those years of rebirth

Chapter 451 The Second Sino-Western Hacking War

An operating system, millions of lines of program code, and all kinds of complicated tangled relationships will make ordinary people crash.To write this kind of system program, the whole system will be divided into many blocks with more functions and areas, which will be written by each working group, and then the block areas written by each working group will be integrated to form various logical relationships. Realize all kinds of connected functions, and finally become a whole program.

In the logic of reality, it is impossible for one person to complete the writing of an operating system.

Zhou Tiecheng smiled wryly, and at the same time felt deeply helpless. He knew that ninety-nine percent of this was accomplished by Wang Hengxiao, a talented young man alone. Such a once-in-a-million-year genius cannot be used to the best of his ability.

Is there anything more sad than this?

Thinking of the order from above, Wang Hengxiao, try to keep him silent and disappear, and just be an ordinary person!

Zhou Tiecheng waved to a group of experts in dismay, and said: "They have already left, they are not ours, so you can use these two supercomputers at ease. With such a fast speed, many of our projects will have results immediately."

The emergence of an extremely fast supercomputer can drive the progress of the entire scientific research.

Each supercomputer is jointly used by many scientific research institutions to allocate resources reasonably.Several world-renowned supercomputers in the United States are jointly controlled by several famous laboratories. If there are idle resources, they will be rented out at high prices.Others are controlled by the national government and handed over to some universities and research institutions.

The faster is the speed, which means that the results will be produced sooner, the research progress of the project will be accelerated, the degree of simulation will be increased, and the data results closest to the real one will be obtained.

Song Gong, Yuan Gong and others all had regrets on their faces.

"Hey, what a pity, I didn't meet these people, so I would like to ask you about these Chinese programming languages ​​in person. Lao Zhou, even if you can't meet people, you can help me get a set of Chinese programming languages, not the ones that are currently on the market. Ben, the language logic here is much more advanced..."

While Song Gong felt sorry, he also thought about the difficulty of starting the work below.

Basically, here are military experts and experts from scientific research institutions controlled by the state. They are used to carrying out orders.

However, these two supercomputers are in Chinese system, especially the latest one, which seems to be more thorough. Song Gong and others have not noticed the difference, and they don't know that this supercomputer is Wang Hengxiao who rewrote the basic system. If you know the instruction set, you will probably be even more shocked. This is the real Chinese system.

There will be some difficulties in connecting the Chinese system with the computer network outside. There is a converter written by Wang Hengxiao in the supercomputer, which can realize the function conversion of the two codes.

Zhou Tiecheng nodded and agreed, this is necessary, otherwise the two supercomputers cannot be fully used.

"Don't worry, I will bring it. You should design and plan the construction here first, it is still too spacious."

Zhou Tiecheng issued the first construction order.

Wang Hengxiao's original plan was to build a comprehensive laboratory, research room, and computer control center here, so there is a lot of space.

but!

A middle-aged man suddenly ran down from above in a hurry.

"Old Zhou, Lao Song, it's not good. Just now American hackers collectively attacked China's network and spread viruses. Chinese hackers have already fought with them..."

The middle-aged people hurriedly reported what just happened. They are computer experts and they are always monitoring the situation in the computer field, especially the domestic situation. They will take action if there is an abnormality. Last year, the Sino-US hacker war that shocked the world, they is one of the participants.

The large-scale and organized hacker attack that just broke out suddenly, the Chinese side was not prepared enough, and there was a sudden collapse. Many portals were hacked, and even spread viruses.

"These bastards, let's go."

Song Gong, Yuan Gong and others hurriedly went out to prepare for the attack!

"Old Song, aren't there two supercomputers here?"

someone said.

Lao Song and the others' eyes lit up immediately, but then their eyes dimmed, and they looked helpless, as if they saw a bunch of delicious food, but they couldn't move their mouths, which was very distressing.

"There's no way to do this, fight with those guys, use something we're not familiar with, no way!"

Even they have to admit that they have nothing to do with these two greedy big guys for the time being.

Reluctantly, Zhou Tiecheng picked up the phone and called Wang Hengxiao. He was one of the few people who knew Wang Hengxiao's phone number.

Unexpectedly, something will happen so soon.

Wang Hengxiao just came to the base, looked at the various machines that were still moving, sat in his sports car, and was slightly startled, wondering when he would be able to completely build the base in his heart. It would be very difficult to go to Africa. Convenience, building a base is not something that happens overnight, and I can't stay there for a long time.

