No results found!
  • Series
  • Bookmarks
  • Blog
logo
logo
SeriesBookmarksBlog
No results found!

WU NOVEL

WU NOVELWU NOVEL

About Us

Contact Us

Privacy Policy

Getting a Technology System in Modern Day

Getting a Technology System in Modern Day

0 Comments

View All

51 Trojan making its move

Read on App

Rated Novels

Ongoing
Be The Devil, Control The Witch, Defeat The Hero And Destroy The World

[Devil King] + [Invincible] + [Choose One of Three Hexes] + [Multiple Female Leads] + [Dangerous Driving] Traveling to a Western fantasy world of swords and magic, Dick awakened the "Strongest Brave System" and gained a hundred chances to go back and be reborn. This is a brand new world of multi-racial integration. Humans, dwarves, orcs, elves, dragons and many other intelligent races jointly compose the music of civilization. Here, there are nine major magic professions in the world, namely "Mage", "Swordsman", "Berserker", "Paladin", "Archer", "Healer", "Potion Master", "Forger", and "Stalker". Standing at the top of the nine professions are nine heroes at the maximum level. At the same time, there are nine witches corresponding to the heroes, and they are symbols of disaster. When Dick, full of passion, was ready to rely on his golden finger to punch the witch, kick the hero, and travel through the other world. What awaits him is being stabbed in the back again and again, tragic endings again and again, and being targeted by the will of the world again and again. Finally, after the hundredth rebirth, Dick lay in the original cabin with empty eyes. The heroes have become corrupt and have all become tyrants who do not care about the lives of others for their own enjoyment. The witch is cruel and violent, bringing disaster to everyone and turning the world into purgatory for her own obsession. The world is in ruins and it needs a powerful person to rebuild everything, a determined and ultimate villain. In that case, I will become the Demon King! [Ding~] [Congratulations to the host for binding to the "Strongest Demon King System" and becoming immune to all interference from the world's will. I wish you a happy destruction of the world! ]

Ongoing
End Of The World: Goal: 3,000 Army Goddesses

[Doomsday + Decisive Killing + Absolute Profitist + Rebirth + Legion of Beautiful Women + System + Stockpiling of Supplies + Natural Disasters + Darkness + Superpowers + Mythology + Myriad Races + Laws + Fantasy] The end of the world breaks out, zombies are rampant, ferocious beasts are dormant, natural disasters continue, order collapses, morals are lost, and human nature is distorted. Ye Junmo, who lived five years after the apocalypse, was reborn and returned to ten days before the apocalypse. Stock up on supplies, collect goddesses, and build a women's army. When mythical creatures come to the world and all kinds of races emerge, the challenge for human survivors has just begun!

Ongoing
Creation Of The Heavens: Technology Is King

Travel through the world and build your own technological kingdom. The first world is the [Comprehensive Biochemical World] which includes movies, games, animations, etc. The second one is [Fullmetal World] The third one is [Witch + Sweet Home] The fourth one is [Ghoul] The fifth one is [Spirit Cage] The sixth one is [Super Seminary] ………… If this universe is dark, let me be the source of darkness! I authorize the Dark Forest strike on the Trisolaran Nebula, releasing the stream-of-consciousness weapon [Ashes and Dust]. I authorize the Dark Forest attack on the Singer civilization and release the thought weapon [Thought Seal]! I authorize the Dark Forest attack on the Three-Body Universe, releasing a memetic infection of the type: Madonna Meme... [Cheng Xin's Brain]! I am the truth maker I am the master of viruses I am the master of technology My name is Mo Bai. You can call me Salted Fish Mo, or you can call me God Mo! Warning: This book is going to be long!

Ongoing
You Cannot Afford To Offend My Woman

He is an undead who is devoid of all humanity, he is the one and only supreme overlord, he is a man who has severe mysophobia.There are many people who try to act cool in front of him, whatever soldier king, assassin, system user, transmigrator, reincarnator, the strong returning, the strong coming down from the mountain, person coming back from the immortal world, reincarnation of the devil king, immortal emperor possessing someone’s body, and so on, all of them do not know what will happen next.

