3600 headquarters.

The safety engineers are also watching the live broadcast. Xue Ninglu's operation is too windy, and the engineers don't know what language to express.

Some engineers are imagining that if their security protection mechanism meets such a savage and unreasonable girl and uses the computer in such a mess, will the computer be poisoned?

The answer is yes!

Even if there is no poisoning, the anti-virus software activated to start automatic defense will drag down the user's computer to become slow and stuck.

However, from the live screen, it seems that the server of the source code company is not affected at all.

Wei Ruan also paid attention to this situation.

"Make complaints about the source code," said Tsun TSE, the soft engineer.

Wei soft actively participated in the security competition of the source code company and launched the first round of offensive.

Since Xue Ninglu is so confident about ordering emails, Wei soft will look for loopholes in emails.

With Wei soft's technology, it is found that Xue Ninglu's email address is very simple.

A beautifully packaged virus is sent from the disguised IP address to the server of the source code company. Xue Ninglu does not need to download it. The virus is automatically downloaded and installed.

Wei soft's engineers look closely at the big screen. The virus can sneak into the system and steal and modify the system data. It is a high-risk type.

Wei soft's engineers affectionately call such a virus poison crystal.

"Enter the target server."

"So easy?" Wei soft's engineers were stunned for a while, some incredible.

"Where does the singularity OS server have any defense mechanism? It's simply not fortified!"

"The virus has entered the system and is loading with system data..."

At the scene, shales took a sip of beautiful coffee and felt that the singularity OS was just like this.

Shales also has absolute confidence in weisoft's technology. Almost all the global PC operating systems are weisoft's market. If weisoft claims to be the second in security technology, no company dares to be the first.

Shales is waiting for good news.

At this time, Warwick's security system has been detecting attacks on the periphery.

The fatal attack was soon detected. The technicians fed back to the source code company, and everyone was sweating for the source code company.

Wang Kai has received many calls from people inside the source code company.

The callers are friendly partners with the source code company like Warwick, and more are professional technicians in the dark in China. They detect the attack on the periphery, spontaneously report the situation to the source code company, and even provide technical support.

These friendly people hope that singularity OS, as the first operating system that really starts from the bottom, can last longer and not be ridiculed by the western scientific and technological circles.

Wang Kai was sweating and it was too late to answer the phone.

There were so many calls that Wang Kai didn't even hear what the other party was saying, so he simply replied, "received it, thank you!"

In fact, even if Wang Kai heard what the other party said and adopted the other party's method, it was too late in practical application.

All defense depends on the singularity OS itself.

The scene of the Convention and Exhibition Center is also very bad.

The attack on the server is constantly displayed on the big screen.

An attack represents a point. Taking Jiangcheng as the center, the location of the attack points is distributed according to the identified IP address. The colors are green, yellow, orange, red and dark red to show the damage of the attack respectively.

At the beginning of the game, a few green spots occasionally appear.

Now the situation is that all kinds of dark red dots on the big screen have spread all over the whole screen.

Finally, the whole big screen is dark red, which means that tens of thousands of organizations around the world attack the servers of the Convention and Exhibition Center in the most violent way at the same time.

The audience took a breath, which was terrible.

Warwick, Penguin housekeeper and 360 had been calling the source code company to tell the other party what the type of attack is and what the solution is.

At this time, they have no time to call because there are too many times and types of attacks.

Such a large-scale attack is the first time in the history of human Internet security.

Lichi TV anchor: "audience friends! Audience friends! Good morning, everyone. The game has just started for less than two hours. There have been a lot of attacks from all over the world! We can see that the whole big screen is dark red, which shows that the server has been attacked quite a lot. "

"Let me look at the small screen next to it. There are statistics on the number of attacks. So far, the number of attacks on the server is 20 million! Audience, it's a pretty terrible 20 million times! "

After 20 million attacks in two hours, it collapsed on a server.

The anchor of litchi video said, "let's look at the scene. What are the technicians of the on-site source code company doing?"

The anchor switched the camera to the scene. The anchor said in silence: "the staff of the source code company are still operating on the extension. They use the server to play games, and the Internet to surf the Internet. It seems that they have not been affected at all. The green screen representing the server security system is still green, This proves that all current attacks should be ineffective. "

Wei soft headquarters.

Shales is still waiting for his poison crystal to enter the server system to play a role, but the actual situation is surprising.

Wei soft monitored that poison crystal entered the server of the source code company, and monitored that poison crystal began to use system data to assemble itself.

Then

Then there's no more.

The poison crystal virus is like a stone thrown into the sea without response.

Wei soft's engineer was a little flustered and used other methods to attack the server of the source code company, but the situation was similar to the poison crystal just now. There was no response when he threw it down!

Not only Wei soft, but also the international hacker organizations that challenge the source code company, or the more arrogant technology experts, have adopted various methods and used what they think is the most advanced technology to attack the server of the source code company, which has no effect.

More than 20 million attacks seem to be the same as no attacks.

"What the hell is going on!" Asked shales.

In fact, not only does shales have this problem, but more people have this problem.

What the hell is going on! Why does the attack have no effect!

Those friendly enterprises who are undertaking source code companies are stunned at the picture.

All attacks are invalid!

Launch attacks, some of which are world-class! Such an attack, even 360 or Penguin housekeeper, is very difficult. It must be a national security mechanism to defend it.

But they are not valid for singularity OS servers!

What the hell is going on!