typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1584 Raphael knows! 【Work hard in the new year!】

There are two ways to easily become the world's top hacker. One way is to reach iq above 200, and the other way is simpler!

It's already late in the morning, go to bed!

The mysterious top hacker in the world is preparing to use mixed data attack. This is a more advanced data attack method. By mixing attack data, it will cause a more powerful data attack. (23w[x]

However, the attack method of mixed data shock is more complex, and even some world-class hackers cannot use complex mixed data shock.

"I admit that you are powerful. However, I will tell you what kind of power a truly powerful hacker has!" The mysterious world's top hacker said with a sneer.

After finishing speaking, the slender fingers of the top hacker in the mysterious world began to tap quickly on the keyboard. He would not only use more powerful mixed data impact methods, but also use more computing resources!

As the top hackers in the mysterious world operate, more and more data information is displayed on the computer screen. One of the data information indicates that the supercomputer access authorization has been obtained.

With the emergence of this piece of information, the mysterious world's top hacker accessed the authorized supercomputer. The computing speed of this supercomputer reached 50tflops.

In addition to the previous supercomputer with a computing speed of 30tflops, the mysterious world's top hacker currently controls 80tflops of computing resources.

The mysterious hacker first connected two supercomputers in series and integrated the computing resources so that there would be no coordination problems when the two supercomputers assisted in the work.

After handling the coordinated work of the two supercomputers, the mysterious world-level hacker's eyes narrowed and he began typing on the keyboard with his fingers.

Shuangqing City, the secret underground base of the first-level branch of the Longteng Project.

Yi Zuer reminded Shi Lei, "Private, the mysterious intruder, once again attacked the fourth assessment server. It is carrying out a sabotage attack. The intensity of the intrusion data flow has reached 30tflops. It is increasing rapidly, reaching 50tflops. The computing resources are still increasing rapidly.

Among them!"

Shi Lei's expression changed slightly, but he did not give any orders.

Yizuer took the initiative to ask: "Private, the attack data flow of the mysterious intruder has reached 80tflops of computing resources. The defense of the fourth assessment server is rapidly weakening, and it is expected to collapse in 10 to 12 minutes and 30 seconds. Is there a fourth trial to be added?

Assess the server’s computing resources?”

Shi Lei thought about it for a moment and slowly shook his head. "No need for now, continue to observe the situation of the intruder!"

The top hacker in the mysterious world actually chose to use overwhelming force to directly use huge computing resources to forcefully suppress the fourth assessment server.

Shi Lei was actually very happy about this approach!

Because the other party adopts this method, it means that the other party may expose more information.

Sure enough!

When the mysterious world's pinnacle hacker broke through part of the defense system of the fourth test server, this mysterious world's pinnacle hacker, as if he could no longer endure his loneliness, directly launched a mixed data attack!

Because the top hacker in the mysterious world has broken through part of the defense system. The mixed data impact directly passed through the broken defense system and attacked the inside of the fourth assessment server.

In a mysterious room, the mysterious world's top hacker burst out laughing, "Can you still stop me?"

Based on 80tflops of intensive distributed computing resources, the top hacker in the mysterious world launched a mixed data attack. This powerful attack finally broke the defense system of the fourth assessment server.

In addition, the powerful mixed data impact caused violent data shocks, which completely destroyed more than one million iwn color eds that constituted 100tflops loose distributed computing resources.

The top hacker in the mysterious world looked at the feedback data of the mixed data impact, with a proud smile on his face, and said to himself: "Humph! After the zombie network is defeated, I want to see what else they have.

Means! Do you want to enable a supercomputer?"

The world's top hackers need to capture supercomputers as proof. Among the world's public supercomputers, the vast majority already have powerful hacker masters.

Some of the supercomputers that survived were not forgotten by hackers, but those supercomputers were protected by strong security strategies and security experts. It is no less difficult to compromise those supercomputers than to seize a supercomputer that already has a hacker owner.

The top hacker in the mysterious world repeatedly thought in his mind that none of the top hackers in the world had joined, so he was completely relieved and prepared to sit back and watch the joke.

