Saying XX lines makes me rich
Chapter 223
Chapter 223
As the old saying goes, those who are able work hard, and those who work hard are able.
He also said that as long as you are willing to endure hardship, you will find that you have endless suffering.
Pretending to compete is a great thing, but if pretending to compete would bring endless toil, Chu Qingyu chose to refuse.
So after revealing that he had invited the "mysterious hacker" for assistance, Chu Qingyu returned to his office at the institute alone.
Because they don't know when Organization R plans to start attacking, Pixiu and others on the defensive side can only wait and see, passive and impulsive, but they have to do this.
Pixiu wanted to find a channel to break into the R organization and obtain more enemy information. Unfortunately, the R organization itself only had 9 people, and each one was carefully selected and tested before being absorbed.Regardless of the personalities of the members, the relevant information within the R organization is kept strictly confidential and no one can pry.
As for hacking into their intranet?
Sorry, zero, the leader of the R organization, is the uncrowned king of the hacker world.
Of course, Pixiu is not afraid now. After all, there is a big boss here, so he can happily be a pawn and paddle in the water.
Thinking like this, Pixiu couldn't help but secretly send a message to Chu Qingyu who left the computer room and went to the office: [Boss, is there any way to get the attack time or plan from R? 】
Chu Qingyu was still modifying the computer with bare hands. After cutting into the script and character settings, he found that a high-end computer was not enough and had to be modified.Fortunately, with the support of the script and characters, whether it is a computer or the Internet, in her eyes, it is already on the same level as a car played by kindergarten children.
It’s also easy to stir up.
After receiving the news from Pixiu, Chu Qingyu used a nearby computer to create a new traceless ghost account, entered the "abyss", and then fell silent.
On the home page of the "Abyss" webpage, in the corner where bounty orders were hung, a recruitment order was hung. The content was edited in the special language of hackers. Chu Qingyu extracted the main content at a glance.
The general meaning is: I've been bored recently and want to do something exciting. Is there anyone who would like to have fun together? The price is favorable, the number of places is not limited, and you want to advance quickly.
Things on the "Abyss" cannot be copied. Once someone tries to copy, failure will also trigger the attention of the administrator.Chu Qingyu took a picture with her mobile phone, sent it to Pixiu, and then said: [? ?Didn't you see? 】
Pixiu was startled and blurted out the first sentence of Xia Guo language he had learned, "Holy shit! I've been blocked?!"
It is said that Qin Hui still has a few friends, and no matter how good Pai Yao is, he still has a few trustworthy hacker friends.The previous call recording was sent to him by one of them.
As a result, now he himself has been blocked, and his friends have not told him.Pixiu had a bad feeling.
I asked other people in the computer room to try it, but none of them could see the bounty notice hanging carelessly on the front page of the section.After thinking about it, Pixiu used his ancient account that he had abandoned for a long time. He logged in and took a look. Sure enough, he could see the reward notification letter.
"What's wrong, we've all been investigated in advance!" Pixiu's face didn't look good. Others also understood and showed increasingly anxious expressions.
Although I have known for a long time that Organization R is not easy to mess with, and the leader of the organization is even more powerful.But before they knew it, someone had figured out their background and connections. They were all trapped in a trap but they still didn't know anything. This was the scariest thing.
If the big boss hadn't invited the mysterious boss as an extra foreign aid, no matter what defensive plan they had made before, I am afraid that once the offensive and defensive battle was triggered, they would be bugs stuck in a transparent glass bottle.
This discovery was definitely a huge blow to them, and every one of them was discouraged.
Just when the atmosphere was low, a computer engineer exclaimed: "Who is this?!"
Everyone followed the sound and saw that the computer that originally belonged to him was directly occupied by an unknown person and was being controlled remotely.
[1 group tracking, 2 groups attacking, let go of the defense mechanism]
As for how they should be grouped, the other party seemed to have never even thought about it, let alone mentioning it.
Pixiu reacted the fastest and said decisively: "I will lead the attack here, and your group will be responsible for tracking."
The person in charge on the other side was stunned for a moment.Compared with Pixiu, who has witnessed the mysterious boss's absolute domineering power on the Internet, and therefore has 100% trust in him, the person in charge, who has no understanding of this mysterious figure, is inevitably more suspicious: "Release all defense mechanisms?"
