typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1590 is the perfect ending! Part 1

In the world of martial arts, there is a saying: Once a teacher, always a father!

There are similar rules in the hacker world. Although they are not as absolute as in the martial arts world, they are more sinister in the hacker world.;

What is a bounty hacker?

Bounty hackers are hackers who can do anything for money!

Take the complainant as an example. Although the complainant is from Lijian, if the complainant is given a sufficient price to attack the government network of the US, or even attack the power grid system of a city in the US, it will cause harm to the entire city.

If it brings huge disaster, there will be no hesitation in telling the dead!

Bounty hackers only care about the bounty and the difficulty of the task, not the results of the task, and there is no so-called personal feelings. Of course, it is undeniable that some bounty hackers will refuse to accept certain tasks due to personal feelings.

However, such bounty hackers often disappear from the ranks of bounty hackers because they refuse to accept the relevant information of the task and are investigated for their final identity information.

Real bounty hackers must treat everyone equally to avoid their identity being exposed.

If Tell the Dead, the Dark Lord and Batman join forces to establish a network security company, they will definitely come to the forefront and cannot continue to hide behind the scenes.

The price of going to the front desk means exposing your identity!

Although what they have temporarily exposed is their real personal identity information, rather than the identity information of bounty hackers in the online world. But as they accept network tasks, the identity of bounty hackers will definitely be exposed on the Internet, thus completely

into a tragic situation.

It is rumored that the NSA National Security Agency of the United States has a joint team specifically targeting network security companies, or similar studios, network alliances, etc.

Let me tell you that while they were bounty hackers, they did things that violated the law for too many days. Once their identity is exposed and caught by the authorities, there will be absolutely no good ending!

Therefore, the informant would rather become a member of a peripheral organization in exchange for a clean income of one hundred thousand dollars a month than take risks to gain higher benefits.

Whenever you want to get more, you must pay more!

March 2, 11:58 noon.

Shi Lei, Tao Wenxian, and Raphael all entered the temporary voice communication channel established by Yi Zuer. Yi Zuer forcibly canceled all secondary channels and gathered all online personnel in the top channel.

Shi Lei greeted everyone in the voice channel through the bone conduction earphones of the lip lens information processor. "Hello everyone, thank you for your patience. I am one of the three giants of the organization. You can call me Mr. S."

"

Shi Lei spoke in English, and Yizuer automatically changed Shi Lei's voice. The reason why he chose to speak in English was because every hacker present could understand English. Even if he didn't understand English, it would be difficult.

Become a second-rate or above hacker in the world.

Raphael and Tao Wenxian also introduced themselves. Raphael was naturally Mr. L. Tao Wenxian was not Mr. T, but Mr. J.

Shi Lei suggested that Tao Wenxian combine the pinyin initials of Xia's Mandarin name with the initials of his English name, and the combination would be Mr. TJ.

After introducing himself, Shi Lei continued to speak, "First of all, please enter your bank account in the public chat area of ​​the voice communication channel. The specific input format has been displayed in the lower right corner. Of course, it is best

It’s an anonymous bank account to avoid leaking identity information. I think every friend here should have an anonymous bank account, right?”

All hackers who have entered the voice communication channel temporarily established by Yi Zuer are at the world's second-rate level or above. It is impossible for a hacker of this level to have an anonymous bank account.

The lower right corner of the temporary voice communication channel shows the specific input format. The input format for the bearer bank account has a total of two lines of information.

The first line of information is 'bank name' + 'bank account number', the second line of information is 'confirm' + 'bank account number', and 'confirm' means 'confirm'.

By entering twice, it is ensured that everyone's account will not make mistakes. After all, the 612 people present are not ordinary people, they are all hacker masters. The probability of making mistakes twice in a row is lower than winning the lottery.

.

Three minutes later, Shi Lei looked at Yizuer's statistics and found that 609 hackers had entered bearer bank accounts.

