| Orochimaru_Open_Signal·Strong | [Connected]
Found it!
Hiroki stared at the flashing connection icon, and everything suddenly clicked into place.
This is it—the root of the problem! That forced connection!The enemy was continuously transmitting malicious data packets and executable files straight into his system through this open port!
He didn't know when Orochimaru had linked to him, or how he'd done it—but this kind of forced link shouldn't even be possible.Even on a normal laptop, Wi-Fi connections required permission. You could spoof a network name, sure, but not force a connection out of nowhere.
Orochimaru had completely bypassed the rules.He must have planted some kind of backdoor beforehand—a virus embedded deep in Hiroki's system.
But whatever method he'd used, if Orochimaru could connect once, he could connect again.Simply disconnecting wouldn't be enough.If Hiroki couldn't find and eliminate the hidden "virus file," the connection would just re-establish itself.
There was only one real solution left—to build a barrier before the data even reached his core.
A firewall.
Hiroki's expression sharpened.
This is my domain.
His consciousness surged, processing at lightning speed.He created a new blank file in his mental desktop and named it:
[Illusion Firewall v0.1.bat]
His thoughts became keystrokes, and lines of code began streaming across the blue expanse of his mindscape. Each command targeted the source link—Orochimaru_Spiritual_Link—and filtered any incoming packet containing the keywords "jutsu," ".exe," or "illusion."
Within seconds, the script was complete:
Code Snippet
@echo off
set target="Orochimaru"
:monitor
for /f "tokens=*" %%p in ('scanpackets %target%') do (
if "%%p"=="jutsu" (
block "%%p"
echo [Blocked]: %%p
) else if "%%p"==".exe" (
block "%%p"
echo [Blocked]: %%p
) else if "%%p"=="illusion" (
block "%%p"
echo [Blocked]: %%p
) else (
allow "%%p"
)
)
goto monitor
"Run."
With that single command, the program came to life.A log window appeared in the corner of his consciousness, scrolling bright green text:
[Firewall activated — monitoring connection: Orochimaru…]
Hiroki turned back to his Task Manager.HellVision.exe was still devouring his system, eating up 89% CPU and 3.2GB of memory.
"End process."
He hit OK.
This time, the world truly fell silent.CPU usage plummeted from 89% to 15%, memory dropped to a normal 800MB.The malicious process vanished—and for the first time, nothing took its place.
Two new entries appeared in the firewall log:
[Blocked: HellVision.exe][Blocked: Nirvana_JadeSerpent.exe]
Success!
Hiroki's eyes snapped open to the real world.Kushina stood a few meters away, blank-eyed, drool at the corner of her mouth—still trapped inside the illusion.
Farther away, perched on a branch, Orochimaru was watching him with open surprise for the first time.
But before Hiroki could even catch his breath—an alarm blared in his head.
The Task Manager flickered red.Countless serpents slithered across the mental landscape, hissing and coiling endlessly.CPU usage spiked again—15%… 23%… 35%...
Another illusion?! No—something else!
He quickly sorted processes by CPU load. No ".exe" names this time. But several core processes were behaving strangely.One stood out:
svchost.exe — 28% CPU
Wait. That can't be right.
That process was supposed to be a legitimate system host. But when he opened its file location, his heart skipped a beat.
C:\Windows\Temp\svchost.exe
Wrong directory!The real one should be in System32—or in his world, the System(>^ω^<) directory with the little cat-face logo!
This one was fake. A virus disguised as a core process.A perfect illusion—camouflaged, parasitic, clever.
Process disguise! Orochimaru had changed tactics, abandoning direct illusions for infiltration.
"How far can ninjutsu evolve…" Hiroki muttered under his breath. "You really are a snake."
Without hesitation, he edited his firewall, adding a new rule set:
Code Snippet
@echo off
:: Detect disguised processes
set legit_path="C:\Windows\System(>^ω^<)\"
set core_processes="svchost.exe winlogon.exe csrss.exe"
for %%p in (%core_processes%) do (
find /i "%%p" processlist.tmp | find /v %legit_path% > fake.tmp
if exist fake.tmp (
for /f "tokens=2" %%i in (fake.tmp) do (
taskkill /PID %%i /F
echo [Cleared Disguise]: %%p
)
)
)
Execute.
The firewall roared to life, purging the corrupted svchost.exe.CPU dropped back to 8%.The illusion around him began to glitch—the snakes turned into pixelated blocks, hissing turned to static, frames lagged like a crashing video game.
[Cleared Disguise: svchost.exe][Blocked illegal memory write: Visual Cache][Blocked illegal memory write: Auditory Cache]
Three seconds later, the serpents disintegrated—deleted from existence.
But the battle was far from over.
Orochimaru's brows furrowed. Realizing his tricks were failing, he changed tactics again—this time, brute force.
The Task Manager flashed red.CPU usage skyrocketed: 8% → 34% → 67% → 89% → 98%!Memory ballooned past 3.7GB, nearing critical overload.
Hiroki's thoughts blurred. His vision darkened. His system was crashing.
I can't just defend… I have to limit his access!
Gritting his teeth, he began typing one last emergency script—his system's failsafe:
Code Snippet
@echo off
:: Emergency Resource Limit Mode
set max_cpu=60
set max_memory=2048
set max_connections=50
:limit
monitor system > status.tmp
if %cpu% > %max_cpu% (kill overload)
if %memory% > %max_memory% (purge cache)
if %connections% > %max_connections% (block external)
goto limit
Hiroki slammed the command: RUN.
The emergency limiter engaged. His internal system groaned under the pressure—but held.
