Reborn super student

Chapter 84: The Contest Between Hackers

After a long time, Huang Zhi finally read the outline written by Chen Yidao, "Brother Dao, I really doubt how your brain works. All the outlines have different ideas..." Huang Zhi turned his head, huh... ...It turns out that Chen Yidao left early.

"With such abilities at a young age, he must be an extraordinary person when he grows up." Huang Zhi said to himself.

Huang Zhi acted better than his heart, found a few excellent writers, and sent them the outline written by Chen Yidao.When those well-known writers saw Chen Yidao's outline, they were all amazed that it was a masterpiece, and they all asked Huang Zhi who wrote the outline, saying that they were going to meet this person.

Huang Zhi didn't dare to name Chen Yidao without Chen Yidao's permission. Although everyone in Qinglin City knew the name Chen Yidao, after Chen Yidao's business grew, Chen Yidao began to keep a low profile. In any press conferences and the like, only the title Chen Shao was used.

Of course, his own company should be concerned about it. In a blink of an eye, Chen Yidao arrived at the office building of Internet Pioneer. As soon as he entered, he saw that everyone inside was facing the computer, typing something desperately.

"Quickly check it out for me, we can't let them run away." Li Hui said angrily, suddenly a short and rapid alarm sounded from a computer today, and a group of people who don't know where came from desperately attacked Baihua with hacking techniques. game company.

Li Hui was not afraid that the hackers would come in, but that the hackers would run away.Because they have "Network Pioneer Firewall", this firewall has caught hundreds of hackers so far. "Network Pioneer Firewall" was originally written by Chen Yidao for Network Pioneer. The purpose of this firewall is to achieve three goals: automatic interception of external network data function; intrusion function; anti-tracking function.These three functions also have the principle of intelligence.Moreover, the "Internet Pioneer Firewall" designed by Chen Yidao will not intercept the abnormal data sent by him.This is very different from other firewalls.

In this era, Chen Yidao's firewall is considered to be the most advanced protection software. Many hackers attack Baihua Game Company every day, but none of them fail. information, and then send their information to court.

Chen Yidao patted the shoulder of a Network Pioneer staff member and said, "Let me do it."

Chen Yidao quickly made a ghost virus. This ghost virus is not aggressive at all, but he is a master of stalking. Anyone who encounters him cannot escape his stalking. He can also steal all the information of the other party.Chen Yidao also has a zombie virus. This zombie virus is aggressive. As long as you have a target, he can rampage and destroy the entire computer of the opponent.

Li Hui was a little ashamed when he saw Chen Yidao go up in person, because the protection software they made themselves had been breached by hackers, and now it was all supported by the protection software made by Chen Yidao. Li Hui still felt very guilty.He felt that he was useless. After learning hacking techniques for so long, the software he produced was broken by someone in an hour.

Chen Yidao was very calm, because even with these primitive hackers, they would not be able to break through the "Internet Pioneer Firewall" they had made before for a year: "Li Hui." Chen Yidao suddenly shouted.

"Yes, Brother Dao, is there something wrong?" Li Hui responded.

"Don't send the information of these hackers to the court in the future, because even if they are caught for a few years and come out again, we will have no benefit at all. I have made two virus software here, one is ghost virus, which is specially used to track It is used to steal other party’s information. There is also a zombie virus, which is used for attack. Once this virus is released, the other party’s computer will be paralyzed. Except for replacing all the parts in the computer, otherwise his computer will never be used.

Hackers are generally very rich, we use ghost virus to invade their computers and steal their information, and then hehe..., their money is ours, hehe....Money is better than anything else, and when we get it we kill their computers with a zombie virus.

Your current technology is not enough, so you can't always rely on me. I think you can do this. After you find the hacker, you will use the ghost virus to lock him, and then use your own technology to compete with him.Anyway, with my firewall as the backing, you don’t have to worry at all, just focus on fighting hackers, so that you can grow in the war...If you think you've had enough fun, you wipe out all the things they can hold, and then let the zombies bite them. "Chen Yidao smiled sinisterly. Chen Yidao felt that if the hackers were handed over to the government, it would be too cheap for them, so it would be better to do something to them!

"Hey... Brother Dao is Brother Dao, this move is bad enough, we will treat them as experimental products in the future." Li Hui smiled happily.Chen Yidao didn't blame him, he was very grateful, but it made him feel more guilty. He secretly made a promise in his heart that he would become a top hacker like Chen Yidao.

Chen Yidao and Weiwei smiled.Fingers on the keyboard: "You are just my tools."

Chen Yidao sent out the ghost virus first, and soon the information of the other party's gang was found.Chen Yidao started to detect the target IP according to the data source.America…….The first springboard; country t.The second springboard; md.The third springboard…. "I didn't expect there to be such a powerful hacker in this era." Apparently, the group that attacked Baihua Game Company was very clever, using many springboards to confuse the other party, so that the other party could not find their specific location.

In a basement in the United States, there are several bearded people, each of whom has a computer, and they are desperately inputting strange symbols into the computer.Suddenly their No. [-] firewall was breached, and the alarm sounded loudly. The old researcher who was taking notes in front of the computer frowned, with a serious expression on his face.

"Rice Drug" is a group composed of hacker elites from all over the world. Since its establishment, they have lost count of how many companies they have hacked.They are also very powerful, and no one has been able to successfully invade their servers until now.Their servers are all designed by themselves, and their technology can be said to be at the top of the world. It is not easy to break through their servers.What's more, the firewall they developed themselves has three layers! "Pandas" and "chicken catches"... It's really hard to hack into their main server without being noticed!

They wanted to break into the system of Hundred Blossoms Game Company today, and then wanted to steal the data of "Dragon Knight". They did not expect that Hundred Blossoms Game Company was so powerful that even top figures like them could not break through, and they even broke through a firewall. They couldn't accept it, but the sound of the siren told them that it was true.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like