It's not a charity organization, it's a hacker organization, a powerful hacker organization with three of the world's top hackers!
It is obviously impossible for such a powerful hacker organization to accept members casually, and even peripheral members cannot easily gain recognition.;
The four assessment tests designed by Shi Lei were just to judge the abilities and identities of the hackers participating in the test, and then to select some hackers and invite peripheral organizations to join.
"What about the situation abroad?" Shi Lei is actually more concerned about the situation abroad. Relatively speaking, free and powerful hackers are more likely to appear in foreign hacker circles.
There are too many restrictions in the domestic circle, whether it is hacker-related knowledge or the overall environment. Under such circumstances, it is difficult for lone ranger hackers to reach high-end levels.
Tao Wenxian looked at Raphael, "Raphael, tell me!"
Raphael knew more about hackers in overseas areas than Tao Wenxian. Raphael did not refuse, but explained in detail.
"The situation overseas is generally similar to that of Xia Country. Especially the hacker circles in some poor areas, who have some strength, have chosen to join our tests, and during the test process, they have tried their best to show their strength. As for developed areas,
, there are fewer hackers participating in the test, and there are basically no hackers who have participated in the hacker organization for testing." Raphael explained the situation in overseas areas.
Shi Lei thought about it in his mind. This test to recruit members of peripheral organizations would not only bring some powerful helpers, but also attract some enemies with ulterior motives.
Therefore, Shi Lei needs to carefully judge which members should be recruited to avoid being bitten by the snake instead.
"Yizur, show the results of the current test!" Shi Lei ordered.
It is now two o'clock in the morning, and a lot of information has been collected in the test system.
"Yes, private!" Yizuer responded to Shi Lei and sent the test result data to Shi Lei, Raphael and Tao Wenxian respectively.
In the virtual transparent screen of the lip lens information processor, Shi Lei checked the relevant information.
Currently, the number of hackers who passed the first server assessment is 2,783; the number of hackers who passed the second server assessment is only 424; as for the number of hackers who passed the third server assessment, there are even fewer, only 39 people!
The difficulty of the fourth test on the server is mainly aimed at the world's top-level hackers. There are quite a few people who have passed it so far. A full 30!
On the contrary, Thomson David, who has the world's top level of strength, received special attention from Shi Lei and thus received the "love" of Yizuer. He is still fighting against the fourth assessment server until now.
The information collected by Yizuer is not such simple data information, but more detailed classified information.
For example, among the 2,783 world-class third-rate hackers who passed the first server assessment, Yizuer carried out a detailed classification of tree branch structures.
The first-level classification is divided into three categories: 'Known Identity', 'Unknown Identity', and 'Clue Identity'. The meanings of the three classifications are as literal. The last 'Clue Identity' classification indicates that some identity clues have been obtained.
But it cannot be finalized.
The so-called ‘known identity’ does not mean knowing the real identity, but obtaining the identity in the network.
The secondary classification is established under the category of ‘known identity’ and is divided into three categories: ‘owning organization’, ‘free and independent’, and ‘unable to judge’.
Although Yizuer analyzed most of the hacker identity information, Shi Lei would not only select peripheral members from the 'free and independent' category, but also select some members from the 'owning organization' and 'unable to judge' categories.
.
This selection method can effectively avoid unnecessary disputes.
For each hacker member in the 'Known Identity' category, Yizuer lists relevant detailed information, including Internet vest information, related hacking incident information, affiliation information, etc., including some gossip, and
Listed by Yizuer.
Shi Lei did not have time to check the information of more than 2,000 hackers who passed the first and second tests. He directly checked the information of a total of 39 hackers who passed the third and fourth tests.
Most of these thirty-nine hackers are old acquaintances of Shi Lei!
All ten core members of the Hacker Alliance passed the third assessment. As for the fourth assessment, only four people, Black Knife, Black Devil, Black Hand and Black Devil, passed.
The remaining six core members, especially Black Tiger, who ranked second in the league, also failed to pass the fourth assessment. This made Black Tiger feel quite embarrassed.
After all, those ranked sixth, seventh, and eighth all passed the fourth assessment. Black Tiger, ranked second, failed, which made Black Tiger feel a crisis of status.
The Black Tiger's offensive and defensive strength is seriously biased. In terms of attack, the Black Tiger even surpasses the world's best. However, in terms of defense, the Black Tiger is almost only the third-rate in the world. The fact that the Black Tiger can pass the third server assessment is already a blessing.
Attack the powerful Fu. Otherwise, Black Tiger won't even be able to pass the third test!
The five core members of the Dark Night Dynasty surpassed the Hacker Alliance in terms of personal strength, and all passed the fourth assessment. The remaining twenty-four hackers were all hackers from overseas.
