The surface of the Zha bomb made by Mo Wen is simple, but the internal structure is very complex. It is because of its simple appearance that Xiang Tianyang's eyes are confused. Xiang Tianyang, who is determined to win, just detonated the Zha bomb when he thought he had demolished it.

But fortunately, this is a competition. The amount of Zha is not much. With the protection of protective clothing, Xiang Tianyang is only slightly injured, and his life is not in danger.

"Old Xiang..." Huang Xiang and Wesley rushed up at the moment when Xiang Tianyang was blown up, took off his helmet and looked at Xiang Tianyang.

"It's ok... I'm ok... I didn't expect... This guy connected all the lines in series. I thought he removed the Zha bomb, but... It detonated... Keke..." Xiang Tianyang knew in his heart that this young man was definitely not as simple as they thought. If he wasn't a professional, he would never be able to make such a complex line layout, even he knew it himself, Such a Zha bomb, he can not be completed in such a short time, so at this moment, he has begun to fear Mo Wen.

"It's OK, we still have one game to see how I humiliate him..." Huang Xiang bit his teeth, as if he would not admit defeat.

"Lao Huang, don't compete any more. We've lost..." he pulled Huang Xiang's arm to Tianyang and advised him in a low voice.

"So what? I won't give up easily... "Yes, Huang Xiang is famous for his special electronic detection skills. Even the senior technicians in the National Security Bureau need to ask him some questions. He hasn't competed with Mo Wen yet, so naturally he won't give up so easily. Even though they have already lost two competitions, he still stands up against defeat.

When Huang Xiang stood up, Mo Wen just removed the Zha bullet from Xiang Tianyang, took off his helmet and showed a proud and provocative smile.

"There's another competition... Let's start..." Huang Xiang walked up to Mo Wen with a gloomy face and called coldly.

"Can... I'm free..." Mo Wen shrugged his shoulders indifferently, with a faint smile, threw his helmet aside, and then took off his protective clothing.

The third competition is the special electronic detection technology. In order to win, Huang Xiang chose the most difficult military secret database to be broken as the main target of this competition.

That is to say, whoever breaks through the firewall of this secret library first can win.

They sat down in front of the two computers. Mo Wen took out a cigarette from his body in no hurry. After lighting it, he took a puff. Then he turned back and gave Yang Lan a wink.

Yang Lan sees this, coyly white, don't ask one eye, in the heart can't help but secretly scold a way: all when, still have the mind Tiao tease me? Hum... But I won those two competitions just now. Hee hee, I don't even know when I learned these things. I'll see how I can deal with you at night. Let you go now.

Mo Wen turned his head, his hands began to knock on the keyboard, and the cigarette in his mouth was constantly being sucked, and the smoke came out of his mouth.

One by one, the letters were knocked by the two men's hands, along with the network, and directly spread to the military secret database of Liberia.

While Huang Xiang is attacking the host computer of the affected country, Mo Wen has quietly broken into Huang Xiang's computer.

For a moment, Mo Wen began to scan Huang Xiang's computer system program, and found that in addition to * *, Huang Xiang really used fake IP to indirectly hack through other people's network, which immediately aroused Mo Wen's curiosity. He wanted to see how many pounds this master had. Through the system program scanning, Mo Wen found that Huang Xiang's technology in this aspect was very strong, I'm afraid that experts in this field can't tell that his attack is through the host system of the Japanese government to carry out hacker attacks on the affected countries.

After playing enough, Mo Wen left a virus program in Huang Xiang's computer host, then retreated all over, and then began to attack the military secret database that affected Leah.

Unknowingly, the other side intruded into the host computer of the secret library of the military aircraft that affected Liberia, and then inserted a virus program with low-end intelligence into the other side's MSN program, but the size of the program did not change at all. Most of the software codes had a lot of gaps, and many things, including viruses, could be inserted in these gaps, Mo Wen takes advantage of this point to make it become the mother of the virus, parasitic in it. As soon as the program runs, the virus will start at the same time to entertain its task. In this way, as long as the other party finds someone * *, the program will start to run automatically.

Moreover, taking advantage of the system vulnerability, Mo Wen began to re attack the military secret database that affected Liberia. While downloading these military secrets, he calculated the time. When the download was completed in about three minutes, Mo Wen deliberately exposed his own * * to make the virus program in the other party's computer run, The staff involved in the secret library of the military aircraft of Liberia found that someone had broken into the secret library and quickly started to stop it. In this way, they just fell into the trap of Mo Wen and accelerated the operation of the virus program.

Three minutes later, don't ask if the download is finished. After a enter key is pressed, the virus program starts the final blasting command.

"Bang Bang..." all computers in the secret library of Nigeria exploded in an instant after the virus command was given.