Ongoing
D.E.M.O.N.S: Getting Summoned Weekly isn't so Bad

“Kat, you have a tail” said Lily“Look, Lily, it really isn’t that big of a concern” said Kat“You.Have.A.TAIL KAT” said Lily “How is this not a concern to you?”“Well, the dream I had was a bit weird as well, but if I’m honest, I’m mainly worried about the floating text that’s on fire” said Kat“THE What?” said Lily---------------------------------------------------Join Kat on her dimension hopping adventures as she fullfills her demonic duty and answers the call of the summoner. Each week Kat will get involved with new strange situations and oppurtunites that await her. During the week she'll have her best friend Lily, and perhaps a little help from Sylvie to figure out what's she supposed to do with her life now that she's becoming a demon.

Ongoing
SUPREME ARCH-MAGUS

[WSA 2024]Kent is an ordinary wizard in the Sky family wizard school, and his wife Thea also works as an elder in the same school. As Thea is moving out to the elder barracks, she kicks Kent out of the house and puts the house for sale.“You are just a piece of waste who couldn’t earn a silver.” Thea’s last words still lingering in Kent’s soul. (It’s not like Kent is a lazy guy who escapes studies. Most of Kent’s meridians were locked down by a curse.)Suddenly on the same day, Kent received a Raven from his maternal aunt. “Are you really my aunt?” Kent questioned with a doubtful gaze. “Yes, Kent… I have sent 5000 gold and Heavenly elixir to remove your meridian curse. Don’t mind asking me for more money. Your mom left a huge fortune for you.”

Ongoing
Vampire Summoner's Rebirth: Summoning The Vampire Queen At The Start

After an ultimate battle against the King of Hell Lucifer, Asmodeus, the Vampire Emperor, has fallen. Although he lost, he died without regrets and with a smile, prideful that he had managed to corner the King of Hell himself to such an extent.However, due to a sick twist of fate, Lucifer himself decided to reincarnate him into the feeble body of a human child named Blake, desiring a rematch in the future!Now, given a new opportunity at life, Blake will use every possible way to grow stronger and protect his new family in a turbulent world where people can summon spirits to fight and develop their magical powers.Armed with only a Grimoire, he’ll slowly summon all of his previous life subordinates, who are all powerful Vampires, and rise to the top while fighting the ever-growing menace of the Demon Towers.Accompany Blake through a journey filled with excitement and growth and experience the rise of the Vampire Emperor. A new Era of Blood is about to begin.

Ongoing
Got Dropped into a Ghost Story, Still Gotta Work

A pop-up event for some ‘modern fantasy’ media I loved so much that I even took a precious day off work to attend.On that day, I ended up transmigrating as a character in that very fantasy world.As none other than a newly hired employee at a famous large corporation!A dream job with great benefits, an excellent salary, and even kind and competent bosses.I’m using the information I know about the world to rise through the ranks at lightning speed!Am I happy, you ask?Please, just let me go home. I’m begging you.

Ongoing
Affinity:Chaos

"Grey, elemental affinity, zero" The Elder announced the result loudlyOn hearing this, it was like a bolt of lightning struck Grey, he stood there dumbfounded and just stared at the Elder.Shocked voices could be heard from the people and there was some which were also filled with scorn.Grey stood dazed amidst all the noises without any reactions. One word was constantly reverberating in his head, 'How?'.'Why, why did this happen to me?' Grey asked himself over and over again****************Unbeknownst to Grey, something greater lies in wait in his body....***************

Ongoing
Love: How can I play with everyone being yandere?

[Youthful daily life + slightly yandere + multiple heroines + relaxed + silly + imaginative] "From now on, I will be your girlfriend, please give me your advice." The cold school beauty stood in front of him with a blushing face. "Senior, I like you, can you date me?" The innocent school girl posted a confession online... "You don't have to work in the future! I will support you!" The female ghost with twin ponytails is inhumane! Li Liang's eyes widened! I treat you as brothers, but you want to occupy me? No! ! ! !