Doesn't that mean that during an offensive and defensive battle, the door is open and the opponent can come in?
Contrary to the depression just now, Pixiu rubbed his hands and was particularly excited. Hearing this, he said without hesitation: "What the boss means is that he will take over all the defense. Let's safely and boldly treat this offensive and defensive battle as a practical training!"
The person in charge wanted to say something more, but when he received a call at the last minute, he nodded and said "hmm" twice. After hanging up the phone, he no longer hesitated or doubted, and led the people to do what they should do with concentration and seriousness.
With the computer controlled remotely by the mysterious person as the command screen, everyone in the computer room seemed to have a backbone and no longer worried about the lack of real-time information.
As the countdown on the screen reaches zero, the first batch of hacks appear on time!
A large amount of data is on the way. This crude but effective attack method is a common method for hackers to attack the protection network. The attackers have already controlled a large number of computers at the same time through the chicken-catching technique, turning them into chickens. The protective net was violently colliding with each other, while various viruses were constantly overflowing in an attempt to increase the intensity of the damage.
Among them, the most popular worms are of course self-replicating, highly transmissible, latent, specific triggers and hugely destructive.
However, what is most alarming and easy to prevent is the various sniffing and SYN packets used for SYN attacks mixed in the massive buffer overflows and viruses.
After layers of protection and hiding methods such as anti-kill, shelling, and flower commands are applied, these little things are like tiny mosquitoes that can penetrate every hole. If you are not careful, they may penetrate the defense layer and enter the core area. Unknowingly, The key code is intercepted, and SYN packets containing massive data packets are detonated in key areas, destroying your core from the inside.
Pixiu: "I'll go! This is the first impact!"
It is indeed a bounty issued directly in the "Abyss" related section specifically for all hackers on "Abyss". There are too many people coming, it is too complicated, and the attack methods are all kinds of weird and hard to guard against!
When the others saw such a menacing and overbearing attack, they couldn't help but break out a layer of cold sweat on their foreheads.Just when they were worried about whether the mysterious man could be defended by himself as mentioned in his plan, these attacks suddenly disappeared.
It wasn't that they suddenly retreated, but that they were swallowed up by a special program that was deployed on the outermost layer of the protective net at an unknown time.
Everyone's eyes lit up, and they couldn't help but tap the keyboard and sneak over to take a look, only to find that this special program was stretched infinitely, and finally, like Jörmungandr, the giant sea serpent in Nordic mythology that can surround the world, the entire institute's network security was Protective net included.
"What is this procedure?"
"antivirus software?"
"Indiscriminate attack data?"
"Did it eat all those things just now?"
"An arrangement that has never been seen before. Is this the ability of the mysterious boss?!"
Everyone couldn't help but mutter a few words, and then perked up under the prompts on the display screen. Everyone began to pursue or attack with great energy, no longer like ants crawling around in confusion.
all around the world.
"What is this? Why did my data packet just disappear?"
"What the hell! Why do I feel like it's getting stronger?!"
"Interesting, it looks like I'm going to take it seriously."
“Jesus, is this another brand new computer language?!”
"Ha, no wonder R was allowed to issue a reward order, that's why."
The basement where R organization is located.
Unlike other members who did not take Xia Guo's small research institute seriously, Zero, who had already tested it out, paid special attention to today's first wave of attacks and sat in front of the computer early to monitor and observe carefully.
When he saw the Ouroboros-like protective layer appearing, Zero frowned and ordered the member who was best at decoding in the organization: "Little 3, it's your turn!"
The tone of his voice was completely different from his usual bohemian and stern tone.
However, everyone is used to the boss's idleness in life and strictness in work. Although they were a little uncomfortable with it when they first came in, over time they just thought that the boss was a workaholic.
Hearing this, the third child said nothing and only made a crackling sound on the computer keyboard.
This was a silent battle. The first batch of attacking hackers were tyrannically devoured by all their means. None of them were willing to give in and immediately launched a second attack.
This time Ouroboros did not break up the attack, but bit its own tail to form a closed loop, allowing all kinds of data viruses to attack.This kind of reaction made the hackers think that they were unable to resist, and they immediately continued to strengthen their offensive with high spirits.
