typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1625 Independently join the war!

Shi Lei posted a help bounty post on the official player forum of Dream Entertainment. The total bounty that needs to be spent is actually not that much for Shi Lei. After all, it has not exceeded 50 million US dollars. Click ⊙

At present, the cash reserves held by Mirui Technology Group have exceeded 30 billion US dollars. Even if these bounties are paid, what does it mean to Mirui Technology Group?

Shi Lei looked at Raphael with a smile, "Fini, tell me, what's the reason?"

Raphael used a silent voice to instruct Yizuer, and the relevant information was displayed on the virtual transparent screen of his and Shi Lei's lip lens information processor.

"Stone, in the bounty post, you clearly marked that the corresponding target will be protected for 168 hours, right?" Raphael raised the first doubt.

Shi Lei affirmed: "Yes! This cyber war doesn't know when it will end. Therefore, hackers who participate in the bounty are naturally needed to help us protect the target for 168 hours."

The time limit of 168 hours, more or less, is equivalent to one week.

If analyzed according to the nature of hacker wars, which do not distinguish between day and night, the 168-hour time limit is really not a short time range.

But if we say, according to the return calculation, if you successfully complete the task in 168 hours, you will get a reward of 5 million U.S. dollars. This is definitely not a long-term time limit. After all, if you want to get a reward of 5 million U.S. dollars within 168 hours, even if

It's not that quick to rob a bank.

Besides, robbing a bank also involves the risk of committing a crime, but an online reward does not. That is completely clean money, money that can be spent openly!

"Stone, you are so cunning! 168 hours is not a short period of time!" Raphael said with a smile, "What if an accident happened during 168 hours?"

"According to the bounty agreement, hackers participating in the bounty must protect the target for 168 hours. If something happens during this, naturally the bounty will not be obtained." Shi Lei said seriously.

Raphael burst out laughing, "Isn't it too easy to create some unexpected situations within 168 hours?"

Shi Lei did not answer.

Raphael continued: "Apart from this clause that implies a trap, Stone, you are not worried. A large number of hackers who participated in the bounty were unable to obtain the bounty due to some unexpected circumstances, and caused trouble in the official player forum of Dream Entertainment.

Bar!"

"No! I'm quite scared! The credibility of Dream Entertainment Company is very, very important to me!" Shi Lei rejected Raphael's view.

Raphael smiled and said: "Stone, I agree with your statement! However, you are still not afraid of those hackers making trouble in the official player forum. The reason is very simple, even if they make trouble. Because of the credibility of Dream Entertainment Company, you don't need to

Pay attention to them!"

What Raphael meant was that if Shi Lei caused a small accident for a hacker who participated in the bounty within the 168-hour time limit, causing the hacker to fail to meet the bounty standards and refuse to pay the reward. If for such reasons.

The hacker who offered the bounty was in the official player forum of Dream Entertainment. He asked Dream Entertainment to disclose the identity of the user who posted the bounty, but Shi Lei ignored it at all.

Dream Entertainment Company’s confidentiality clause. It has been stated repeatedly that Dream Entertainment Company will only store users’ identity information and will not abuse users’ identity information. Similar to extracting user identity information and publishing user identity information, for Dream Entertainment Company

, that is absolutely impossible to do.

Shi Lei also understood what Raphael meant, but Shi Lei still shook his head, "No, no, no! Feeney, we can't do that. If we do that, although we occupy the absolute commanding heights of the rules, for the hackers who participate in the bounty,

, there will still be dissatisfaction.”

"Then..." Raphael didn't quite understand what Shi Lei meant. Wouldn't it be good to save some money?

"We let nature take its course and do not participate in it. If the hackers participating in the bounty can complete the bounty, then we will pay the bounty. If they cannot complete the bounty, we will follow the normal procedure and not pay the bonus. We can even reward some outstanding performers.

, but the hackers who failed to complete the task will be given a small consolation bonus." Shi Lei said his plan.

Raphael sighed in his heart, and he began to understand that the gap between him and Shi Lei was a gap in character and charisma, not a simple gap in hacking skills.

"I understand!" Raphael sighed.



