HacKer

Chapter 633: Broken knife group, is a big penguin in the ghost!

Jade Building, 38th Floor, Office of Deputy General Manager of Mi Rui Technology.

Mushuang sat next to Shi Lei, put down the tableware in his hand, pretending to look at Shi Lei casually, but with a trace of concern in his eyes.

Li guess did not pay attention to Shi Lei at all. In his eyes, it seems that only Wen Ruoyun exists. Although Wen Ruoyun took a look at Shi Lei, but also did not pay attention, but with Li Gumei eyesight and hope for teasing.

Shi Lei held the phone with one hand and listened to the message from the clothes. Shi Lei did not feel any surprises when the dreamer's online payment system was attacked.

In the Internet world, dream entertainment has always been at the center of public opinion and has received a lot of attention. This time, Dream Entertainment released the Dreamer online payment system. A large number of hackers will definitely register the Dreamer account and then try to crack the Dreamer online payment system in an attempt to benefit from it.

“Is there any big problem?” Shi Lei tried to ask in a simple language, lest Mu Frost worry.

"The origin of Sr supercomputer can completely resist the defense, but after the analysis of the black magic software, the offensive personnel are divided into two types. The first type is a zero-hacking hacker, and the type of personnel is occupied; the second type is a hacker with uniform organization scheduling. , divided into three organizations, can not determine the specific source, the system is customized to ABC. Group A offensive quota, Group B's offensive quota, Group C offensive limit is 1, the system automatically confirms Group C as the most dangerous target, Further anti-tracking." The senior logic thinking module of the company, independent analysis to determine the most threatening goals, and adopted tracking measures.

"The premise of maintaining security, authorization to handle it." After Shi Lei finished speaking, he hanged up the phone directly.

Yizheer completely reached the level of intermediate pseudo-artificial intelligence, and the advanced logic thinking module even exceeded the definition of intermediate pseudo-artificial intelligence.

There is a limit to authorizing the decision to handle the problem on its own, and there will be no catastrophic problems.

Seeing Shi Lei hang up the phone, Mu Shuang took the initiative to give him a meal, instead of asking who was on the phone or what the phone was.

This is the cleverness of Mushuang!

"Shi Lei, tell you a surprised fact, these things are all personally cooked by Xiao Lizi, including tomato ribs soup!" Mu cream white and jade's slender hands, pointing to the light taste of the coffee table, with a cavity Said with a smile.

Shi Lei looked at Li guess with amazement. In the past four years, Li Yu and Li guessed the dormitory. Li guessed what it was. Shi Lei was quite clear. Not to mention cooking soup, it is the simplest rice cooker to cook rice, Li guess will not!

"Little Li Zi, I remember when I started school, wouldn't you have anything?" Shi Lei deliberately glanced at Wen Ruoyun and said: "The power of love is great!"

Wen Ruoyun looked at Li Gu with a smile and a thumbs up. He was not embarrassed by Shi Lei.

After tasting the love dinner that Li Jian personally made, Shi Lei did not stay too long, and once again came to the five floors of the Jade Building.

Entering the core area, pulling a swivel chair, Shi Lei asked: "What is the situation?"

"Sr continued defense in 36 minutes. Free hacking attack reduced 928. Group A and Group B withdraw from the offensive sequence. Group C's offensive intensity continues to increase, based on the original proportion of the base measurement, the C group's offensive limit rose to 30% "There is a report on the situation and at the same time on the screen, showing the corresponding situation.

Shi Lei chuckled twice, and the unsolved defense mode of the endless defense system. Not to mention the ordinary free hacker, it is the world's peak-level hacker, and he also wants to attack and break through defense.

The only way to defeat the endless defense system is to force the restart of the defense calculation of the endless defense system through a huge computing resource.

At the moment of restart, the endless defense system has not been deployed yet, and with this moment it is possible to break through the endless defense system.

It is a pity that the Endless Defense System has become one of the direct control subsystems of the company. It is entirely supported by the origin of supercomputers.

Want to use the huge computing resources to make the endless defense system crash, at least the server like Supercomputer Yan, to achieve full performance, it is possible to kill the combination of endless defense system and supercomputer origin.

"Turn the tracking progress of Group C to my side, I personally carry out the tracking operation." Shi Lei ordered the execution of the order.

It is indeed very powerful, but it is very slow to handle highly complex tasks.

After Shi Lei took over the anti-tracking, he immediately launched a fast anti-tracking work. As the line of code was continuously improved by Shi Lei, the source of the C group attackers became more and more clear.

About seven or eight minutes later, Shi Lei showed a sneer on his face. He has locked most of the sources of attackers in Group C.

One of the sources has aroused the attention of Shi Lei!

An offensive data link from Hong Kong Island, the way of attack is very unique, if it is not dream entertainment has an endless defense system, I am afraid it has fallen.