And Huang Xiang's computer, also in this moment black screen, a burst of white smoke from his computer.

Mo Wen has retired with success and successfully obtained the military confidential files that affected the state of Liberia.

In recent years, with the rapid development of economy, the ranks of hackers are also growing. However, in these fields, the really outstanding experts are far less than those in Leah, Japan and other countries. Huaxia's network age has been more than 20 years since 1994, when the Ministry of Posts and Telecommunications of Huaxia opened network services to ordinary customers, The Institute of high energy physics of Chinese Academy of Sciences has built a network to test Xing quality. Shortly after its opening, a European hacker found this strange address and broke in, becoming the first hacker case in China.

For a hacker, it is necessary to learn how to program. The computer is designed for programming. Running program is the only function of the computer, and mathematics is also indispensable. Running program is actually operation, discrete mathematics, linear Xing algebra, calculus, etc!

The term hacker is usually defined outside the circle or in the media as a computer expert who specializes in the illegal activities of other people's systems.

With the development of the times, there are more and more hackers on the network. They can only use scanners to scan everywhere, bomb people with ipzha, and destroy them aimlessly. They are not conducive to the development of computer technology, but harmful to the security of the network and network paralysis, bringing huge economic and spiritual losses to people.

The first computer was born at the University of Pennsylvania in 1946, and the first hacker appeared at MIT. Bell Labs has it, too. The initial hackers are generally some senior technical personnel, they are keen on challenges, advocating freedom and advocating information sharing.

Since 1994, the rapid development of Internet in China and even the world has provided convenience, freedom and unlimited wealth for people. Politics, military affairs, economy, science and technology, education, culture and other aspects are more and more networked, and gradually become a part of people's life and entertainment. It can be said that the information age has come, and information has become the third resource besides material and energy to maintain human society. It is an important medium in the future life. With the popularity of computers and the rapid development of Internet technology, hackers also appear.

Today, hackers are no longer unknown characters on the Internet, but they have developed into a unique group on the Internet. They have different ideals and pursuits from ordinary people, and have their own unique behavior patterns. There are many hacker organizations organized by like-minded people on the Internet. But where do these people come from? What kind of people are they? In fact, except for a few professional hackers, most of them are amateur hackers. In fact, hackers are no different from ordinary people in reality. Maybe he is a student studying in an ordinary high school.

Some people have conducted a survey on the age of hackers. The main group of hackers is young people between 18 and 30 years old. Most of them are male Xing, but there are also many female Xing joining the ranks. Most of them are students in school, because they have a strong thirst for knowledge about computers, and curiosity, energy and other factors, which are one of the reasons for them to enter the palace of hackers. There are also some hackers who have their own careers or jobs, which can be roughly divided into: programmers, senior security officers, security researchers, professional spies, security consultants, etc. of course, the technology and level of these people can't be compared with those of the "little hackers" who have just started, but they also grope through this step by step.

The hacker war gave birth to a large number of new generation hackers, and also made them fall into the trap of impetuosity and eager to show off from the beginning. The new generation is not willing to explore in obscurity, but takes technology as a toy. When a group of children use the Trojan ice to steal QQ numbers and feel funny, they don't know that the predecessor ice they worship has never attacked other people's computers.

After several hacker wars, both hackers and the public began to reflect on the positive and side effects of this action. By 2002, this wave began to subside, just as lion said in his farewell message: Ji Qing has long been gone. In the next few years, despite the rise and fall of various hacker organizations, large-scale hacker wars have never happened again. For commercial needs, hackers, which were originally hidden in the world, are sailing to the surface of ostentation and ostentation. Most of the old hacker organizations have turned into commercial organizations, and hackers have also turned into network security experts. Before the official closure of Hongmeng website, which has been deeply impressed by netizens, it has been closed for many times and has fallen into the situation of survival in name.

After the dissolution of the red League, some people asked: the red League has fallen, is there any new hacker standing up? This is not a problem at all. Although the hacker culture is gradually returning from the public to the minority, the small-scale hacker conflicts accompanied by China's diplomatic frictions have never stopped. When we look back to reflect on the impetuousness of the hacker world, we can't forget that angry summer in 1999 when we saw the five-star red flag flying on the White House website, we couldn't help floating in our hearts.

At this time, when Mo Wen got the files in the military secret library, everyone couldn't help the excitement.

Yes, they once thought about the joy of stealing.

"It's impossible... I can't lose... It's impossible... You * *" Huang Xiang was obviously excited. When he saw that his computer had been implanted with virus program, he cried out wildly.

"Ha ha..." Mo Wen laughed, pulled out the USB flash drive on the computer, stood up and kicked off the stool, then cut off the power supply of the computer, looked at Huang Xiang with a smile and said: "this is a contest in itself... I have to admit that your technical level is one of the best, but... You still lost..."