It is not a charity organization, it is a hacker organization, a powerful hacker organization with three world-class hackers!
Such a powerful hacker organization obviously cannot accept members casually, and even peripheral members cannot easily gain recognition.
The four assessment tests designed by Shi Lei are just to judge the ability and identity of participating hackers, and then screen some hackers from them and invite them to join the peripheral organizations.
"What about the situation abroad?" Shi Lei actually paid more attention to the situation abroad. Relatively speaking, foreign hacking circles are more likely to have free and powerful hackers.
There are too many restrictions in the domestic circles, and there are too many restrictions on hackers and overall environments. In this case, it is difficult for the Mavericks hackers to reach the high-end level.
Tao Wenxian looked at Raphael, "Raphael, say it!"
Raphael knew more about hackers in overseas regions than Tao Wenxian, and Raphael did not refuse, but explained in detail.
"The situation overseas is generally similar to that of Xia Kingdom. Especially in some hacker circles in poor areas, all those with some strength choose to join our tests, and during the test, they try their best to show their strength. As for developed areas, there are fewer hackers participating in the test, and basically no hackers who have participated in the hacker organization are conducting the test." Raphael explained the situation in overseas areas.
Shi Lei thought in his mind that this test of recruiting members of peripheral organizations will not only bring some powerful helpers, but also attract some enemies with ulterior motives.
Therefore, Shi Lei needs to make a careful judgment. What members should be recruited to avoid being bitten by the snake if he fails to kill the snake.
"Yu'er, show the current test results!" Shi Lei ordered.
It is already two o'clock in the morning, and a lot of information has been collected in the testing system.
"yes, sir!" Yi Zuer responded to Shi Lei and sent the data of the test results to Shi Lei, Raphael and Tao Wenxian respectively.
In the virtual transparent screen of the lip lens-type information processor, Shi Lei was checking the relevant information.
At present, the number of hackers passing the first assessment server has 2,783 people; only 424 people passing the second assessment server; as for the number of people passing the third assessment server, there are even fewer, only 39 people!
The difficulty of the fourth session of the server is mainly targeting world-class hackers. There are currently a large number of people passing the test. There are 30!
On the contrary, Thomson David, who has the peak-level strength in the world, was particularly concerned by Shi Lei, and was "loved" by Yi Zuer. He is still fighting against the fourth assessment server until now.
The information counted by Yi Zuer is not such simple data information, but more detailed classification information.
For example, among the 2,783 third-rate hackers who passed the first assessment server, Yi Zuer conducted a detailed classification of tree branch structures.
The first-level classification divides three types: ‘known identities’, ‘unknown identities’, ‘clue identities’. The meaning of the three categories is the same as the literal meaning, and the last 'clue identities’ category means that some identity clues have been obtained, but cannot be finalized.
The so-called "known identity" does not mean knowing the real identity, but obtaining the vest identity on the Internet.
The secondary classification is based on the category of ‘known identities’ and is divided into three categories: ‘owned organizations’, ‘free and independent’, and ‘unjustified’.
Although Yi Zuer analyzed most of the hacker's identity information, Shi Lei will not only select peripheral members in the category of "free and independent" classification, but will also select some members from "owning an organization" and "unjudgmentable".
This choice can effectively avoid unnecessary controversy.
For every hacker member in the category of ‘known identities’, Yi Zuer listed relevant detailed information, including Internet vest information, related hacker incident information, organization information, etc., and some rumor information, which were also listed by Yi Zuer.
Shi Lei did not have time to view information about more than 2,000 hackers who passed the first and second tests. He directly viewed information about the third and fourth tests, a total of 39 hackers.
Most of these 39 hackers are Shi Lei’s old acquaintances!
All ten core layers of the Hacker Alliance passed the third assessment. As for the fourth assessment, only the Black Knife, Black Demon, Black Hand and Black Ghost passed.
The other six core teams, especially the second-ranked Black Tiger in the league, were not able to pass the fourth game assessment. This made Black Tiger feel quite embarrassed.
After all, the sixth, seventh and eighth all passed the fourth assessment, and the second-ranked Black Tiger failed, which made the Black Tiger feel the crisis of status.
The offensive and defensive strength of the Black Tiger is seriously serious. In terms of attack, the Black Tiger is even better than the world's top-notch; however, in terms of defense, the Black Tiger is almost only at the third-rate level in the world. The Black Tiger is able to pass the third game assessment server, but in fact it is a blessing for the attack power. Otherwise, the Black Tiger will not even pass the third game test!
The five core layers of the Dark Night Dynasty surpassed the Hacker Alliance in terms of personal strength and all passed the fourth assessment. The remaining twenty-four hackers were all hackers from overseas regions.
