typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1584 Raphael knows! 【Work hard in the new year!

.

There are two ways to simply become a peak hacker in the world. One way is to reach iQ above 200, and the other way is to be simpler!

It's already early morning now, take a shower and go to bed!

The mysterious world peak-level hacker is ready to use mixed data impact, which is a more advanced data attack method, causing stronger data impact through mixed data attacks.

However, the attack methods of hybrid data shocks are more complex, and even some world-class hackers cannot use complex hybrid data shocks.

", I admit your strength. But, I will tell you, what kind of power does a truly powerful hacker have?" said the mysterious peak-level hacker in the world, sneered.

After saying that, the peak-level hacker of the mysterious world's slender fingers quickly tapped on the keyboard. He not only used a more powerful hybrid data impact method, but also used more computing resources!

With the operation of the peak-level hackers in the mysterious world, more and more data information is displayed on the computer screen, one of which indicates that the supercomputer access authorization is granted.

With the emergence of this message, the mysterious world's peak hacker connected to an authorized supercomputer. The computing speed of this supercomputer reached 50tflops.

Add to the supercomputer with a previous calculation speed of 30tflops, the mysterious world-class hacker currently controls 80tflops computing resources.

The mysterious hacker first connected the two supercomputers together and integrated the computing resources so that there would be no coordination problems when the two supercomputers assisted in the work.

After handling the coordination of the two supercomputers, the mysterious world's peak-level hacker's eyes froze. His hands and ten fingers typing on the keyboard.

Shuangqing City, a secret underground base of the first-level branch of the Longteng Plan.

Yi Zuer reminded Shi Lei, "Sir, the mysterious invader, attacked the fourth assessment server again, and was carrying out a destructive attack. The invasion data flow intensity reached 30tflops. It is increasing rapidly, reaching 50tflops computing resources, and it is still increasing rapidly!"

Shi Lei's expression changed slightly, but he did not give any command instructions.

Yi Zuer took the initiative to ask: "Sir, the attack data flow of the mysterious invader reached 80tflops computing resources. The defense of the fourth assessment server is rapidly weakening, and it is expected to crash in 10 minutes to 12 minutes and 30 seconds. Will the computing resources of the fourth assessment server be added?"

Shi Lei thought about it for a moment and shook his head slowly. "No need for now, continue to observe the invader's situation!"

The peak-level hacker in the mysterious world actually chose to use his might to suppress others, and directly use huge computing resources to forcefully oppress the fourth assessment server.

Shi Lei is actually very happy about this method!

Because the other party uses this method, it means that the other party may expose more information.

Sure enough!

When the peak-level hacker of the mysterious world broke through the defense system of part of the fourth assessment server, this peak-level hacker of the mysterious world could no longer withstand loneliness and directly launched a mixed data impact!

Because the peak-level hackers in the mysterious world have broken through some defense systems. The hybrid data impact directly passes through the already broken defense system and attacks the internals of the fourth game assessment server.

In a mysterious room, the mysterious world's peak hacker laughed, "Can you still block it?"

Based on 80tflops intensive distributed computing resources, the peak-level hacker in the mysterious world launched a mixed data impact. This powerful attack finally broke the defense system of the fourth assessment server.

In addition, the powerful mixed data impact has caused severe data oscillation, which will completely destroy more than one million iwnseed, which constitutes a loose distributed computing resource of 100 tflops.

The peak-level hacker of the mysterious world, checking the feedback data of mixed data impact, showed a proud smile on his face, and then said to himself: "Hmph! After the botnet is defeated, I want to see what methods they have! Do you want to enable supercomputers?"

The world's peak-level hackers need to capture supercomputers as proof. Among the supercomputers that are public around the world, most supercomputers already have powerful hacker owners.

Some supercomputers that survived were not forgotten by hackers, but those supercomputers had powerful security strategies and security experts to protect. It was no less difficult to capture those supercomputers than to seize supercomputers that already had hackers’ masters.

The peak-level hacker in the mysterious world was repeatedly thinking in his mind that there was no one among the top hackers in the world, so he was completely relieved and prepared to sit and watch the joke.

