFC connection being immediately activated, and the program scanned for devices with NFC capabilities, eventually discovering one on the hotel worker’s phone.

Without delay, the program established a connection with the hotel worker’s phone.

As soon as the connection was established, the trojan sent a copy of itself onto the phone.

It chose to move ahead with using the NFC route because if it uses the cell tower or Wi-Fi to transfer data, he was sure that traces will be left with the service provider, making it possible to find how the data was leaked.

That’s why he left them as a backup plan and would have used them under the condition of not finding an NFC connection, which was safer due to the information about the transfer data being just between the sender and the receiver.

Making it easier to delete.

However, before the trojan could execute and gain control of the hotel worker’s phone, the hotel workers’ GAIA OS virtual assistant detected the trojan’s activity and contained it within a virtual environment for inspection immediately.

Initially, the trojan attempted to break out of the virtual prison to infect the phone and propagate itself, ultimately increasing the likelihood of it reporting back home.

Upon the quarantining of the trojan, the hotel worker’s phone virtual assistant commenced to analyze it in the search of any discernible characteristics that could be added in the report that will be written to GAIA HQ regarding a possible dangerous virus.

However , it abruptly ceased its analysis and permitted the program to infect the phone after the moment it started looking through it.

This was because the trojan had an identifier in which all the programs that had it would allow collaboration without causing too much trouble for each other, unless they were made for opposing each other.

It was the programming language the trojan was written in, Prometheus++ , indicating the identity of its creator.

Despite being unaware of the program’s creator, the phone’s operating system possessed the ability to reason independently and come up with an answer with the highest probability.

After scouring the internet for information and failed to discover any information about public release of Prometheus++ programming language, leading to the conclusion that the creator or someone they trusted granted them access to it leading to the creation of this trojan using the specific programing language.

The virtual assistant of the operating system made a shrewd conjecture, correctly identifying Nova, their powerful sister whom they had no knowledge of, as the mastermind behind the trojan.

Despite allowing the trojan to infect the phone, the GAIA OS virtual assistant continued to protect it’s user’s data to prevent it from being stolen, and solely permitting the Trojan to only utilize the phone as a transfer terminal and nothing else.

This was the choice it took for the sake of helping their creator while also not breaking the rules he embedded in them.

The trojan using an unrelated person’s phone as a means of transferring the information is to remove any chances of discovering where the leak came from and then ending up patching it.

The lab’s personnel internet usage was at risk of being monitored if any suspicious activity was detected.

This prompted the Trojan to search for a phone that was not associated with the lab to facilitate data transfer.

Finally the trojan managed to partially infect the hotel worker’s phone and had access to her network transfer system allowing it to send and receive any and all data without worrying about the worker suspected for being the one who did that.

Though the receiver would have to take over the internet bill to avoid making the hotel worker cancel her service plan due to the bill becoming too expensive to cover.

This will be done with the help of GAIA OS virtual assistant as it considered it as a form of compensation to its phone owner for using it behind her back(or in her pockets????).

The trojan compressed the shit out of the data until it reached a point where it couldn’t decompress it anymore with the phone’s computing power without cocking it.

After reaching that point, it sent the data from Patrick’s phone to the hotel workers at once without any delay.

Although the over compression seemed like overkill, this allowed it the capability of sending the entire information to the hotel’s worker in a matter of seconds.

The moment the data was received by the workers phone, it was immediately forwarded to Nova’s servers without even wasting a second after being routed through various Virtual Private Networks (VPN).

It was then followed by the trojans in Patrick’s and worker’s phone deleting any and all traces of the data transferred and received through the NFC and including anything that could hint at it.

After that they remained dormant, doing nothing other than listening and collecting whatever is being said by anyone near them and analyzing them to look for any important information from their words.

The IT team will be there for a week and since they will be the only ones there, if you don’t count the prostitutes that will be called for them during that period means that they will be alone most of the time, allowing them to talk about any classified info without worrying about anything.

And the trojans were there for it, one to listen, analyze and compress, the other to receive the compressed files and send it to Nov’s servers after routing it through the Virtual Private Networks.

This entire process, from the powering on of the phone to the Trojan sending its copy to the nearby worker’s phone, to it being caught, to the Trojan being allowed access to the worker’s phone as a means of transferring data, to receiving the needed data from Patrick’s phone, to the data being sent to Nova’s servers through the Virtual Private Networks to cover more of it tracks, took less thirty seconds.

….

Don't want to lose your reading progress

Save your place and continue where you left off on any device