HacKer

HK1584 Raphael Knows! 【Work Hard in the New Year! 】

.

There are two ways to easily become the world's top hacker. One way is to reach an IQ of 200 or above, and the other way is simpler!

It's already after midnight, go to bed!

The mysterious world's top hacker is preparing to use hybrid data attack. This is a more advanced data attack method. By mixing attack data, it will cause a more powerful data impact.

However, the attack method of mixed data shock is more complex, and even some world-class hackers cannot use complex mixed data shock.

"I admit that you are powerful. However, I will tell you what kind of power a truly powerful hacker has!" The mysterious world-level hacker said with a sneer.

After finishing speaking, the slender fingers of the top hacker in the mysterious world began to tap quickly on the keyboard. Not only will he use more powerful mixed data impact methods, he will also use more computing resources!

As the top hackers in the mysterious world operate, more and more data information is displayed on the computer screen. One of the data information indicates that the supercomputer access permission has been obtained.

With the emergence of this piece of information, the mysterious world's top hacker accessed the authorized supercomputer. The computing speed of this supercomputer has reached 50tflops.

In addition to the previous supercomputer with a computing speed of 30tflops, the mysterious world's top hacker currently controls 80tflops of computing resources.

The mysterious hacker first connected two supercomputers in series and integrated the computing resources so that there would be no coordination problems when the two supercomputers assisted in the work.

After handling the coordinated work of the two supercomputers, the mysterious world-level hacker's eyes narrowed and he started typing on the keyboard with his fingers.

Shuangqing City. The secret underground base of the first-level branch of the Longteng Project.

Yi Zuer reminded Shi Lei, "Sir, the mysterious intruder has attacked the fourth assessment server again and is conducting a sabotage attack. The intensity of the intrusion data flow has reached 30tflops. It is increasing rapidly and has reached 50tflops. The computing resources are still increasing rapidly. middle!"

Shi Lei's expression changed slightly, but he did not give any orders.

Yi Zuer proactively asked: "Sir, the attack data flow of the mysterious intruder has reached 80tflops computing resources. The defense of the fourth assessment server is rapidly weakening, and it is expected to collapse in 10 to 12 minutes and 30 seconds. Is it necessary to add a fourth assessment? Server computing resources?”

Shi Lei thought about it for a moment. He slowly shook his head and said, "No need for now, continue to observe the situation of the intruder!"

The top hacker in the mysterious world actually chose to use overwhelming force to directly use huge computing resources to forcefully suppress the fourth assessment server.

for this way. Shi Lei was actually very happy!

Because the other party adopts this method, it means that the other party may expose more information.

as expected!

When the mysterious world's pinnacle hacker broke through the defense system of part of the fourth test server, this mysterious world's pinnacle hacker. As if he could no longer bear the loneliness, he directly launched a mixed data attack!

Because the top hackers in the mysterious world have broken through part of the defense system. The mixed data impact directly passed through the already broken defense system and attacked the interior of the fourth assessment server.

In a mysterious room, the mysterious world's top hacker burst out laughing, "...can you still stop me?"

Based on 80tflops of intensive distributed computing resources, the top hacker in the mysterious world launched a mixed data attack. This powerful attack finally broke the defense system of the fourth assessment server.

In addition, the powerful mixed data impact caused violent data shocks and completely destroyed more than one million IWNSeeds constituting 100tflops of loose distributed computing resources.

The top hacker in the mysterious world looked at the feedback data of the mixed data impact, with a proud smile on his face, and said to himself: "Humph! After the zombie network is defeated, I want to see what else they have. Means! Do you want to enable a supercomputer?"

The world's top hacker needs to capture a supercomputer as proof. Among the world's public supercomputers, the vast majority already have powerful hacker masters.

Some supercomputers that survived were not forgotten by hackers, but those supercomputers were protected by strong security policies and security experts. It is no less difficult to capture those supercomputers than to seize a supercomputer that already has a hacker owner.

The top hacker in the mysterious world repeatedly thought in his mind that none of the top hackers in the world had joined, so he was completely relieved and prepared to sit back and watch the joke.