'Oh it's you! Shi Lei’s heart has already identified the identity of the other party.

The hacker from Hong Kong Island, the code name in the hacker world is broken, his offensive method, like the same, does not follow the common sense, often achieves quite amazing results. !

Shi Lei knew the broken knife in the past life. A powerful hacker who has reached the world's super-class level in terms of technology. If he gives him some time and freedom, he can even be promoted to world-class!

Broken knife is not a free hacker, but a small hacker leader named the broken knife group. Although there are not many members of the Broken Knife Group, there are only less than 30 people in the Broken Knife Group.

It is unceremonious to say that the strength of the Broken Knife Group can be compared with some of the most famous third-generation hacker organizations, which is also the reason why they are dragged down because they are too small.

If the broken knife is willing to absorb members on a large scale, with the world-class horizontal technology of Broken Knife, the Broken Knife Group can become a second-generation hacker organization!

In the past life, Shi Lei had a few points to appreciate the broken knife.

But the broken knife is the enemy!

The reason why the broken knife group keeps a small number is because they belong to the Big Penguin Company and belong to the secret weapon network of the Big Penguin Company.

The relationship between the Big Penguin Company and the Broken Knife Group is definitely a secret in the secret. The whole company is probably only known by the twisted vine. After all, the reason why the Broken Knife Group is affiliated with the Big Penguin Company is that it belongs to the Twisted Rattan.

Twisted vines rarely use the broken knife group, even if the brave world is in a state of momentum, it is about to open a public beta, and Twisting has not thought about using a broken knife group.

The foundation of Big Penguin is the penguin instant messaging tool, which is not yet their center for network entertainment. Even if the dream entertainment shows its strength, the big penguin company is worried that the twisted vine has no determination to break the boat.

When the dreamer online payment system was officially launched, the twisted vine could not sit still!

Big Penguin's Tenpay platform is a core project of Big Penguin. With the TenPay platform, the entire industry chain of Big Penguin is built around. Including the pat, the penguin communication value-added services, online entertainment recharge, all rely on the convenience of Tenpay.

Dream Entertainment dares to use the brains of the Big Penguin core project to try to compete with the Big Penguin's Tenpay, to divide the users of Tenpay.

How can twist vines swallow again?

The problem of crossing the king of the FireWire King has already made the twisted vine very uncomfortable. He knew that Shi Lei had developed the king of the gun king, but there is no evidence.

This time, Twisting Rattan finally made up his mind to try his best to entertain the dream!

The broken knife received the notice from the twisted vine, and immediately convened the whole group members to launch a crazy impact on the dream entertainment.

The twisted vine is full of confidence in the broken knife. The broken knife ranks high in the hacker world, and its reputation is very large. It goes far beyond Yan Liangtao and the dark spirit and the dark soul, and it is the dark night of the dark night dynasty and the black knife of the hacker alliance.

After the broken knife was shot, the twisted vine did not consider the possibility of failure. He was still sitting in the office at the moment, waiting for the joke of dream entertainment.

Online payment systems are no small matter. If you are controlled by hackers, tampering with data will definitely cause big problems.

‘Shi Lei ah Shi Lei, your last king of the gun king, made our big penguin faceless. This time, your dream comer online payment system crashes, I don't know what impact it will have? Hahaha! ,

Twisted vines thought evilly. Once the dreamer's online payment system was destroyed, the network water army arranged by the twisted vine would madly destroy the dream entertainment.

At that time, even the brave world may be implicated!

If everything follows the plan of the twisted vine, dream entertainment is very likely to be lost. But if you follow the script of the twisted vine, what is the stone brother mixed?

Shi Lei locked in the offensive source of the Broken Knife Group and, together with the clothes, tracked the real IP address of the owner of the Broken Knife Group.

Analyzing the real IPN site requires a lot of data tracking. It is impossible to do it quickly by relying on Shi Lei alone. It is impossible to do it alone. Only Shi Lei is responsible for the complexity of the task, and the driver is responsible for the simple data analysis task, in order to quickly analyze the real IP address.

This is also the auxiliary role of artificial intelligence!

"Sr has locked the real IP address of the sixteen people and is calculating the real IP address of the remaining eight people." Yirui relies on the computing speed of the 10TFLas originating from the supercomputer. As long as Shi Lei analyzes the key complex tasks, the clothes will be analyzed. Complete the remaining data analysis tasks in a very short time.

A few minutes later, Shi Lei’s face showed a smile.

The real IP addresses of the 24 hacker members of the Broken Knife Group were all analyzed. It includes a broken knife with the world's superb level and has not escaped.

Shi Lei is a world-class hacker, and also combined with the intermediate pseudo-artificial intelligence system to deal with a world-class broken knife, not too complicated.

‘Twisting vine, you are waiting for me, dare to sin in the back, I will make you look good! Shi Lei’s face was cold and his eyes sparkled with fierce light.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like