those years of rebirth

Chapter 452 The King of Hackers Appears

Last year, Hacker King became a legend in the hacker world.

Almost by itself, it resisted the hacker attacks of the entire West, and the counterattack was extremely sharp, causing a lot of losses to the countries that participated in the attacks all over the world.

The world's direct losses have exceeded tens of billions of dollars. The important thing is that no one has been able to crack the virus that can damage hardware. It is different from the time reporting program left in the cia headquarters. The two are not on the same level.

This time, when attacking the Chinese network, hackers with ulterior motives immediately spread a highly aggressive virus to retaliate for the loss suffered by the virus last time.

A large number of company computers have been attacked by a virus, which is a virus that attacks the hard disk and destroys files. Many companies have suffered losses, and many company files and information have been destroyed.

"These guys are so vicious, they directly destroyed all the information on our company's hard drive."

"This is a big loss..."

"The information survey I just did is stored in the hard disk, and now it's all gone..."

With the advent of the information age, office tends to be automated, and computer office has become a trend and a symbol of high technology, and the dependence on this tool is becoming more and more heavy.

Once the computer is attacked and suffers huge losses, it will be a huge blow to the entire company.

In just over half an hour, the ferocious attack directly paralyzed the servers of several major Internet companies in China, and even computer security companies were unable to parry it.

The emergence of Hacker King has given Chinese IT experts hope.

The hackers in the West are excited. They have entangled so many masters this time in order to break the myth and make the king of hackers hate them and be helpless against them.

There is no shortage of masters in the West. According to the Chinese IT language book, they have also studied the composition and mechanism of the Chinese language system. They think they understand this virtual programming language, so they are so confident.

but!

It's time for the hacker king to appear.

Only then did the master hackers in the West realize that the information they knew could not provide them with any help, and the hacker king's attacks were still very sharp.

"Since all of you are tearing yourselves apart, then I'm not being polite anymore. I will repay you tenfold for what you have given us!"

This line of words appeared on the battlefield in the form of program code.

The battlefield is the Chinese portal, which is the last position where almost all the master hackers from China and the West have gathered, and staged battles here.

As soon as Wang Hengxiao appeared, he directly obtained the highest authority here, and then directly replaced the station's server to his own supercomputer, and a powerful defense system appeared.

Hundreds of powerful data attack streams attacked the defense system without success.

Because they have no way of understanding this defense system, everything is unknown, like a wall in the dark, they can only hit like headless chickens, hoping to knock down this wall that they can hardly see.

This is a pure Chinese system with a pure Chinese core instruction set.

It is very different from the Chinese language logic and structure mentioned in the published Chinese it language book.For Western masters, this is the unknown. They don't know how to break through it, or even what it is.

"Shit, what is this? Everything is garbled? Can't find anything?"

"We can't break through his defenses..."

"This defense system is stronger than last time, and there is no trace at all. It seems to be a pure Chinese system...We don't know anything about it..."

The unknown is powerful.

Under the attack of hundreds of top hackers, it lasted for half an hour, and there was still no sign of loosening.

This kind of god-level defense system has shocked the top people in the IT industry who have seen it all over the world.

Even, in desperation, hackers used some extremely aggressive viruses that they usually dare not use, but they still couldn't find the loopholes in it.

Wang Hengxiao sat on the boss's chair and watched it quietly for half an hour, watching the flashing data streams on the screen and the feedback information one after another, all of which he remembered in his heart.

The reason why I built two supercomputers in this heavenly apartment that will soon not belong to me, and spent my painstaking efforts and money to build a purely Chinese system supercomputer, is to accumulate experience, implement my own ideas for several years, and find out which If there are deficiencies and improvements, it will be more perfect when building bases in Africa or Afghanistan in the future.

At this time, hundreds of top hackers in the world will be attracted to test the performance of this pure Chinese system supercomputer again, and the defense ability is undeniable!

Facing the unknown, even a master is helpless.

The pure Chinese system and the structure tends to be perfect, so they don't know how to start, because they don't understand, don't know.

However, Wang Hengxiao still saw the strength of the opponent from the half-hour attack, and also saw some loopholes in his own program, so write it down and improve it next time.

