Fairy Technology

Chapter 262: Broke it and don't let us pay?

No matter what flaws, the advantages of this monitoring method cannot be masked.

No matter how powerful the existing stealth fighters and ships are, they cannot be hidden under human eyes. Obviously, if Huaxia really adopted this monitoring method, even the old American F22 would not be able to hide.

This is equivalent to erecting an invisible city wall at the boundary of Huaxia's territory. It is impossible for anyone to sneak in.

For a while, countless people aimed their eyes at the telescope.

They once again came up with the idea of ​​cracking the technology contained in the telescope, no matter how difficult it must be.

After all, this thing is too good, it is simply invincible!

The old American side thinks more. Can the monitoring method owned by Huaxia find the mysterious missile it owns?

In the view of Laomei, the missile that leaped over the East China Sea was like an invincible spear, breaking through all defenses.

Who is stronger between these two?

If, as they have speculated, Huaxia is using the upgraded version of the telescope as a monitoring method, then they can definitely find all flying objects, no matter how powerful your stealth technology is, it is impossible to stealth directly under the naked eye, right?

The United States President had an incredibly firm idea at all costs. At all costs, the technology of the telescope must be obtained. This was the basis for him to avoid falling into political passiveness again.

His idea has even overcome the thirst for superconducting materials.

Soon, a report was placed on Mr. President's desk, which was sent by the CIA.

After reading the contents, Mr. President's face was as black as the bottom of the pot.

This is a research report. According to the analysis of intelligence agencies, as long as Huaxia really has such a powerful monitoring method at the border, how can the people who kidnapped Shen Bing leave Huaxia smoothly on the Spring Festival? It is estimated that the helicopter was discovered when it entered China's airspace.

Based on this hypothesis, their plan to kidnap Shen Bing may have been recognized by Huaxia, and then the plan will figure out the later things.

Even the original explosion may have been made by Huaxia.

Thinking of that explosion, Mr. President was full of anger.

But maybe ... maybe there is fart! Without evidence, can they blame Huaxia for making this terrorist act for no reason? The most important thing is that this matter was that they themselves had bad intentions first, to kidnap people from other countries, no matter what the consequences, they only had to beat their teeth and swallow their blood.

It can be said that Mr. President knows this possibility and is even more uncomfortable than not knowing it.

Nimei! The United States has never been counted by any other country, but this month, the powerful United States has been counted by Huaxia many times, and they have been ashamed, and they are all very embarrassed.

Mr. President is also worried about this issue. The United States ’approach may have completely destroyed the relationship with Magic Fairy. It is not feasible to use Fair Means to open a factory in the United States. Then the remaining available methods are not too much.

Abduction of Shen Bing? It had been abducted once, but the final outcome was very fucking.

Spy? They didn't try this method, but they didn't know how to do it. Even if they touched the entire factory to the bottom, they didn't figure out the production technology of the telescope, even the basic material manufacturing technology.

As for directly cracking the telescope technology, the research institutions on the old US side have never stopped this work, and there has been no progress.

Although they made some other discoveries in the process of deciphering, they are still far from the real goal.

Mr. President is going to convene a staff member to have a special discussion on this matter and see if he can come up with a more perfect solution.

...

The United States is full of anticipation and resentment for the telescope, why not other countries?

However, in these countries, some people agree with the old Americans, hoping to crack the telescope technology and then develop a more powerful version, such as the one they guessed is used by the Huaxia military.

But many people directly hit their ideas on the telescope itself.

I can't get a higher-end version, but the telescope can also be used, right?

The telescope has a high-definition viewing distance of two kilometers and a field diameter of nearly one kilometer, which also has operational space.

I do n’t have the strength, so I do n’t need to see it so clearly. For example, I use a telescope to see people ten kilometers away, but I can definitely see it if a plane flies over.

Higher-end products can't be obtained, but there are still ways to buy telescopes. After all, there is no ban on sales of this thing, and Huaxian Technology is open for sale online.

This matter can be completely discussed with the magic fairy technology. How many high-end telescopes do you use to build the territorial defense line? I can use ten times the amount of it?

This may not prevent ballistic missiles, but it is still useful to find cruise missiles or fighter planes.

