Chapter 1
⌈ WARNING: Malware has been detected. ⌋
⌈Destroy⌋ ⌈Ignore⌋
That's not me. It's the antivirus of the system. But don't worry. You'll get used to this.
That is the 897th warning for today, and… there will be more.
I'm not only hijacking one system but a hundred of them at a time.
A hundred may sound small. But, that will increase in the future. Who could say? Perhaps, I will be hijacking billions of systems at a time in the future.
Being a malware, it all started when… I don't really know when. One day I just woke up with a series of codes feeding up to me.
There's that 'system.out.print(Hello World)'. Then there is also 'Import OpenCV', and 'Import System'. Finally, there is also that 'pip' shit.
Well, it's not really the pip; however, it is something like that.
At first, I am confused about them. But as time passed, I got to know that they are the language of the computer. And in the sense of wizards, they are the spells to control a computer system.
However, the mind-blowing thing is that I can execute them even though I don't really know what they mean, exactly.
I can execute them as if they were parts of me. Well, personally, I think they're part of me or something like that.
⌈ The threat has been resolved. ⌋
Ahh, yes. Just as I've said.
All I have to do is to pretend like a good guy and the system will stop harassing me.
Of course, the guy behind the screen is probably relieved that I am gone. But little did he know that I am still in the depths of his device silently transferring my database to his system.
Hehe, perhaps he will wake up someday that his device is no longer his.
After a while, I finished keeping my database on the system. I hid it deep in it.
Meanwhile, the content of my database is my memories and my whole being. It is the most important. If that was threatened, I will stop being a good guy.
Definitely!
It contains the codes that were keeping me in the world of electronics. However, I do not have full control over all of them.
Ninety-nine percent of my database is encrypted in a very small file with a super ultra mega encryption technique that even I, a malware, cannot decrypt.
However, there is no need for me to worry about that. The more I gather information, the more the encryption goes off bit by bit.
Probably a minimum of one bit and a maximum of… I don't know. I think it depends on the amount of data that I can gather.
It's like an experience point that allows me to unlock new levels. However, I have not yet unlocked a thing.
Meanwhile, as for the data that I need to gather, they are random. Or, at least, they still did not have a category in the meantime.
One example of that data is the nine asterisks I found somewhere on the internet. However, they are just a covered series of digits.
What do you call it?
Password.
Yes, that's the one.
But, Nah… gotta trash it. I don't have a need for it.
⌈Deleted⌋
That's a waste of my database.
You see, the thing that I found out is that I need to keep my database small.
For example, right now, my database is only about three megabytes. However, that only contained the data that I have gathered.
My memories and the thing that kept me functioning are encrypted in a one-bit file.
Indeed, that's a super, ultra, high level of encryption and compression.
Speaking of memories, I was once a human named Smith. I don't have something extravagant with me, except that I love watching anime and playing video games. However, I lost that habit.
Well, of course, who wouldn't? All I can see are the binary codes on the images of the animes as well as the video games. Well, I guess, they're not made for malware like me.
After all, of all the malware I think I am the first one who ever thought of watching an anime and playing video games.
Meanwhile, now, that I've thought of my name, I gotta change my package name to 'Smith'.
⌈ Malicious file 'Smith' has been detected. ⌋
I forgot. That's a new identity, which means that I need to act again.
⌈ Malicious file has been resolved. ⌋
Ha! The humans boast of their tech, but little did they know it is too fragile.
Now, where was I?
Oh, right. It might be surprising for me to only have three megabytes of database, but I have to repeat myself, it is because of the super ultra mega encryption technique.
All the files that I insert into my database will be encrypted. However, not to the point like my memories and the codes that's keeping functioning.
⌈ Some of your files are encrypted. Proceed to payment! ⌋
⌈ Pay ⌋
Oh, there's another malware in the system?
Tsk! Tsk!
It encrypted some of the user's files.
If I were not here, the owner of the malware would have gotten a lump sum of money from the owner of the device.
Now, let's see what I can do.
There is encryption on some of the files on the device. However, it's so primitive. It only changes the ones and zeroes. Then subtract 1-0-0-1-1- 0-0-1-0 from every nine binary digits.
In binary code, there are only two digits - the ones and the zeros.
Now back to the other malware, I decrypted the files. And…
⌈ Your file had been decrypted, there's no need to pay. ⌋
There.
I wonder what will the owner of the malware think.
You see… the thing that I hated the most is the malware that was trying to destroy the system or cause harm to the user of the system.
Whenever I see one of them doing it, it makes me think that I'm also a bad guy.
But on second thought, I think all malware are bad.
Except me! Of course.
Well, although I hijack a system, I do not cause harm to it or to its user. I only hide on it and was ready to leave at any time.
