typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 61 Online Game Hacker Attack and Defense

Yang Tian still thought of things too simply. He originally thought that after the peace announcement was issued, no one would come to harass the Century Server again. Who knew that the Century Server was too mysterious and powerful?

It is the favorite of hackers. Therefore, those curious hackers have not stopped looking for traces of the Century Server. Their posture is comparable to Qin Shihuang's search for immortals.

It's a pity that these network offensive and defensive battles are all data flow and code flow. Yang Tian can't understand any of them. He can only listen to Xiaoran's report on the battle situation. Yang Tian is not to mention how depressed he is. He is still very interested in hackers. It is estimated that every one of them

Boys who like electronics and digital may have dreamed of being a hacker!

In the eyes of most people, hackers are mysterious, powerful, and god-like beings. And the hacker attack and defense battle is a battlefield where you can't see the smoke of gunpowder. It is like a battle between gods and gods, which fills people's imagination. But in fact,

Most people really can't understand hacker attack and defense. Those data codes are simply incomprehensible to non-professionals.

Depressed and depressed, Yang Tian had a sudden idea, could he make the hacker attack and defense battle into a game, and then when someone comes to attack, he can intuitively feel the battle situation? Thinking of this, Yang Tian put his idea on

Xiaoran said it.

"Can you simulate a hacker attack and defense battle into an online game siege?" Yang Tian entered this sentence on the screen, and then a command prompt appeared on the screen: "Please enter a more detailed description."

Seeing this prompt, Yang Tian knew that it was probably feasible. With Xiaoran's computing power, he was fully capable of simulating hacker attacks into a visual online game! So Yang Tian began to input various settings.

The firewall is naturally a ninety-year-old city wall, and the administrator is the GM. Taking IP as the unit, a hacker IP simulates a player attacking the city, the Trojan horse is the mount, the virus is the baby, and the attack method is the character skill... Yang Tian controls the administrator account

, has the authority of GM and sits in the main city.

After making these basic settings, Yang Tian asked Xiaoran to use a virtual machine to simulate a thousand servers. Each server is assigned an IP address. There are them all over the world. Each server counts as one level, and each server

Ten levels form a game map, and a total of 100 maps have been customized.

As long as you overcome the firewall of a server and leave a signature in the server, you will get the IP address of the next level even if you pass one level.

After setting it up like this, Yang Tian turned the abstract, incomprehensible data flow and code flow hacker attack and defense battle into a game. This is an unequal contest. Yang Tian wants to compete with others.

In the hacker battle, just point the mouse and release a corresponding skill. Xiaoran will automatically translate Yang Tian's skills into relevant codes and data to snipe hackers.

Xiaoran will also transform the various attack methods of those hackers into various game skills and implement them in the form of special effects. So if a hacker hangs a horse, you will see him riding a mount, and if he drops a virus, he will

You will see him summoning the baby. If Yang Tian wants to stop the hacker from moving forward, he can release a resistance fire ring, and the hacker will be beaten back. If Yang Tian wants to add another firewall to a hacker, he only needs to add a firewall to him.

Just build a city wall in front of it.

What was originally a mysterious, high-end, and classy hacker attack and defense game was turned into a bad online game by Yang Tian. If those hackers knew that hacker attack and defense games could be played like this, they would probably cry to death.

Damn it, I want to attack once, but when I type the code, I can type Xiang, but you just point the mouse and press F1, 2, 3, and 4 to get it done. Is this really justified?

It can be said that except for Yang Tian, ​​no one in the world can make such a game, because the amount of calculations required for this game is too large. And the programming technology required is too high-end, even on earth

If you can find a supercomputer that can support such a large amount of calculations, you may not be able to program such a program. Only a guy like Xiao Ran who is a programmer can satisfy the perverted desires of the master Yang Tian and program such an evil program.

Here comes the program. The day this game is completed is the day when all hackers’ nightmare comes. As long as this program is available, any computer novice can enjoy the addictive game of hacker attack and defense against hackers from all over the world.

After the production of the game was completed, Yang Tian couldn't wait to start the first round of internal testing. All the hackers who were still exploring the Century Server were pulled into the first level of the game by Yang Tian. Those hackers were still tracking through various methods.

As they were wondering about the whereabouts of the Century Server, they suddenly received a mysterious IP address on their computers. After typing in the IP address, they finally found the location they had been looking for day and night.

So each one worked hard and used all kinds of tricks to break through the server's firewall and discover the secrets of Century Browser.

Yang Tian looked at the computer screen. Outside the city wall of the first level, there were already dense crowds of game characters. Above the heads of these people there was an ID consisting of an IP address and the name of the region where the IP was located. Looking at each ID,

Yang Tian knew which country and region these hackers came from.

