Chapter 1029

Thinking of the force back to hold Huo Shaoheng's hand, calmly said: "you just anti programming, I give you to block these attacks. ——I'll hold you back as long as it takes. "

Huo Shaoheng looked at the thought deeply, "together?"

"Together!"

Thinking of wearing a Bluetooth headset, the central control room staff said hello, took over the command.

"All parties are at my command. If you keep fighting with Lan Fang, I will break through the external network and compete with them as a private hacker. "

Thinking of wearing a Bluetooth headset that can change the sound, quickly entered the network system.

As a string of instructions are typed into the system, the mind gradually sees another world, another network world composed of data and logic.

In this world, you can't tell whether the other party is a person or a machine.

It doesn't matter who gives each command, man or machine.

What matters is who these directives serve and where they are taking us.

When the blue side attacked the Chinese Empire Network and captured one node after another, a powerful force suddenly rose from their occupied area.

First of all, she went into the three districts captured by the blue side. She found that, in addition to the resistance forces of the cabinet and the military headquarters, there was also an alliance of hackers organized automatically by the civil society!

These people may be ordinary programmers, students, managers, or clerks in real life, but because of their interest in the network, their familiarity with computers, and their love for the country, they organize themselves to fight against external attacks when they find that the national network system is under external attack!

They immediately realized their power.

Although ants are small, they are superior in number and can attack elephants.

I have an idea in my mind.

Her hands flying, crackling on the keyboard, key out a command, let the network for their own use, the first choice with the blue side of the most arrogant skeleton will face confrontation!

She's going to be the first to get ahead and give a warning!

The skull club's attack is not brilliant. The repeated mass email is actually very primitive.

Thinking about it, he quickly repelled the attack of the skull and bones Association, and took advantage of the victory and pursuit, followed the other party's attack route retrograde, and cracked the skeleton club's back door program at one fell swoop!

Then, she released her logo target, a pink pig with a round, round, round tail!

"Pink pig!"

"It's a pink pig!"

"Here comes the pink pig!"

"As urgent as a law! ——Pink piggy is here! The evil spirit is gone

The laughter and cheers on the Internet can be heard with your ears!

Being beaten by the blue side, the still indomitable civil hacker alliance immediately considered the signal released and broke into the skeleton society's intranet system.

Skeletons is one of the codes used by the US military secret laboratory, just like the pink pig.

The difference is that everyone knows that skeleton is one of the codes of the US military, but there is no exact information that pink pig is one of the codes of the Chinese imperial army.

It disappeared in the night sky half a year ago.

Although many people suspect that this man is an internal member of the Chinese Imperial Army, no one has any clear evidence.

This time, pink piggy is back in the river and still fighting for the Chinese Empire, but it is fighting with the folk hacker alliance. It seems that they are far away from the staff of the military headquarters and do not cooperate with each other.

In fact, the operation of the consideration is more appropriate to cooperate with the private hacker alliance.

When she appears on the network, she uses a civilian IP. Unless you are in the central control room, it is impossible to find out whether her IP is a real civil IP.

At this time, the United States had not broken the central control room of the Chinese Empire, so they could only doubt it.

When the "pink pig" logo is displayed, hackers all over the world are boiling!

They almost went to tell each other: the pink pig disappeared for half a year is back in the river!

All eyes are on the Chinese Empire Network on this war without smoke of gunpowder.

"Don't be discouraged. I'll give you a set of code. You can attack each other's terminal every five minutes, and occupy all the network bandwidth of the other party forcefully."

In consideration of this, use the voice changing headset to contact the hacker alliance in the third district.

Gradually, they joined more and more people, whether hackers or not, as long as they can use computers and send instructions with DOS, they all join in.

Many people have great power. At this time, the power of the group finally appears!

When many spontaneous hackers helped to attack the terminal network of the secret laboratory in the United States, he hid himself. He tried to imitate the other party's four lines of instructions with prolog, wrote a string of code, and sneaked in through the back door of the skull and bones Association, and made a circle in the other party's intranet.Her program is not mature, and the other party's understanding of intelligent programming is more mature than them.

Soon, she was found.

Before being intercepted, he released his "pink pig" logo again, and took a screen capture to send it to a forum where hackers gathered.