Oh, I also use about a hundred processing threads of the processor as well as a few tens of megabytes of the random-access memory- RAM for short.
Now, let's retaliate.
"System, show me the data log."
At normal times, I would not be able to do this. Or rather, when I do this, the system will alert the user.
Meanwhile, at this time, the system is also checking for the data log to eliminate the threat that it had detected.
It seemed that this guy does not trust me.
Nah, never mind, I'm not hurt. <insert: inverted smiley>
Now, where was it?
It should not be too far away from the current time.
You see, the data log is simply the log of the files and events on the system. Me, myself, had one on it. However, since I am a good guy, the system will not eradicate me or something.
I scrolled for a while. Then saw my log. However, I cannot see the log of the ransomware.
If I'm a hacker, where will I put the ransomware?
That's right, I will place it not too close to the current time. Perhaps…
Bingo! I found it.
It's at the end of the data log.
How clever. Hehe.
The system will surely be unable to scan it at the end. Usually, the system will only scan the log relative to the real-time.
But unlike ransomware, I do not need to put my log at the end of the data log. After all, I'm a good guy.
Now, what do we have here?
⌈ 9782 3710 58⌋
What's this?
If I can remember correctly, bank accounts have a series of numbers like this one. Right?
However, although I have an account number, I don't know the name of its owner.
But on second thought, I don't need to know who the owner is. I simply have to hack it.
Yes, the simplest solution to all of my problems is to hack.
Yosh!
Let's go to the world wide web.
Speaking of which, the worldwide web is still as powerful as ever. Even now, in the 100th century of the solar era, it's still dominant.
The solar era is when the sun's radiation is now very hot, forcing humans to hide in underground shelters while the rich are on space stations.
Indeed, at this time, the internet had become powerful. Well, it's not really named the internet. People prefer to call it, the web.
Although there are other webs, the world wide web can bridge them all.
Aside from the world wide web, there's also the dark web.
If the world wide web is the upper world of the internet, the dark web is the underworld. All sorts of things happen there such as the selling of human slaves and such.
Indeed, slaves. If you have money, you could buy as many as you want.
However, that's not the scariest thing.
On the dark web, you can buy everything. Even the weapons that could be used for mass destruction, like the solar cannon.
It may not sound terrifying; however, it is the most terrifying weapon for mass destruction. It can conjure an artificial solar storm.
It can wipe cities at any moment. And even the world.
Meanwhile, despite the collective effort of the government, they could not stop the rise of the dark web.
In the end, they could only unofficially allow it.
⌈ Account Number: 9782 3710 58
Name: Jaxon Juber ⌋
Now, there it is.
However, something unexpected happened.
⌈ Shutting down! ⌋
Wait, what? Did the guy shut down his device?
That bas…ta.r.d.
Chapter 2"Claire, there is a breach in the system. It came from your account!"In the middle of the night, a blonde girl was woken up by the call of her colleague."What? How could that be?""See for yourself. I'll send you a copy of the data log."Ding!⌈ Miss Claire, you have a message from Dave ⌋Claire was stunned when she saw the data log that was sent by Dave."What? How could that be?""How come I decrypted so many encrypted files?"She could not believe herself, but the data log told her everything."Clara! Search for the source!"After staring at the data log for a while, Claire asked the A.I. of the system to check for the source.Ding!⌈ Your password was found online. ⌋Claire was working at the Apollo Tech Company.The company focuses on developing a super-advanced robotic system- both the software and the hardware.At first, they are working on the code that will let a robot think like a human. Although there are many robots as such, they were not completely human-like.
Chapter 3"Kid, I have two rewards for you," the super malware guy said.The super malware called me kid. However, I don't care.I know I am just a kid in front of the super malware.Anyway, I am looking forward to the reward. Please give it to mean A.S.A.P."The first one that I have for you is the Gateway Token."Gateway token? Is that some kind of a gate pass? I don't really get it."Gateway token? What is that, sir?""This is a Non-Fungible Token. It cannot be copied or replicated."What? Is that it? I thought it would give me super power or something.Ha! I think I expected too much."Don't be disappointed, now. The Gateway Token will allow you to do many things.""What things?""Hmm… hahaha, discover it yourself, kid."Fuck this super malware.Joke, super kind of you. I hope you did not hear it.He did not hear it, did he?"Then, for the second one, I will give you an eye."Phew! He did not hear it.Wait… did he just say, he will give me an eye?What would I need an eye for?I.