It's just that he didn't take it as a joke, but instead made himself the joke!

Because the fourth assessment server actually withstood the impact of mixed data and did not completely collapse. To make matters worse, the 100tflops loose distributed computing resources that had been completely destroyed actually reappeared in the fourth round.

Inside the field assessment server.

The expression of the top hacker in the mysterious world this time is truly shocked!

He even held the mouse and turned the page upwards, checking the history of feedback information to determine whether he had read the wrong feedback data information when the mixed data was impacted.

However, the top hacker in the mysterious world looked even more gloomy after checking the historical records. The information in the historical records showed that he was not wrong. The 100tflops loose distributed computing resources of the fourth assessment server were indeed completely destroyed by the data shock.

.

But what the hell is the current situation?

Could it be that those computing resources believed in the extremely powerful God of Spring and were resurrected in full condition?

In fact, within the iwn secret network, which provides 100tflops of computing resources, more than one million iwn EDs can indeed be resurrected with full health.

The top hacker in the mysterious world just now used 80tflops of intensive distributed computing resources and adopted a hybrid data impact method. The data shock caused by it really destroyed all iwn color ed.

But the ultra-low extraction performance solution designed by Shi Lei for the iwn secret network once again saved the iwn secret network. After the data shock destroyed all iwn EDs, Yizuer directly rebuilt all iwns in less than ten seconds.

Colored, once again constitutes a loose distributed computing resource of 100tflops.

This is as powerful as an immortal body!

The face of the top hacker in the mysterious world changed. He had to think about a question. Is the fourth assessment server set up a gimmick, or is it really assessing relevant testers?

So, did anyone pass the fourth server assessment?

If there are really people who pass, what kind of technology will they possess? The top hacker in the mysterious world thinks that he has powerful technology, but he still cannot defeat the fourth assessment server. Is there anyone else who can defeat him?

It is undeniable that there is a certain gap among the world's top hackers.

But how could that kind of peerless hacker, who could be considered the best, be included in the assessment test for peripheral members?

‘S.o.b! What kind of plan do you have? Are you just joking with everyone?’ The top hacker in the mysterious world looked a bit annoyed.

After thinking for a long time, the top hacker in the mysterious world finally made a decision!

That means no longer deliberately hiding oneself, no longer deliberately blocking the fourth assessment server from sending information, but actually launching a hacker attack and defense war with the fourth assessment server.

The mysterious world's top hacker really doesn't believe that he can't take down a server that only has 100 tflops of loose distributed computing resources!

The secret underground base of the first level branch of Project Dragon.

Tao Wenxian and Raphael were also attracted by the situation on Shi Lei's side. They sat one on the left and one on the right behind Shi Lei. The three of them checked the relevant situation through the lip lens information processor.

"Brother Shitou, where did this guy come from? Some of his attack methods look very simple, but when combined they are so powerful!" Tao Wenxian asked.

Shi Lei shook his head, "I don't know! It's precisely because I don't know this guy's identity that I personally analyzed who this guy is! But so far, I haven't analyzed this guy's identity information."

Raphael's eyes flickered and he said, "Stone, has this guy broken through the relevant data records of the first three assessment servers?"

Shi Lei nodded and directly ordered: "Yizur, send the relevant information to Mr. Feeney."

"Yes, private!" Yizuer sent the previously recorded information to the lip lens information processor worn by Raphael and Tao Wenxian, so that they could view it by themselves.

Shi Lei was observing the fierce offensive and defensive war that was taking place between the mysterious world-leading hacker and the fourth assessment server.

As time went on, the fourth assessment server controlled by Yi Zuer showed no signs of being broken. The main reason was that Yi Zuer turned on the cheating mode under Shi Lei's instruction.

Once the attack by the top hacker in the mysterious world is too powerful, Yizuer will mobilize more resources from the iwn secret network to coordinate defense.

After Shi Lei analyzed it, a suspicion arose in his mind!

At this time, Raphael suddenly said: "Stone, this mysterious world-level hacker, I think I know who he is!"

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!

ps: Is the annual vacation over?

Get to work!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next