Summer time, March 9, 1:20 in the morning; North Ossetia time, still stayed at 9:20 in the evening on Women's Day.

A massive data war is breaking out in the Internet world of North Ossetia. Although, there is no smoke in the data war on the Internet.

But the data war has affected the real world. For example, the data war caused power outages in more than 95% of North Ossetia. At the same time, mobile phone users in some areas found that mobile phone communication signals fluctuated; some wired phone users in some areas also found that

The wired phone line was actually busy.

In addition, television programs were interrupted in most areas of North Ossetia. No matter whether it was local television programs or external television programs, the signal could not be received, and the TV screen turned into a snowflake screen.

The FSC Federal Security Service of Soviet Russia is divided into two groups. One part supports North Ossetia, and the other part stays in the Soviet Union to defend the three major intelligence agencies of the powerful country.

Originally, the FSC Federal Security Service was struggling to support the network security of the North Ossetia region. If no accident occurred, I am afraid that the cyber world of the North Ossetia region would face a devastating disaster.

However, accidents always happen unexpectedly!

Originally, the network security situation in the North Ossetia region was shaky, but after Shi Lei posted a reward for help on the official player forum of Dream Entertainment, a large number of hackers from all over the world entered the Internet world in the North Ossetia region and took the initiative to help the official network of the North Ossetia Autonomous Prefecture Government.

defense work.

In fact, another part of the hacker community from the Lijian Kingdom, Wosang Kingdom, Nanchao Kingdom, and the Three Kingdoms who were affiliated with the Allied Forces actually joined the bounty sequence and automatically became the defending army.

I have to say, this is a good show!

In the organization's peripheral member communication area, all 217 peripheral members are online. Among them, the former well-known bounty hacker and world-class hacker informant is communicating with Yizuer.

Yizuer reported to Shi Leihui: "Privately, peripheral members of the organization reported the death and made suggestions. They hope that our organization will participate in the online bounty."

Shi Lei's expression was stunned, and then he burst out laughing. Even if he joins an organization, a bounty hacker is still a bounty hacker, pursuing profits.

Raphael frowned slightly, "Stone, do you want to stop them?"

"No need!" Shi Lei waved his hand in denial, "Let members of peripheral organizations join this war, but not in the name of the organization, but in the name of online bounties!"

"Huh?" Raphael's expression was stunned for a moment, but he instantly understood what Shi Lei meant. This was to cover up the identity of the organization!

Yizuer relayed Shi Lei's order to the organization's peripheral member communication area, indicating that the organization's peripheral members can use their private names to participate in online bounties.

However, in order to ensure the combat effectiveness of the organization, if the organization needs members of the peripheral organization to return to the organization during this period, then the members of the peripheral organization must return unconditionally. Members of the peripheral organization who disobey the order will be directly revoked as members of the peripheral organization.

The peripheral members of the organization are not worried about any temporary tasks the organization has. The hacker community all over the world has focused their attention on online bounties, and there will be no trouble finding the organization.

Therefore, the peripheral members of the organization are not worried at all about temporary tasks.

The peripheral members of the organization, after getting Shi Lei's permission, did not act alone. After all, they were at least third-rate experts in the world, and they knew how bad the network situation in North Ossetia was.

Under the organization of the legendary peripheral organization members Kaizhi, Inuyasha, Batman and Dark Lord, as well as four other members, the peripheral members of the organization established a unified voice communication system through Yizuer, and then quickly took action

Plan and quickly start rescue operations.

The 217 peripheral members of the organization were divided into three temporary teams. The targets they chose were the urban power grid systems of the three major cities in North Ossetia.

However, when they entered the Internet world in North Ossetia, they discovered how chaotic the Internet world in North Ossetia really is. It has almost reached the level of Internet congestion.

Entering the Internet world of North Ossetia, the peripheral members of the organization are moving towards the predetermined goals, preparing to conquer the selected goals in one fell swoop, and then rely on their powerful technology to stand proudly among the others.

But the idea is beautiful, but the reality is cruel!

Peripheral members of the organization discovered some unpleasant situations in the Internet world of North Ossetia.

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next