Four of them attracted Shi Lei's attention!
The first one is inuyasha, which is the name of an anime character. It is translated into Xia Mandarin and is "Inuyasha". Shi Lei has some understanding of the true identity of this hacker.
inuyasha is a hacker in Wasang country, but not an official security expert in Wasang country, nor a hacker organized by the hacker community in Wasang country, but a bounty hacker who chases money.
It is rumored that inuyasha's true identity is a mixed-race child from Xia Kingdom and WoSang Kingdom. Although he lives in WoSang Kingdom, he does not agree with WoSang Kingdom. Therefore, he chose to become a bounty hacker.
These are not the key points. The key point is that inuyasha is very powerful and has reached a world-class level!
Such a powerful hacker will greatly enhance his power if he becomes a peripheral member!
The second hacker who was highly concerned by Shi Lei was also very famous. He even had a not-so-pleasant conflict with Mirui Technology Group.
The hacker's vest in the hacking world is called Abbott the Dead!
A powerful hacker who reveals a terrifying taste from his vest name has also reached the world-class level, and even shows signs of breaking through to the peak.
The strength of the defendant who sued the dead is beyond inuyasha, and it is possible to become a peak-level hacker in the world in a short period of time!
Shi Lei didn't mind suing the deceased that he had fought against Mirui Technology Group and tried to invade the world of brave people. Shi Lei was quite clear about the rules of bounty hackers. He just collected money and did things. It had nothing to do with anything else, and there was no personal grudge.
However, whether it is inuyasha or the defendant, if they are just peripheral members, Shi Lei will not make too many requests. But if they want to become formal members, they must leave the bounty hacker industry.
There are also two hackers who are highly concerned by Shi Lei, who are also bounty hackers, namely batman and Lord Dark. These two bounty hackers are also cruel characters, both of which are quasi-world experts. They exceed the world's best-in-class level and are only half a step away from the world class!
Shi Lei sighed. It seems that with the progress of the times, computer hardware has become more and more advanced, computing performance has become more and more powerful, and the bounty hacker industry is becoming more and more difficult to get along.
Otherwise, how could these bounty hackers join in the test one after another?
The business of bounty hackers is indeed becoming increasingly difficult to carry out. Not only does it have a low bid, but there are also many mid- and low-end hackers rushing to deal with it.
For high-end tasks, the amount of bounty is indeed very high, but those tasks are usually difficult to complete, and it may even be possible to steal chickens and lose money by hackers' own high-end broilers, or even supercomputer broilers.
In such a situation, the bounty hacker can only admit that he is unlucky!
‘Are the four super bounty hackers?’ Shi Lei thought secretly about how to treat them. It is absolutely necessary to accept these four people as members of the peripheral organization.
Even Shi Lei could give them a monthly bonus of 100,000 US dollars without their real identity, serving these guys.
The question Shi Lei really thought about was whether to test these four guys and get their true identities over, so as to completely mark them.
On the other side, Thomson David was finally annoyed by Yi Zuer. Thomson David slapped the keyboard and yelled angrily: "Fake! Deceive! Cheating! This is deceiving everyone. The fourth assessment server cannot pass at all!"
Thomson David really cannot pass the fourth assessment server. Even if he has called 110tflops of intensive distributed computing resources, he cannot break the defense of the fourth assessment server.
When Thomson David controlled 80tflops intensive distributed computing resources before, he felt that as long as he added a little more computing resources to attack data flow, he could completely break the blockade of the fourth assessment server.
With this idea, Thomson David added a supercomputer with a computing speed of only 5tflops. Although there are not many 5tflops computing resources, according to Thomson David's speculation, 5tflops computing resources are enough to affect the situation.
Just as Thomson David was about to meet the victory, the defense system of the fourth game assessment server temporarily increased its strength.
Of course, Shi Lei authorized Yi Zuer and ordered Yi Zuer to call more iwn secret network resources for defense.
When this happened for the first time, Thomson David thought he was wrong in guessing, so he invested in another supercomputer with a calculation speed of 15tflops.
The continuous investment of 20 tflops computing resources made Thomson David think that he could finally succeed, but the defense of the fourth assessment server was still solid.
And Thomson David clearly discovered that the computing resources of the fourth assessment server were increased to 300 tflops. The angry Thomson David could only connect to a supercomputer with a computing speed of 10 tflops again and make a last try.
However, Thomson David once again discovered that the fourth game of assessment server was increased to 350tflops, suppressing his attack.
Thomson David finally couldn't stand it and issued an angry and arrogant announcement on the major public websites of the hacking industry in the Liberian country!