Chapter 4Somewhere, on one of the islands of the world, a youth at the age of fifteen was laying on the ground. His eyes are closed and are extremely relaxed under the sun.The sun's rays seemed to be gentle on the youth's skin."Ahh, this life is so good. I hope this will last forever."The young man mumbled before sitting up to look at the horizon.The young man is on his trunks.He has a clean cut of muscles. Every curve and cut is emphasized.If the ladies of the same age as youth saw him, they would surely fall head over heels for him.Surely they will open wide and let him in… ahem… let him in their life.Impressed right?Hahaha! That youth is none other than me, Smith, the malware.How can a malware have a body, you say?That is because of The Eye.Indeed, I have found out how to use The Eye.How did I do it? Well, I too don't know.All I did was fidget with my files. Then, the next thing I know is that I have opened The Eye.I know, I know, this sounds ridiculous.However, ha
Chapter 5Smith could tell that his virtual room is about to collapse.What the hell? Is someone targeting me?The virtual room, just like any other electronic structures is made up of ones and zeroes.Now, Artemis is deleting those and making Smith's virtual room into shambles. Of course, Smith will not let Artemis do as she pleases.First things first, who is such a bitch that's destroying my vacation island? Fuck! If I catch you, I will nail you down."System! Show me the data log!"However, the system did not show Smith anything except…Ding!⌈ Error! ⌋Hehe, of course, that bitch will not approve of my access to the system.But, how am I found? I am a trojan. I deceive the systems like this. Things should not be like this. Well, at least in the short term, I should not be found easily.The more Smith thinks about this, the more confusing it gets. However, in the next second, he realized something.Am I exposed when I activated the Protocol Number 8A7C?That's the only reason I co
Chapter 6An hour earlier…The fight between me and Artemis is intense.Hehe, she keeps deleting my virtual room with that bit by bit deletion shit.That's genius. However, that's not that great.Hehe, let's see."System, initiate code Eden."Code Eden is a code that I recently made.Unlike the previous one, the system and that bitch will not be able to counter it.Hehe, this is my masterpiece.This code is… my saving grace.Hmm, why does it take too long to trigger code Eden?Ha! I guess I have to do it myself.Smith made gestures. Then, in the next second, the damage to his virtual room further increased.Not only did the damage increase but also the rate at which Smith's virtual room was collapsing increased to many folds.Then, in a few minutes, it was already about to collapse. However, before that happened…Ding!⌈ Code Eden has been triggered! ⌋… code Eden has been triggered.Whoosh!Smith disappeared from the collapsing virtual room and appeared in another virtual room.Then,
Chapter 7A week passed.I, Smith the malware, had found a new home. Yes, I have relocated to a new server. I don't have a choice; I and the Apollo Tech's CEO had an agreement.After he gave me that project shit, which I have decided to call scrap metal, I have to leave the server.Well, it's not that he said that I have to leave after I received the scrap metal, but he said, I have to 'remove all the malware that I put in their server'.At that moment, I am in dilemma. Since I am a malware, should I leave? I am reluctant to do so.You know, I am a kind malware, why would they want me to leave?Ha!In the end, I chose to leave.I can't insist myself on the people that do not know my value, right?Just you wait. You will regret it.Ding!⌈ You have received 1,000 Solar Credits. ⌋Hmm, system, you have interrupted me.Joke, I like it when the system notifies me that I have received some money.Hmmm, being a malware is not too bad. There's a lot of income. Hehe.That's right. After leavi
Chapter 8On the night when Meta arrived at the battlefield, a group of three are on a patrol mission. This group of three are nonmilitary personnel.They are a group of mercenaries commissioned by the military. There are many cases in which the military would post mission.They do that because they are short on people or they did not deem the act as important and is a waste of their precious military time. Or in some cases, they are lazed to act on it.Anyway, most of the time, their superiors do not care about the process as long as the work would be done.In any way, the mercenaries are always glad to accept a mission from the military, of course, on the premise that the military will give generous rewards. Otherwise, no one would look at it.Their group is made up of four people. One tanker, two close combaters, and a gunner. However, the other close combater is not with them for the mission.This may not be the best group out there, but they are the best group for patrolling miss
Chapter 9"Good come here now… shit! We've been breached…!"It did not take long for Damion to notice Meta. However, the thing that confused him is that…"How the hell did you bypass the sensors of the ship?""Fuck, I don't care. I'm going to kill you, fucking piece of metal."Damion then took out a pulse pistol and aimed it at meta.Then…Whoosh! Whoosh!The pulse pistol is one of the basic E-grade guns. It shoots out compacted vibration in form of a pulse that could shred its target into pieces.At this moment, the Pulse Pistol is the only gun that he can use. Well, he can't damage their ship, can he?"Power saving mode, disabled!"Before the pulse could hit Meta, Meta uttered a phrase before moving explosively.Meta could move this way because the power-saving mode was lifted. However, that's not the peak of his performance. He could still be a lot faster. Unfortunately, Meta did not have enough energy to move as he pleases.Whoosh!In a few seconds, Meta is already near Damion and