"Brothers and sisters, do skeletons who want to go to the United States have a wave?" Think about it in the forum to leave the other side's back door port and crack password.

This news set off a huge wave on the World Hacker forum.

American skeleton Association back door port and crack password!

How many people are begging for money outside!

Actually was "pink piggy" so easy to give up!

This opportunity is so rare!

As we all know, now that the back door port and the password are open, the skeleton will change the password immediately after learning.

So they have a very short time gap to use.

Therefore, without saying a word, we all launched a general attack on the US military skeleton society terminal!

The volume and quality of this attack is not comparable to that of the civil hacker alliance in the three regions of the Chinese Empire.

The United States attacks other countries' network systems all the time, looking for loopholes in other countries' networks. Similarly, other countries are also interested in American network systems and loopholes.

The contest never stops.

When the U.S. military secret laboratory staff found that their network suddenly crowded, even a simple command is difficult to send out, only then realized what the problem was.

"Pink piggy again?"

"Is it really in the Chinese Empire?"

"I said last time that pink piggy should be an insider of the Chinese Empire. Don't you believe it?! I don't want to see who gets the best of it! "

"It is true that this pink pig is an insider of the Chinese Empire, but the question is whether he is a member of the government, the military or the people, which is the key."

"What's the matter? If it's non-governmental people, you still want to recruit them? "

"Of course." "I'm not aiming at anyone, but compared with pink pigs, all of you are rubbish!" said the head of the US military secret laboratory

Everyone looked at their leader with the dog's expression.

Have you said that about your subordinates?!

“FXXK! Can't bear it

"Fight with him!"

These stimulated military laboratory staff once again engaged in the crazy attack on the Chinese Empire.

This time, though, he has won precious time for Huo Shaoheng.

Huo Shaoheng finally cut off the logic link of the four lines of instructions, turning it from an intelligent program that can carry out logical analysis and secondary programming by itself into a common source code.

Stripped of the intelligent system of this program, you can see what the source code behind it is doing.

Huo Shaoheng nervously browses the source code, at the same time, according to the source code, he looks for what the four instructions have done, the hidden data, and the misleading direction in the system.

At this time, I have been wandering in all 27 districts of the Chinese Empire and returned.

After understanding the situation that each district is attacked by the blue dot or even captured, he has an idea.

Her slender fingers were flying like butterfly wings, and soon she gave orders one by one, starting from zone one, setting obstacles for those invading blue dots.

One by one, they leave traces without hesitation to erase, just like her devourer. Exe, every intruder, can only be used to strengthen her appetite!

Those who don't beat me will only make me stronger!

……

The secret laboratory on the other side of the ocean just changed the back door port and reset the password of the skull and bones club, and then beat back the first wave of network attack.

But soon, they found out that after the first blow, they were facing the second one!

"Report! We've lost a lot of data! "

"Report! There is a phagocytosis program in the first district of the Chinese Empire

"Report! Request evacuation! "

"Report! Request evacuation! "

"If we don't withdraw now, we can't get all the information we have!"

The head of the U.S. military secret laboratory kicked the computer desk, "fxxk! Pull-back! Pull-back!”

Just as the U.S. military retreats, we are thinking about it together Troy.exe Package it, disguise it with an intelligent program, and put it in the information data collected by the blue retreating people.

This small program is called Trojan horse program. It's just a small virus program that you can grab on the Internet.

It's not very useful. It will only wipe out all the data that the US military seized from the Chinese imperial network this time, and erase all the hard disk data of the other party!

An hour later, the frenzied cyber attack finally stopped.In the central control room of the headquarters of the special operations department, the staff did not dare to take it lightly. They were still staring at their own territory nervously and constantly scanning the network with software for fear of "time bombs" left by the other side.

She believes that the best defense is attack, so her strategy perfectly implements this principle.

When you raise a butcher's knife to someone else, you'll also reveal your deadly heart.

In the secret laboratory of the U.S. military, the laboratory staff in white coats outside the military uniform took tissue to wipe their sweat, and said with fear: "fortunately, we withdrew early. This time, the harvest is still a lot. ——Let's enjoy the most mysterious intranet system of the Chinese Empire

This is the third shift. It's three o'clock today.

Remind relatives of the monthly and recommended tickets Oh!

My dear, Mada!

www.novelhold.com , the fastest update of the webnovel!