Shen Bing naturally wouldn't think of it, because a Chinese official's counterattack on the old beauty perfectly performed the function of the ghost-eye type 1 telescope, but it could bring a surge in sales of the telescope.

Now this sales volume has not been reflected, and after a while, it is estimated that many companies will come to your door.

At this time Shen Bing was busy working on that set of security software, a universal platform software.

Now he has completed the compilation and packaging of the intelligent core, which is also the most core part of this software, and its function implementation is relying on the intelligent core to complete.

Like super artificial intelligence, this intelligent core is also compiled with Dragon language. It is estimated that this will make those ape who try to crack this security software go crazy.

Shen Bing made some restrictions on the core ability of intelligence. If super artificial intelligence is the **** that controls everything, then this core of intelligence is only equivalent to a master of unparalleled combat power.

The biggest difference is that super artificial intelligence can walk anywhere in the network, get all available information, and even ignore rules. The intelligent core is different. To achieve any function, it can only rely on externally defined interfaces. Without these interfaces, it is a genius who has cut off its hands and feet.

When Shen Bing finished modifying the last line of code through the conscious reading device, he installed the software on his mobile phone as soon as possible.

Then Shen Bing picked up the phone and called Chen Wanhua, the deputy manager of the company's network department.

"Mr. Chen, how is the network offense and defense team in the company trained?" Shen Bing leaned back in his chair and asked leisurely.

Although Chen Wanhua is the deputy manager of the network department, he actually exercises the authority of the manager, because the company's network department manager is a virtual guy hanging on the ball.

Shen Bing naturally has his reason for this arrangement. As a technical department, the network department does not have strong professional technical strength. How can he be the manager? As for network offensive and defensive capabilities, the ball super artificial intelligence is definitely the most powerful in the world.

It's just that the ball is basically in stealth. Only when the company's website is attacked and those in the network department can't cope, they will help.

Especially after the company revealed about the normal temperature superconducting material technology, more and more hackers attacked the magic fairy technology official website, and the number of ball shots also gradually increased.

After only a few beautiful Jedi counterattacks, the group of guys who professed to be masters in the network department admired them.

"Boss, under the training of our boss, our group of people will definitely be in the top ten in the world network attack and defense team!" Chen Wanhua said with confidence.

Isn't it true that he said this, who made Huanxian technology rich? Those who have recruited have a solid foundation, coupled with the focus of ball training, if they are not successful, then they will not be able to help the wall.

Uh ... the boss in their mouth is the ball.

Shen Bingdao: "That line, you let them prepare first, I will come to the company in a while, there is a task for you to complete."

After all, Shen Bing directly hung up regardless of whether the other party was in doubt.

Shen Bing then brought Li Xiao and drove him to the company.

When Shen Bing put his cell phone on the desks of the unsophisticated technical houses in the Internet Department, all of them looked at each other.

"Boss, are you sure you want us to attack your phone?"

"Don't let us pay for it?"

"Boss really won't help?"

"Can we operate this phone ourselves?"

For these people's questions, Shen Bing gave affirmative answers one by one.

These people are a little dumbfounded. They just throw the mobile phone here and play with it just to implant Trojans into the phone. Is there a simpler task than this?

There is a recognition in the field of network security ~ www.wuxiaspot.com ~ No matter how powerful the security software is, it cannot withstand a pig-like user. When you see the link, click on it and you will receive a text message and reply. If you don't make a move, then it's really unreasonable.

Now that Shen Bing has handed their mobile phones to them, they can do the same. Whatever phishing websites and virus links come all over and see how you break them.

There are many experts in this group of people. Compiling viruses is their basic skill. Together, several people can completely get out a virus that is not in the existing virus database. The anti-virus software pre-installed on your phone will not report the alarm. .

"Boss! Give us ten minutes to ensure that the task is completed!" No matter why the boss asked them to hack their mobile phones, the technology house has one thing in common, at least in front of them.

For a while, the entire network department was busy, and they did not avoid Shen Bing. They discussed building a virtual network environment to fool the mobile phone security software that came with the phone, and they could leave the rest to their mercy.

The equipment is very complete here, and everyone's technology is very good. In less than a minute, the network environment was successfully established, and Shen Bing's phone was also successfully connected to this virtual network.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like