Little did they know that at the same time as they were attacking, two waves of guys pretending to be their "alliance" were secretly analyzing, tracking, and sniffing them. Some people were even reverse-plugged into tracking software and were not discovered in time.
It was not until the local police came to check the water meter that I realized that all my information had been exposed.
This offensive and defensive battle lasted all night, and the cannon fodder specially recruited by the R organization suffered heavy losses. Even if there were members of the R organization lurking in the second half to quietly provide support, they still couldn't stop coming with the reward. The hackers were gradually wiped out.
What's worse is that once they are kicked out, the hackers will either have all the Internet-connected devices around them exploded, or their private information will be directly posted to the "Abyss" homepage.
Even the management of "Abyss" has been taken over by unknown figures. This is the most powerful threat to hackers.None of the cleared hackers dared to change places and change equipment to continue to appear in this war without gunpowder. Each one seemed to have been really "killed".
It was also at this time that other people on the "Abyss" learned that the hackers had actually done a big job last night, and they all watched in silence.
When Xia Kingdom time reached [-] noon, the opponent's attack finally came to an end.
But everyone knows that this is just the beginning.
The real battle is about to begin.
Taking advantage of this short intermission, Pixiu took a sandwich and milk and ran upstairs to Chu Qingyu's office, pulled open the door frame, and asked, "Boss, is the boss still here?"
Chu Qingyu, who was rubbing her fingers and preparing to eat, glanced at him and shrugged irresponsibly: "I don't know, aren't you two together?"
brave troops:"???"
So the whole night last night, the big boss didn't pay attention to offense and defense?
Chu Qingyu: I’ll just pretend. I’ll be fine soon.
(End of this chapter)
As the old saying goes, those who are able work hard, and those who work hard are able.
He also said that as long as you are willing to endure hardship, you will find that you have endless suffering.
Pretending to compete is a great thing, but if pretending to compete would bring endless toil, Chu Qingyu chose to refuse.
So after revealing that he had invited the "mysterious hacker" for assistance, Chu Qingyu returned to his office at the institute alone.
Because they don't know when Organization R plans to start attacking, Pixiu and others on the defensive side can only wait and see, passive and impulsive, but they have to do this.
Pixiu wanted to find a channel to break into the R organization and obtain more enemy information. Unfortunately, the R organization itself only had 9 people, and each one was carefully selected and tested before being absorbed.Regardless of the personalities of the members, the relevant information within the R organization is kept strictly confidential and no one can pry.
As for hacking into their intranet?
Sorry, zero, the leader of the R organization, is the uncrowned king of the hacker world.
Of course, Pixiu is not afraid now. After all, there is a big boss here, so he can happily be a pawn and paddle in the water.
Thinking like this, Pixiu couldn't help but secretly send a message to Chu Qingyu who left the computer room and went to the office: [Boss, is there any way to get the attack time or plan from R? 】
Chu Qingyu was still modifying the computer with bare hands. After cutting into the script and character settings, he found that a high-end computer was not enough and had to be modified.Fortunately, with the support of the script and characters, whether it is a computer or the Internet, in her eyes, it is already on the same level as a car played by kindergarten children.
It’s also easy to stir up.
After receiving the news from Pixiu, Chu Qingyu used a nearby computer to create a new traceless ghost account, entered the "abyss", and then fell silent.
On the home page of the "Abyss" webpage, in the corner where bounty orders were hung, a recruitment order was hung. The content was edited in the special language of hackers. Chu Qingyu extracted the main content at a glance.
The general meaning is: I've been bored recently and want to do something exciting. Is there anyone who would like to have fun together? The price is favorable, the number of places is not limited, and you want to advance quickly.
Things on the "Abyss" cannot be copied. Once someone tries to copy, failure will also trigger the attention of the administrator.Chu Qingyu took a picture with her mobile phone, sent it to Pixiu, and then said: [? ?Didn't you see? 】
Pixiu was startled and blurted out the first sentence of Xia Guo language he had learned, "Holy shit! I've been blocked?!"
It is said that Qin Hui still has a few friends, and no matter how good Pai Yao is, he still has a few trustworthy hacker friends.The previous call recording was sent to him by one of them.
As a result, now he himself has been blocked, and his friends have not told him.Pixiu had a bad feeling.