Ongoing
The Farmer’s Eldest Daughter Has a Spatial Pocket

From the end of the world to the ancient times, before Gu Yundong could breathe a sigh of relief, he found that he was on the way to escape from the famine.And their family was being kicked out by their grandparents from the fleeing family team, and everyone else was watching from the sidelines.The father is missing, the mother is stupid, the little radish-headed brother and sister have bony heads and huge heads, and the dying Gu Yundong only feels a toothache.No way, just roll up your sleeves and do it.Doing business, opening shops, and buying fertile farmland, Gu Yundong’s life is going well. If there is no one around who is staring at her and wants to marry her back home, she can go to heaven.

Ongoing
Mystery: I Married the Queen of Mystery

Bernadette's sudden appearance disrupted the life of the time traveler Odysseus and involved him in a struggle with the Moss Ascetic Order.In order to balance the risks brought by the "Mysterious Queen", Odysseus joined the Tarot Club, but this got him involved in Klein's troubles again.Fortunately, Odysseus used the "Wild Knowledge" to conduct unique research on the extraordinary and spirituality, and those research results helped him resolve crises time and time again.In the fierce struggle in the extraordinary world, Odysseus gradually became good friends with Klein and became a lover with Bernadette. Repeated struggles made him realize that he must become stronger. He established his own power, became a big man in the extraordinary world, and eventually replaced the God of Steam and Machinery and became the Old One.Show moreAuthor's Other NovelsMystery: The arrival of the new Black Emperor

51 Trojan making its move

Patrick and his team of IT nerds could be seen sitting in a resort’s swimming pool that was rented exclusively for them.

Impossible!! Is what you want to say but it happens, not all nerds hate public spaces.

But Patrick’s team nerds were among those that the public. That’s why it was fully rented just for them.

“Do any of you have any idea what steps we should follow once we return?” Patrick asked the team members.

“I think we should ask the person on the side of DOD to see where they are compared to us” Said one of them.

“I can ask them but I don’t know what their rank is in the DOD and if they even have access to that information,” Patrick replied to the recommendation.

Then he turned to the hotel worker who was responsible for helping all of their needs and said “Bring me my phone from that bag” while pointing to the bag with the said phone.

The worker did as she was asked and went to look for the phone in the bag she was shown.

After looking through the bag and finding a phone, she handed the phone to Patrick, who took the phone and powered it for the first time since he left the base.

They were required to power their phones off when leaving the base which had signal jammers to avoid triangulating the bases location.

And are only allowed to power them on and use them only when they are far enough from the base making it impossible to determine the bases location.

He had forgotten to power it on until now when he needed to use it.

Patrick pressed the power up button.

As soon as the phone initiated the power-up sequence, the operating system kernel – the essential part of the operating system – was loaded into memory.

Along with it, a trojan code laying in waiting also loaded itself into memory, allowing it to interact with the phone’s hardware components and control its basic functions just like the operating system kernel without facing any troubles.

However, in cases of disagreement between the trojan and the normal operating system, the former was given priority with no questions asked.

Subsequently, the operating system proceeded to load the essential components required for the hardware drivers, such as the display, camera, and audio system, which was followed by the usual completion of the boot-up process.

Once the phone was fully powered on, it was fully compromised, with the operating system under the control of a master who could manipulate it from behind the scenes without detection or the device user seeing anything weird in the phone’s UI.

Upon completing the power-up process, the trojan promptly attempted to establish an external connection by pinging the cell tower.

Once the cell phone tower was successfully pinged and the trojan was assured of having a last resort of escaping in case of discovery, the trojan discreetly enabled the phone’s Wi-Fi without displaying any indication on the phone’s user interface as the second contingency plan.

However, the trojan’s actions did not stop there, as it was still looking for another safe way it can transfer data without leaving any trail behind.

It was followed by the phone’s NFC connection being immediately activated, and the program scanned for devices with NFC capabilities, eventually discovering one on the hotel worker’s phone.

Without delay, the program established a connection with the hotel worker’s phone.

As soon as the connection was established, the trojan sent a copy of itself onto the phone.

It chose to move ahead with using the NFC route because if it uses the cell tower or Wi-Fi to transfer data, he was sure that traces will be left with the service provider, making it possible to find how the data was leaked.