Among them, four hackers attracted Shi Lei's great attention!
The first one is inuyasha, which is the name of an anime character, translated into Chinese as 'Inuyasha'. Shi Lei has some knowledge of the true identity of this hacker.
Inuyasha is a hacker from Wosang Country, but he is not an official security expert of Wosang Country, nor is he a hacker from the hacker community organization of Wosang Country. He is a bounty hacker. A bounty hacker who pursues money.
It is rumored that inuyasha's true identity is a hybrid of the Xia Kingdom and the Wosang Kingdom. Although he lives in the Wosang Kingdom, he does not identify with the Wosang Kingdom. So he chose to become a bounty hacker.
These are not the key points. The key point is that inuyasha is very powerful and has reached a world-class level!
If such a powerful hacker becomes a peripheral member, his power will be greatly enhanced!
The second hacker that Shi Lei paid close attention to was also very famous. He even had an unpleasant conflict with Mirui Technology Group.
This hacker’s nickname in the hacker world is the Teller!
A powerful hacker whose name reveals a terrifying flavor has also reached a world-class level, and there are even faint signs of breaking through to the top.
The strength of the deceased exceeds that of inuyasha, and it is possible to become the world's top hacker in a short period of time!
Shi Lei didn't mind telling the deceased that he had been against the Mirui Technology Group and tried to invade the world of brave men. Shi Lei was very clear about the rules of bounty hackers. They were just collecting money to do things. Nothing else, and no personal grudges.
However, whether it is inuyasha or informant, if they are just peripheral members, Shi Lei will not make too many demands. But if they want to become full members, they must leave the bounty hacker industry.
There are also two hackers who are highly concerned by Shi Lei, and they are also bounty hackers. They are Batman and Dark Lord. These two bounty hackers are also ruthless characters, and both are quasi-world-class masters. They have surpassed the world's super-class level and are far from the best.
World class is only half a step away!
Shi Lei sighed. It seems that with the advancement of the times, computer hardware is becoming more and more advanced, computing performance is becoming more and more powerful, and the bounty hacker industry is becoming more and more difficult to enter.
Otherwise, why would these bounty hackers gather together to participate in the test one after another?
The bounty hacker business is indeed getting harder and harder to develop. Not only are the bids low for simple tasks, there are also many mid- to low-end hackers rushing to handle them.
For high-end tasks, the bounty amount is indeed very high, but such tasks are usually difficult to complete, and it may even be possible to steal the chicken and lose the rice, and the bounty hacker's own advanced broiler, or even a supercomputer broiler, will be lost.
In such a situation, bounty hackers can only consider themselves unlucky!
"Four super bounty hackers?" Shi Lei thought secretly, how should he treat them. Accepting these four people as members of the peripheral organization is an absolute matter.
Shi Lei can even give these guys a monthly bonus of 100,000 US dollars without needing to reveal their true identities.
What Shi Lei is really thinking about is whether to test these four guys and find out their true identities so as to completely mark them.
On the other side, Thomson David was finally annoyed by Yizuer. Thomson David slammed the keyboard and shouted angrily: "Fake! Cheating! Cheating! This is deceiving everyone, Chapter 1
The server cannot pass the four assessments at all!"
Thomson David was indeed unable to pass the fourth assessment server. Even if he had used 110tflops of intensive distributed computing resources, he could not break the defense of the fourth assessment server.
When Thomson David controlled 80tflops of intensive distributed computing resources, he felt that as long as he added a little more computing resources to attack the data flow, he could completely break the blockade of the fourth assessment server.
With this idea in mind, Thomson David added a supercomputer with a computing speed of only 5tflops. Although 5tflops computing resources are not many, according to Thomson David's speculation, 5tflops computing resources are enough to affect the war situation.
Just as Thomson David was preparing to welcome the victory, the defense system of the fourth assessment server temporarily increased its strength.
This was of course Shi Lei's authorization for Yi Zuer and instructing Yi Zuer to use more iwn secret network resources for defense.
The first time this happened, Thomson David thought his guess was wrong, so he invested in a supercomputer with a computing speed of 15 tflops.
After continuously investing 20tflops of computing resources, Thomson David thought he could finally achieve success, but the defense of the server in the fourth assessment was still impregnable.
And Thomson David clearly discovered that the computing resources of the fourth assessment server had increased to 300 tflops. The angry Thomson David could only connect to a supercomputer with a computing speed of 10 tflops again for a last ditch effort. .
However, Thomson David once again discovered that the fourth assessment server had increased the computing resources controlled to 350tflops, firmly suppressing his attack.
Thomson David finally couldn't bear it anymore and issued an angry and arrogant announcement on all the major public websites in the hacker community of the United Kingdom!
.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!