I asked other people in the computer room to try it, but none of them could see the bounty notice hanging carelessly on the front page of the section.After thinking about it, Pixiu used his ancient account that he had abandoned for a long time. He logged in and took a look. Sure enough, he could see the reward notification letter.
"What's wrong, we've all been investigated in advance!" Pixiu's face didn't look good. Others also understood and showed increasingly anxious expressions.
Although I have known for a long time that Organization R is not easy to mess with, and the leader of the organization is even more powerful.But before they knew it, someone had figured out their background and connections. They were all trapped in a trap but they still didn't know anything. This was the scariest thing.
If the big boss hadn't invited the mysterious boss as an extra foreign aid, no matter what defensive plan they had made before, I am afraid that once the offensive and defensive battle was triggered, they would be bugs stuck in a transparent glass bottle.
This discovery was definitely a huge blow to them, and every one of them was discouraged.
Just when the atmosphere was low, a computer engineer exclaimed: "Who is this?!"
Everyone followed the sound and saw that the computer that originally belonged to him was directly occupied by an unknown person and was being controlled remotely.
[1 group tracking, 2 groups attacking, let go of the defense mechanism]
As for how they should be grouped, the other party seemed to have never even thought about it, let alone mentioning it.
Pixiu reacted the fastest and said decisively: "I will lead the attack here, and your group will be responsible for tracking."
The person in charge on the other side was stunned for a moment.Compared with Pixiu, who has witnessed the mysterious boss's absolute domineering power on the Internet, and therefore has 100% trust in him, the person in charge, who has no understanding of this mysterious figure, is inevitably more suspicious: "Release all defense mechanisms?"
Doesn't that mean that during an offensive and defensive battle, the door is open and the opponent can come in?
Contrary to the depression just now, Pixiu rubbed his hands and was particularly excited. Hearing this, he said without hesitation: "What the boss means is that he will take over all the defense. Let's safely and boldly treat this offensive and defensive battle as a practical training!"
The person in charge wanted to say something more, but when he received a call at the last minute, he nodded and said "hmm" twice. After hanging up the phone, he no longer hesitated or doubted, and led the people to do what they should do with concentration and seriousness.
With the computer controlled remotely by the mysterious person as the command screen, everyone in the computer room seemed to have a backbone and no longer worried about the lack of real-time information.
As the countdown on the screen reaches zero, the first batch of hacks appear on time!
A large amount of data is on the way. This crude but effective attack method is a common method for hackers to attack the protection network. The attackers have already controlled a large number of computers at the same time through the chicken-catching technique, turning them into chickens. The protective net was violently colliding with each other, while various viruses were constantly overflowing in an attempt to increase the intensity of the damage.
Among them, the most popular worms are of course self-replicating, highly transmissible, latent, specific triggers and hugely destructive.
However, what is most alarming and easy to prevent is the various sniffing and SYN packets used for SYN attacks mixed in the massive buffer overflows and viruses.
After layers of protection and hiding methods such as anti-kill, shelling, and flower commands are applied, these little things are like tiny mosquitoes that can penetrate every hole. If you are not careful, they may penetrate the defense layer and enter the core area. Unknowingly, The key code is intercepted, and SYN packets containing massive data packets are detonated in key areas, destroying your core from the inside.
Pixiu: "I'll go! This is the first impact!"
It is indeed a bounty issued directly in the "Abyss" related section specifically for all hackers on "Abyss". There are too many people coming, it is too complicated, and the attack methods are all kinds of weird and hard to guard against!
When the others saw such a menacing and overbearing attack, they couldn't help but break out a layer of cold sweat on their foreheads.Just when they were worried about whether the mysterious man could be defended by himself as mentioned in his plan, these attacks suddenly disappeared.
It wasn't that they suddenly retreated, but that they were swallowed up by a special program that was deployed on the outermost layer of the protective net at an unknown time.
Everyone's eyes lit up, and they couldn't help but tap the keyboard and sneak over to take a look, only to find that this special program was stretched infinitely, and finally, like Jörmungandr, the giant sea serpent in Nordic mythology that can surround the world, the entire institute's network security was Protective net included.
"What is this procedure?"
"antivirus software?"
"Indiscriminate attack data?"