However, the joke was not regarded as a joke, but instead made him a joke!

Because the fourth assessment server actually suffered the impact of mixed data, it did not completely collapse. What's worse is that the 100tflops loose distributed computing resources that had been completely destroyed actually reappeared inside the fourth assessment server.

The expression of the peak-level hacker in the mysterious world this time was truly shocked!

He even held the mouse and turned the page upwards, checked the history of the feedback information, and determined whether he had misread the feedback data information when the mixed data impact was impacted.

However, after checking the historical records, the peak-level hacker in the mysterious world looked even more gloomy. The information in the historical records showed that he was not wrong. The 100tflops loose distributed computing resources of the fourth assessment server were indeed completely destroyed by data oscillation.

But what the hell is going on now?

Could it be that those computing resources, who believed in the extremely powerful God of Spring, were resurrected in full state?

In fact, the iwn secret network provides 100 tflops computing resources and more than one million iwnseeds, which is indeed full of blood and full of resurrection.

The peak-level hacker in the mysterious world just now used 80tflops-intensive distributed computing resources and used mixed data impact methods to cause data oscillations, which really destroyed all iwnseed.

However, the ultra-low extraction performance solution designed by Shi Lei for the iwn secret network once again saved the iwn secret network. When the data oscillation destroyed all iwnseeds, Yi Zuer directly rebuilt all iwnseeds in less than ten seconds, forming a loose distributed computing resource of 100 tflops.

This is as powerful as an immortal body!

The face of the peak-level hacker in the mysterious world changed a little, and he had to think about a question: is the fourth assessment server set up a gimmick or is it really evaluating relevant testers?

So has anyone passed the fourth assessment server?

If there really exists people who pass, what kind of technology will they have? The peak-level hacker in the mysterious world thinks he has powerful technology, but he still cannot defeat the fourth assessment server. Is there anyone else who can defeat it?

It is undeniable that there are certain gaps in hackers at the peak of the world.

But how could such a peerless hacker who would be Ling Jueding come to the assessment and test of peripheral members?

‘s.o.b! What are your plans? Are you just kidding everyone?’ The peak-level hacker in the mysterious world has a bit of anger and anger.

After thinking for a long time, the peak-level hacker in the mysterious world finally made a decision!

That is, no longer deliberately hide yourself, no longer deliberately block the fourth assessment server from sending information, but actually start a hacker attack and defense war with the fourth assessment server.

The mysterious world peak-level hacker really doesn't believe it. He can't get a server with only 100 tflops loose distributed computing resources!

The secret underground base of the first-level branch of the Longteng Project.

Tao Wenxian and Raphael were also attracted by the situation on Shi Lei. They sat behind Shi Lei, one left and one right, and the three of them checked the relevant situation through the lip lens information processor.

"Brother Shitou, where did this guy come out? Some of his attack methods seem very simple, but they are so powerful when combined!" Tao Wenxian asked.

Shi Lei shook his head, "I don't know! It is because I don't know the identity of this guy that I personally analyze who this guy is! But so far, I have not analyzed the identity information of this guy."

Raphael's eyes flashed and he said, "Stone, is there any guy who broke through the relevant information records of the first three assessment servers?"

Shi Lei nodded and ordered directly: "Yuzhu, send the relevant information to Mr. Fini."

"yes, sir!" Yi Zuer sent the information recorded before to the lip lens-type information processor worn by Raphael and Tao Wenxian, so that they could view it themselves.

Shi Lei is observing the mysterious world peak hacker and the fourth assessment server, and the fierce offensive and defensive war is taking place.

As time went on, the fourth assessment server controlled by Yi Zuer was completely unbroken. It was mainly because Yi Zuer started cheating mode under Shi Lei's instruction.

Once the attack of the peak-level hacker in the mysterious world is too powerful, Yi Zuer will mobilize more resources from the iwn secret network to coordinate defense.

Through analysis, a doubt arose in his heart!

At this moment, Raphael suddenly spoke: "Stone, this mysterious world peak hacker, I think I know who he is!"

.(To be continued...)

ps: The annual leave is over?

Get started working hard!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next