"I'm telling you, Dark Lord, Batman, please three friends to enter your anonymous bank account information immediately. You only have thirty seconds. Once thirty seconds pass, we will regard you as giving up voluntarily." Shi Lei couldn't explain clearly.

Unclear.

The three people who sued the deceased did not hesitate and directly entered the bearer bank account. Anyway, it was just an bearer bank account. If there were any problems, they could give up the account directly.

"Thank you for your cooperation!" Shi Lei looked at the real-time information displayed by Yizuer, and then said with a smile: "After thirty seconds, you can check the anonymous account you just entered, and we have issued additional rewards according to your corresponding level.

Well, let’s talk about it, the world’s second-rate is US$3,000, the world’s first-rate is US$10,000, and the world’s super-first-rate is US$100,000. If there are friends among you who have surpassed the world’s super-level, please feel free to contact us individually later!”

This sentence is quite intriguing, and it vaguely reveals a message that it has surpassed the world's super-class level, and may even pay more bonuses.

Thirty seconds passed quickly, and many hackers were sending text messages and picture messages in the public chat area of ​​the voice communication channel to prove that they had received the bonus.

The complainant also checked the bearer bank account, and carefully used broiler network protection before checking the bearer bank account.

In the bearer bank account, one hundred thousand U.S. dollars were transferred as expected, a clean one hundred thousand U.S. dollars, and an unrestricted one hundred thousand U.S. dollars.

"Have you all received it? If there are friends who have not received it, please wait and contact us individually. I would like to explain that this bonus is an additional bonus and express our apology in advance. Because we will not accept it.

All the friends present. After all, some of them seem to have the same identity as Mr. Chongdun, and we dare not accept it." Shi Lei said with a smile.

Yizuer collected and judged the identity information and exposed some of the official government network security experts lurking in the hacker community.

"We are very tolerant. We hope that these friends, after receiving the bonus just now, can leave quietly. This is not a place where you should come." Shi Lei showed a friendly attitude.

In view of defeating the world's top hacker heavy shield, which is also the heavy shield of the NSA National Security Agency, 57 of the 612 hackers present quit in less than a minute!

Currently, there are 555 hackers left in the temporary voice communication channel established by Yizuer, which is a relatively auspicious number.

"Yizur, are there any potential personnel who can confirm their identity?" Shi Lei asked Yizuer. For such a simple task of comparing information, Yizuer's processing speed far exceeded Shi Lei's.

In less than a second, Yi Zuer completed multiple scans on 555 hackers. "Private r, among the hackers whose identity information is known and confirmed, no lurking personnel have been found yet."

Shi Lei smiled slightly, it seemed that after winning the war with the world's top hacker Heavy Shield, it brought a lot of convenience.

The secret underground base of the first level branch of Project Dragon.

Tao Wenxian stood next to Shi Lei and first asked Yi Zuer to block the bone conduction headphones attached to the lip lens information processor worn by the three of them, and then asked: "Brother Shitou, actually, I think we can use the remaining

Everyone under the organization is accepted as peripheral members of the organization."

Shi Lei thought about it and found that there are currently 555 candidates left. Among them, 36 people passed the fourth assessment, 73 people passed the third assessment, and the remaining 446 hackers only passed the second assessment.

On-site assessment.

If all 555 people are admitted, Mirui Technology Group will need to pay close to US$5.7 million per month.

This is not a small amount. Although it may not be a big deal to Mirui Technology Group, Shi Lei needs to consider whether such a high-profile act will attract the attention of the Lijian National Security Agency.

After all, he has already formed a conflict with Thomson David of the NSA! If Thomson David can't figure it out and insists on inciting the National Security Agency of the NSA to find trouble, it would be a bit too cheating.

"Stone, I think Jazz is right! We can include all 555 hackers in our peripheral organization member list, but we need to make some adjustments." Raphael expressed his opinion.

"Oh?" Shi Lei asked puzzledly, "How should I adjust it?"

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next