"Did it eat all those things just now?"
"An arrangement that has never been seen before. Is this the ability of the mysterious boss?!"
Everyone couldn't help but mutter a few words, and then perked up under the prompts on the display screen. Everyone began to pursue or attack with great energy, no longer like ants crawling around in confusion.
all around the world.
"What is this? Why did my data packet just disappear?"
"What the hell! Why do I feel like it's getting stronger?!"
"Interesting, it looks like I'm going to take it seriously."
“Jesus, is this another brand new computer language?!”
"Ha, no wonder R was allowed to issue a reward order, that's why."
The basement where R organization is located.
Unlike other members who did not take Xia Guo's small research institute seriously, Zero, who had already tested it out, paid special attention to today's first wave of attacks and sat in front of the computer early to monitor and observe carefully.
When he saw the Ouroboros-like protective layer appearing, Zero frowned and ordered the member who was best at decoding in the organization: "Little 3, it's your turn!"
The tone of his voice was completely different from his usual bohemian and stern tone.
However, everyone is used to the boss's idleness in life and strictness in work. Although they were a little uncomfortable with it when they first came in, over time they just thought that the boss was a workaholic.
Hearing this, the third child said nothing and only made a crackling sound on the computer keyboard.
This was a silent battle. The first batch of attacking hackers were tyrannically devoured by all their means. None of them were willing to give in and immediately launched a second attack.
This time Ouroboros did not break up the attack, but bit its own tail to form a closed loop, allowing all kinds of data viruses to attack.This kind of reaction made the hackers think that they were unable to resist, and they immediately continued to strengthen their offensive with high spirits.
Little did they know that at the same time as they were attacking, two waves of guys pretending to be their "alliance" were secretly analyzing, tracking, and sniffing them. Some people were even reverse-plugged into tracking software and were not discovered in time.
It was not until the local police came to check the water meter that I realized that all my information had been exposed.
This offensive and defensive battle lasted all night, and the cannon fodder specially recruited by the R organization suffered heavy losses. Even if there were members of the R organization lurking in the second half to quietly provide support, they still couldn't stop coming with the reward. The hackers were gradually wiped out.
What's worse is that once they are kicked out, the hackers will either have all the Internet-connected devices around them exploded, or their private information will be directly posted to the "Abyss" homepage.
Even the management of "Abyss" has been taken over by unknown figures. This is the most powerful threat to hackers.None of the cleared hackers dared to change places and change equipment to continue to appear in this war without gunpowder. Each one seemed to have been really "killed".
It was also at this time that other people on the "Abyss" learned that the hackers had actually done a big job last night, and they all watched in silence.
When Xia Kingdom time reached [-] noon, the opponent's attack finally came to an end.
But everyone knows that this is just the beginning.
The real battle is about to begin.
Taking advantage of this short intermission, Pixiu took a sandwich and milk and ran upstairs to Chu Qingyu's office, pulled open the door frame, and asked, "Boss, is the boss still here?"
Chu Qingyu, who was rubbing her fingers and preparing to eat, glanced at him and shrugged irresponsibly: "I don't know, aren't you two together?"
brave troops:"???"
So the whole night last night, the big boss didn't pay attention to offense and defense?
Chu Qingyu: I’ll just pretend. I’ll be fine soon.
(End of this chapter)
You'll Also Like
-
From a son-in-law to a favorite of the empress
Chapter 1313 16 hours ago -
Choose three out of ten at the beginning, summon ten gods to dominate the other world
Chapter 533 16 hours ago -
Learn a magical skill every year, and start with Xiao Li Fei Dao
Chapter 209 16 hours ago -
Honghuang: People in Jiejiao become stronger by adding friends
Chapter 467 16 hours ago -
Marvel: Traveling through time with Warcraft skills
Chapter 118 16 hours ago -
After Entering the Book, She Became Rich in the 1980s
Chapter 441 1 days ago -
My singer girlfriend is super fierce
Chapter 1294 1 days ago -
After waking up from a thousand years of sleep, the 749 Bureau came to the door
Chapter 130 1 days ago -
Three Kingdoms: Plundering Entries, From Merchants to Emperors
Chapter 79 1 days ago -
Bad man, the system crashed.
Chapter 349 1 days ago