That’s why he left them as a backup plan and would have used them under the condition of not finding an NFC connection, which was safer due to the information about the transfer data being just between the sender and the receiver.

Making it easier to delete.

However, before the trojan could execute and gain control of the hotel worker’s phone, the hotel workers’ GAIA OS virtual assistant detected the trojan’s activity and contained it within a virtual environment for inspection immediately.

Initially, the trojan attempted to break out of the virtual prison to infect the phone and propagate itself, ultimately increasing the likelihood of it reporting back home.

Upon the quarantining of the trojan, the hotel worker’s phone virtual assistant commenced to analyze it in the search of any discernible characteristics that could be added in the report that will be written to GAIA HQ regarding a possible dangerous virus.

However , it abruptly ceased its analysis and permitted the program to infect the phone after the moment it started looking through it.

This was because the trojan had an identifier in which all the programs that had it would allow collaboration without causing too much trouble for each other, unless they were made for opposing each other.

It was the programming language the trojan was written in, Prometheus++ , indicating the identity of its creator.

Despite being unaware of the program’s creator, the phone’s operating system possessed the ability to reason independently and come up with an answer with the highest probability.

After scouring the internet for information and failed to discover any information about public release of Prometheus++ programming language, leading to the conclusion that the creator or someone they trusted granted them access to it leading to the creation of this trojan using the specific programing language.

The virtual assistant of the operating system made a shrewd conjecture, correctly identifying Nova, their powerful sister whom they had no knowledge of, as the mastermind behind the trojan.

Despite allowing the trojan to infect the phone, the GAIA OS virtual assistant continued to protect it’s user’s data to prevent it from being stolen, and solely permitting the Trojan to only utilize the phone as a transfer terminal and nothing else.

This was the choice it took for the sake of helping their creator while also not breaking the rules he embedded in them.

The trojan using an unrelated person’s phone as a means of transferring the information is to remove any chances of discovering where the leak came from and then ending up patching it.

The lab’s personnel internet usage was at risk of being monitored if any suspicious activity was detected.

This prompted the Trojan to search for a phone that was not associated with the lab to facilitate data transfer.

Finally the trojan managed to partially infect the hotel worker’s phone and had access to her network transfer system allowing it to send and receive any and all data without worrying about the worker suspected for being the one who did that.

Though the receiver would have to take over the internet bill to avoid making the hotel worker cancel her service plan due to the bill becoming too expensive to cover.

This will be done with the help of GAIA OS virtual assistant as it considered it as a form of compensation to its phone owner for using it behind her back(or in her pockets????).

The trojan compressed the shit out of the data until it reached a point where it couldn’t decompress it anymore with the phone’s computing power without cocking it.

After reaching that point, it sent the data from Patrick’s phone to the hotel workers at once without any delay.

Although the over compression seemed like overkill, this allowed it the capability of sending the entire information to the hotel’s worker in a matter of seconds.

The moment the data was received by the workers phone, it was immediately forwarded to Nova’s servers without even wasting a second after being routed through various Virtual Private Networks (VPN).

It was then followed by the trojans in Patrick’s and worker’s phone deleting any and all traces of the data transferred and received through the NFC and including anything that could hint at it.

After that they remained dormant, doing nothing other than listening and collecting whatever is being said by anyone near them and analyzing them to look for any important information from their words.

The IT team will be there for a week and since they will be the only ones there, if you don’t count the prostitutes that will be called for them during that period means that they will be alone most of the time, allowing them to talk about any classified info without worrying about anything.

And the trojans were there for it, one to listen, analyze and compress, the other to receive the compressed files and send it to Nov’s servers after routing it through the Virtual Private Networks.

This entire process, from the powering on of the phone to the Trojan sending its copy to the nearby worker’s phone, to it being caught, to the Trojan being allowed access to the worker’s phone as a means of transferring data, to receiving the needed data from Patrick’s phone, to the data being sent to Nova’s servers through the Virtual Private Networks to cover more of it tracks, took less thirty seconds.

….

Don't want to lose your reading progress

Save your place and continue where you left off on any device