However, he didn't take it as a joke, but instead made himself the joke!

Because the fourth assessment server actually withstood the impact of mixed data and did not completely collapse. To make matters worse, the 100tflops loose distributed computing resources that had been completely destroyed actually reappeared inside the fourth assessment server.

The expression of the top hacker in the mysterious world this time was truly shocked!

He even held the mouse and turned the page upwards, checking the history of feedback information to determine whether he had read the wrong feedback data information when the mixed data hit.

However, the top hacker in the mysterious world looked even more gloomy after checking the historical records. The historical record information showed that he was not wrong. The 100tflops loose distributed computing resources of the fourth assessment server were indeed completely destroyed by the data shock.

But what the hell is the current situation?

Could it be that those computing resources believed in the extremely powerful Spring God and were resurrected in full condition?

In fact, within the IWN secret network, more than one million IWNSeeds are indeed resurrected with full health and full health, providing 100tflops computing resources.

The top hacker in the mysterious world just now used 80tflops of intensive distributed computing resources and adopted a hybrid data impact method. The data shock caused by it indeed destroyed all IWNSeed.

But Shi Lei’s ultra-low extraction performance solution designed for IWN Secret Network once again saved IWN Secret Network. When data shock destroyed all IWNSeeds, Yizuer directly reconstructed all IWNSeeds in less than ten seconds, once again forming a 100tflops loose distributed computing resource.

This is as powerful as an immortal body!

The face of the top hacker in the mysterious world changed. He had to think about a question. Is the fourth assessment server set up a gimmick, or is it really assessing relevant testers?

So, did anyone pass the fourth server assessment?

If there really are people who pass, what kind of technology will they have? The top hacker in the mysterious world thinks he has powerful technology, but he still can't defeat the fourth assessment server. Is there anyone else who can defeat him?

It is undeniable that there is a certain gap between the world's top hackers.

But how could that kind of peerless hacker, who could be considered the best, come to the peripheral members' assessment test?

‘S.O.B! What are the plans? Are you just joking with everyone? ’ The top hacker in the mysterious world is a bit angry.

After thinking for a long time, the top hacker in the mysterious world finally made a decision!

That means no longer deliberately hiding oneself, no longer deliberately blocking the fourth assessment server from sending information, but actually launching a hacker attack and defense war with the fourth assessment server.

The mysterious world's top hacker really doesn't believe that he can't take down a server that only has 100 tflops of loose distributed computing resources!

The secret underground base of the first-level branch of the Longteng Project.

Tao Wenxian and Raphael were also attracted by the situation on Shi Lei's side. They sat one on the left and one on the right behind Shi Lei. The three of them checked the relevant situation through the LIP lens information processor.

"Brother Shitou, where did this guy come from? Some of his attack methods seem very simple, but when combined they are so powerful!" Tao Wenxian asked.

Shi Lei shook his head, "I don't know! It is precisely because I don't know this guy's identity that I personally analyzed who this guy is! But so far, I have not analyzed this guy's identity information."

Raphael's eyes flickered and he said, "Stone, has this guy broken through the relevant data records of the first three assessment servers?"

Shi Lei nodded and directly ordered: "Yizur, send the relevant information to Mr. Feeney."

"Yes, Sir!" Yizuer sent the previously recorded information to the LIP lens-type information processor worn by Raphael and Tao Wenxian, so that they could view it on their own.

Shi Lei was observing the fierce offensive and defensive war that was taking place between the mysterious world-leading hacker and the fourth assessment server.

As time went on, the fourth assessment server controlled by Yi Zuer showed no signs of being broken. The main reason was that Yi Zuer turned on the cheating mode under Shi Lei's instruction.

Once the attacks from the top hackers in the mysterious world are too powerful, Yizuer will mobilize more resources from the IWN secret network to coordinate defense.

After Shi Lei analyzed it, a suspicion arose in his mind!

At this time, Raphael suddenly said: "Stone, this mysterious world-level hacker, I think I know who he is!"

.(To be continued ~^~)

PS: Is the annual vacation over? Get to work!

Chapter 1605/1926
83.33%
HacKerCh.1605/1926 [83.33%]