Chapter 167 Guinness closing New concept!

Death is terrible.

At least Yang Tian thinks so. Even if the God of death comes, Yang Tian will not allow himself to die like this. He still has many things unfinished. He won't let himself die easily.

Death may be a relief.

Time passed like this. Until 10:30 a.m., Yang Tiancai slowly opened his eyes, stood up slowly and walked to the computer.

He came to the chair and sat down. He took out his mobile phone. He found that it was the wind and dialed back.

"Hey, um! It's me!"

"Around the nest, why do you answer the phone now? Your voice..."

Yang Tian, who has just recovered, has a strange voice at the moment, which is very unpleasant. "It's all right, old problem!"

Hang up the phone and Yang Tian aims at the display screen.

At the moment, a web page is displayed on the display screen. Yang Tian has some doubts. Is it the connected web page after rushing out of the 49th server?

Shook his head, walked slowly to the water purifier at the head of the bed, received a glass of purified water, and then drank it.

Gudong! Gudong drank several cups in a row. At this time, his throat slowly recovered and coughed twice. Subconsciously, he took out a cigarette and put it down when he was about to hold it in the corner of his mouth.

"Smoking is harmful to health! Well! Smoking is harmful to health!"

Yang Tian shook his head and sneered. He pulled away the hair covering his left eye, narrowed his eyes slightly, and looked at the web page on the display screen.

There are four big characters hanging in the middle of the web page.

Hacker essence!

Then there are various concepts.

The essence of hackers, in order to become a top hacker, we must experience the essence of hackers. The essence of hackers is exactly a state, a state of code principle. However, if we understand the essence of hackers, in the next time. Various principles and codes will appear in my mind from time to time.

The essence of hackers is divided into four sources: attack source, invasion source, defense source and virus source!

Some hackers can't understand the essence of hackers for a lifetime, while some hackers can understand it in an instant. This is not fixed. Some understand it in battle, while others suddenly understand it while studying principles.

The four sources of the essence of hackers are to determine their origin according to their own consciousness. In other words, if you understand the essence of hackers in the attack, it will be the source of attack. If you understand it in the invasion, it will be the source of invasion. The same is true for defense sources and virus sources.

A hacker does not necessarily understand only one source. As long as you have enough strength, you can understand more than two sources.

Today, all attackers in the hacker community have their own systems.

In turn, data flow. Small cycle, large cycle, infinite cycle.

Thus, the attacks are also divided into two categories: data flow. Data wave.

Data flow is a pure attack data flow prepared by broiler, and the attack using small loop is also a data flow.

General hackers use the attack of large cycle or infinite cycle. At the moment, the attack has deteriorated, not data flow. It's a data wave.

The location is formed by data flow, which is called Attack Sub point.

The point formed by data wave is called attack source point.

Yang Tian knows that the data flow and Attack Sub points, but the data wave should be the same as its own shock wave, that is to say, as long as the attack with a large cycle is called data wave.

However, Yang Tian was puzzled about the source of the attack. Using data waves to form a point? Now he can't do it. He can only disperse Attack Sub points from the data wave.

I didn't think about it, but I kept it in my mind.

The big circle is a turning point for attackers. If they have the ability to use the big circle and don't understand the essence of hackers, their technology will come to an end and can't progress. Can only stay in the big cycle forever.

There is an infinite loop.

Want to break through the infinite cycle. You must master the 'point' because it is above the infinite loop. There is no data attack, but an attack between 'points'.

Point to point attacks?

Yang Tian didn't dare to think about it, because he was afraid of brain pain again, so he wrote these down in his mind and decided to analyze them slowly later.

In the middle of the page are some attack principles, some summaries of infinite loops, and some attack principles similar to infinite loops.

Yang Tian looked at it one by one. There were a few big words under the website.

Infinite loop hacker: surround the nest

Identity Badge: Black suffocating flame!

At the bottom of the page are some lists and logos. Good guy, there are 30 names and 30 corresponding logos.

Among the 30 names, Yang Tian sees a familiar name, Kok!

Kok also has the ability to use infinite loops. Suddenly, Yang Tian suddenly remembered Kok's attack. He has seen Kok's attack. One attack point connects two data streams. The attack point is in the front, and the latter two data streams are connected in a V-shape.

Yang Tian has read the above explanation, so he understands that the point of Kok should be the attack source point, and the latter two are data waves.

Among the 30 names are Wai nest and Kok.

Can 30 people around the world use infinite circulation?

Yang Tian's guess is good. In addition to ancient black, 30 hackers around the world can use infinite loop. In fact, Yang Tian can only be lucky to see this web page, because at the last moment, he uses infinite loop to hit the port.

If Yang Tian attacks the port with a large loop, he will access another web page.

[Guinness Book of records, to be published worldwide on April 4!...]

In fact, the Guinness is over today.

Hackers who do not have the ability to use continuous loops can only advance to the 45th server kernel. After 9 a.m., all hackers in the 45th kernel will access a web page.

The principle of similar small cycle is explained on the web page, and there is nothing else.

However, hackers who can use a small loop or a large loop can go to the 49th server. After 9 a.m., those who attack the port with an infinite loop will access Yang Tian's web page.

Another web page attacks the port with a large loop. This web page explains the essence of hackers and some large cycle principles, as well as the corresponding attack input device.

However, hackers who attack ports with small loops or stay in the kernel will access a web page, which explains various principles of small loops and some high editing technologies, as well as a small number of tips for large loops.

The attack access point is like this. However, the intrusion access point of wind volume access is the same, and each level accesses different web pages.

Defense and auxiliary access points are the same, and different levels access different web pages.

[Guinness Book of records, to be published worldwide on April 4!...]

Yang Tian called fengjuan and went to bed directly. After thinking about it, he decided to run to the hospital in the afternoon.