At a glance, Yang Tian found that the United States had the most hackers. Yang Tian directly released the ultimate killing move "Heavenly Punishment", killing one in one move, and quickly eliminated many American hackers. This Heavenly Punishment skill can be regarded as a big killer.

, the effect in the game is that a thunderbolt strikes, the red bar bottoms out, and the player is instantly killed. But when translated into actual effect, the opponent's system crashes.

This immediately frightened those American hackers. They burrowed into the ground, and the system that faced them collapsed. What is the principle and how is it implemented? There is no way at all. This is too scary.

!

After cleaning up the American hackers, he started to clean up the Japanese hackers. Facing the Japanese hackers, Yang Tian was even more rude and directly used a skill called "Meteor". The effect of this skill in the game is that meteorites fall from the sky, with red bars.

At the end of the day, the corpse directly becomes a meat pie. The real effect is that the other party's hacker's computer system crashes, the motherboard is short-circuited, and the hardware is damaged. Moreover, this damage is directly traced to the original IP across the springboard.

At this time, all the Japanese hackers were dumbfounded. It had only been a while, and many of their tricks had not yet been used. As a result, the other party tracked the real IP, and the computers were burned up. It was true that stealing chickens and losing rice.

.

Then Yang Tian looked up again. People from the eight Western European countries were also swept away by Yang Tian one by one to test various skills. Some of the computer hardware was damaged, some of the computer system crashed, and some of the computer system was poisoned and paralyzed... After playing for more than an hour, Yang

The first round of internal testing has ended today, and many low-level skills have been added.

Almost all the skills I set up at the beginning were instant kill skills. They were fun at first, but they were not playable. It is necessary to set up these low-level skills. In this way, when you play these hackers again, you will have PK to fight monsters, little by little.

The thrill of grinding blood.

After making the adjustments, Yang Tian issued an announcement to the world directly through Century Browser. "In view of the fact that hackers and network security from various countries are very interested in my server, I decided to open a test for the whole world. Anyone can

Come and participate. I have prepared a thousand servers. Each server counts as a level. These servers are distributed all over the world. They are all broilers controlled by me and are temporarily borrowed. I will leave a signature book on it. As long as I break through

For the server’s firewall, just sign your name on the signature book and it will be cleared.”

"Every time you pass ten levels, you will get a part of the source code of Century Browser. The more levels you pass, the more source code you will get. If you want to study the various technologies of Century Browser, you can get it based on your ability. By then,

I will set up a ranking list in the first level to report the ID rankings of all the levels passed. The number of levels passed is used as the first sequence ranking. If the number of levels cleared is the same, the level of clearance time is used. Regardless of the number of levels cleared, the top 100 will be ranked.

All will receive part of the core source code of Century Browser."

Century Browser was originally planned to be developed by Yang Tian. Just like the Android system, it is open to the world and invites businesses from all over the world to jointly build a grand event. And Yang Tian will also participate in this grand event with first-hand information, first come first served.

Month, the biggest piece of cake.

Now Yang Tian has simply designed this plan into a game, which not only allows him to have some fun when he is bored, but also gives others a little hope so that they no longer regard Century Browser as their enemy. What they want

, isn’t it the advanced technology of Century Browser? Now that there is a way to obtain these technologies, hacker network security in various countries around the world was immediately divided.

Originally, the spearheads were unanimously aimed at Century Browser, but now this temporary tacit understanding will disappear in an instant. What was done before will be done now. Those hackers and network security personnel who originally had a competitive and hostile relationship will fight.

It will become more intense. And Century Browser will quietly develop and grow during the launch of this war.

At this time, the installed base of Century Browser has reached a terrifying 2.1 billion, and the number of registered users has also reached a terrifying 900 million. Yang Tian finally stopped expanding. Now PCs and smartphones around the world,

I'm afraid that they have all been forced to install it. With so many users, there is no need to add more. As long as these users are digested, Century Browser will immediately become a giant that no one dares to be young.

But how to digest these users needs to be carefully considered. Even though the installed capacity is already so scary, Yang Tian used viral propagation and forced installation to do this. Many people have no idea what is going on, and even

Most people don't even know that such a thing is installed on their computers. Even among the 900 million registered users, most of them were prompted to register by the program in a daze, without knowing what it was for.

Therefore, in a short period of time, these people are not considered real users at all and cannot bring income to Yang Tian at all. And they may be lost at any time. Next, retaining these users will be the most important thing for Century Browser.

Work.

Century Browser stopped its viral expansion and cleared the way again, willing to release the source code. Internet security departments around the world lifted the alarm on Century Browser and instead monitored it secretly, and then geared up one by one to get these sudden ones.

Technology like alien black technology!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next