In the case of Afghanistan, it is not an area under its absolute control, it can only be said that it has a lot of influence.

Beep beep...the phone is ringing!

Wang Hengxiao picked up the phone, saw that it was Zhou Tiecheng's number, smiled, and said, "Colonel Zhou, I'm still at the door, what's the matter?"

Zhou Tiecheng said eagerly: "The hacker war between China and the United States broke out just now. We want to use these two supercomputers, but we don't have the supporting programming language and programs. We would like to ask for your help!"

Wang Hengxiao was taken aback for a moment, then his face darkened, and he said in a low voice: "Have American hackers attacked?"

They still dare to come?

Zhou Tiecheng looked at the situation displayed on the supercomputer screen. Although many functions could not be used to give full play to the powerful performance of the supercomputer, the basic operation was no problem.

"That's right, many portal stations have been captured. This time they have assembled a lot of experts. Please come down and help."

Zhou Tiecheng used a requesting tone, which he rarely used to speak to people, especially when he was a teenager.

Wang Hengxiao frowned, jumped out of the car, and said, "I'll come!"

... At this time, China's Internet is in chaos.

The sudden attack by American hackers, coupled with the fact that many Japanese hackers also came to take advantage of the fire, made it impossible for Chinese hackers to parry.

I have to admit that in the field of cutting-edge computer experts, the computer experts in the United States are the highest, and the level is also the highest. This is the advantage of computer culture.

At the same time, master hackers from some countries who were previously damaged by China's hacker king also joined the ranks of the attack, adding insult to injury and finding some comfort for the last loss.

just!

Jenny was in Virginia, and the cia headquarters cracked the timekeeping program that Wang Hengxiao left on the cia headquarters host, based on the programming language logic and programming concept described in the Chinese IT language book.

Many top hackers in the United States have also cracked the ghost program one after another based on this, which suddenly boosted their confidence. It seems that the Chinese hacker king is not so mysterious and invincible, and so is the logic of his programming language.

Jenny rejected the invitations of several experts in the industry and did not participate in the attack on the Chinese Internet. She knew that because of the existence of that little guy, the Internet would become a restricted area for hackers from all countries.

…………………… Boom… The elevator came down.

Song Gong and the others were puzzled when they saw the boy Wang Hengxiao go and come back. It seemed that Zhou Tiecheng called him to ask him to come down and help. , so I didn't ask.

Zhou Tiecheng came forward in person and said, "I'm sorry to trouble you!"

In fact, when he knew that Wang Hengxiao built this underground base, built two supercomputers himself, and wrote a complete Chinese system, he had a vague guess.

Perhaps, this boy is the god-like hacker that the whole world is looking for. Everyone calls him the Hacker King.

Wang Hengxiao was in a bad mood, so he just nodded to Zhou Tiecheng. A group of experts over there ignored him at all, walked up to the boss chair and sat down in front of the second supercomputer.

This one is a real pure Chinese system, and Wang Hengxiao is the most comfortable to use.

Song Gong and the other two experts quietly stood behind Wang Hengxiao, watching intently.

"Old Zhou, is this?"

Song Gong still couldn't help asking Zhou Tiecheng, after all, the matter was of great importance.

Zhou Tiecheng said in a deep voice: "Don't ask if you shouldn't ask, and pretend you didn't see what you saw today."

Song Gong and the others felt a chill in their hearts, then nodded and remained silent.

However, the scene they saw still made them all open their mouths wide, and then they both closed their mouths, for fear of disturbing the people in front of them by exclaiming.

Wang Hengxiao used the Chinese keyboard skillfully. When Song Gong and others first used it, they had to ponder for a while, basically staring at the keys one by one.Wang Hengxiao quickly opened program interfaces, program compilers and so on with both hands without looking at them.

Lines of Chinese code quickly appeared on it, and then a few programs with simple functions were released.

It's like writing a simple page in Java language!

The powerful performance of the supercomputer is displayed.

One by one, the small programs were quickly distributed and joined the hacker war. The Chinese hackers who were unable to resist just now suddenly felt a powerful force coming from behind.

The powerful attack data flow was suddenly blocked.

In China, the United States, Japan, France, the United Kingdom, and several other countries, hundreds of master hackers jumped up from their chairs.

The person they were expecting appeared.

Hacker King!

(To be continued)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like