In half an hour, the other party had used all the means, and some people were already trying the same means repeatedly. Wang Hengxiao kept all the data in this half hour in his heart, and he could improve it when he continued to write the system in the future. He said plainly : "That's all your means."

indeed!

Kevin, who was in a small room in California at this moment, felt that he was at the end of his rope. This inexplicable system was so strange that it was even unpredictable. He scratched his hair and said in a deep voice, "Damn it, this might be another Eastern language programs, did they write a whole Chinese system?"

"This is impossible!"

Kevin couldn't believe it. His hands were beating rapidly, the keyboard was making an overwhelming sound, and the data flow on the screen was reaching its limit. He launched his final attack!

However, it is still invalid.

Even Kevin felt the opponent's active attack, and the opponent had been passively defending just now.

A series of data streams tracked the attacker just now, and spread it to the whole world through the network.

Thinking of the method of the Hacker King last time, Kevin decisively broke away from the battle through the broilers one after another, and at the same time called other companions to quickly leave the battle.

Obviously, they all underestimated the fighting power of this hacker king, or it can be said that their self-confidence swelled to the point where they forgot about the horror of that hacker king.

At this time, many people reacted, and the opponent began to fight back.

Fight back, they are not afraid!

They are confident that they can defend their position now. Anyway, they have already destroyed China's IT industry in a mess, took advantage of it, turned around and defended their own territory, then they won a complete victory.

But their defense was obviously pale under the attack of the hacker king.

A series of data streams were attacked, and where they passed, a computer emitted a black smoke, burned the cpu and crashed.

Just like last time, many ordinary office workers who work in the office don't even know what happened. They just turn on and off, and they don't know anything about the hacker world. under attack.

Japan!

At the headquarters of Fujitsu Electronics Computer Company, a group of technicians were sweating profusely typing on the keyboard.

"quick……"

Song Linjian shouted with a distorted face: "We must hold on, we must not lose our host..."

Fujitsu is one of the top IT companies in the world. After a joint venture with Siemens, it has become the largest IT supplier in Europe. Its business covers all businesses in the IT industry. The supercomputers it designs rank among the top ten in the world.

This time, Fujitsu's internal computer experts directly participated in the hacker war to attack China's newly developed IT industry. These Japanese computer experts were also the first to spread the virus, which caused great harm to China's computer industry.

However, the super hacker known as the hacker king appeared.

They no longer have the ease of participating in the attack, nor the gloating of spreading the virus, but all they have is fear at this time.

Chi... Chi......... A few muffled sounds, a row of more than a dozen computers that were being used suddenly emitted a burst of white smoke, and then the screen went black and lost its function.

Everyone present was stunned for a moment, and then their expressions changed dramatically.

As the leader and the person in charge, Matsubayashi Jianyi said loudly: "Hurry up, cut off the contact with the outside world, announce our mainframe maintenance, and then cut off the power..."

"Matsubayashi-kun, it's too late..."

Deputy Xiao Cang said with dull eyes, looking at the big screen of the host over there, it was already pitch black, and there was a burnt smell coming out.

The mainframe is the fastest supercomputer in Japan. It was designed and assembled only last week. The world’s first supercomputer has not yet been announced. It is a secret weapon that is preparing to enter the ranks of the world’s fastest computers. It has been undergoing final debugging this week. However, at this time, it was dead silent!

this moment!

Fujitsu headquarters fell into dead silence.

Panasonic...Sony...Mitsubishi...all the computers and host servers in famous Japanese companies have been taken care of.

Even the mainframes in several famous research institutes in Japan were looted.

The whole of Japan fell into panic.

At this moment, the power of hackers is clearly displayed in front of the world. Compared with the damage they caused in China before, the losses they have suffered are obviously magnified by more than ten times.

Last year, during the first Sino-US hacker war, the panic caused by the hacker king made people realize the terrorist and destructive power of hackers, and computer security companies all over the world have developed rapidly.

This time, in order to show the destructive power of Western hackers, they wantonly spread viruses on the Chinese network, destroying the hard disk data of every computer connected to the network.

What Wang Hengxiao did was even better than them.

(To be continued)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like