those years of rebirth

Chapter 453 The Power of the Hacker King

The virus used by Wang Hengxiao is a virus written in pure Chinese language. After entering the computer system, it will directly enter the core of the CPU, and it will collide with the basic instructions set. In the end, the CPU contradicts itself and burns the electronic switch inside, thus burning the entire CPU of transistors.

The computer network of the whole world is defenseless to Wang Hengxiao.

At this time, the defense systems boasted by the world's major computer security companies are nothing but child's play full of loopholes in front of him. Even the defense systems specially built for those big companies are only missing a few holes.

After Japan suffered disaster, the United States followed closely.

The United States is the largest computer country in the world. At the end of the 21th century, it was the first to enter the era of civilian use of computers, laying the foundation for the information age of the [-]st century.

In the 21st century, almost all of the United States has realized electronic office work, and companies of all sizes use computers for office work. Therefore, Microsoft Office software can be sold well here.

Computer enthusiasts in the United States are also paying attention to this hacker war initiated by the United States.

At first, as they imagined, Chinese hackers were almost powerless in front of their Western masters, and China's IT industry was completely destroyed by many hackers.

They were excited to watch the overwhelming devastation.

Deep down in the hearts of Westerners, there is this very powerful desire for violence, hoping to control the fate of others and decide their life and death.

So there are endless murders in the West, especially the United States, a so-called highly free country.

The emergence of the hacker king is a turning point in this hacker war.

perhaps!

In the hearts of many people, they are very reluctant to see this person appear.

Kevin is like this at this time, tapping the keyboard profusely, and the light spots on the screen disappear one by one. Hundreds of broilers have all been lost, and the link has been disconnected. Kevin knows very well that the other party directly destroyed The hardware of these computers makes it impossible to restore and reboot for a short period of time.

suddenly!

With a chirping sound... a white smoke rose, and the top-level configuration customized machine sent by the old friend in front of Kevin stopped working. Kevin's face only became more gloomy, he knew that the other party used the broken hardware again The attack virus, last time it destroyed the motherboard, what is it this time?

Kevin quickly opened the main case, and saw that the cpu fan was pitch black and smoke was still rising from it, his complexion changed drastically.

This time it is to destroy the core of the computer - the cpu!

Computers in hundreds of medium-sized and large modern companies in the United States were damaged. Occasionally, a dozen large and medium-sized companies were spared from suffering because their technicians cut off the network connection decisively, and then shut down all computers.

However, world-class large IT companies such as Intel, Microsoft, IBM, Apple, Dell, HP, Yahoo, etc. cannot show fear at this time, actively surrender and cut off the link!

Their masters are connected into a position, and many of them frequently appear in the world's top IT publications and publish cutting-edge speeches in the IT industry. It can be said that they dominate the development of the entire IT industry in the world.

But now, they are full of seriousness, even a little tired, with a feeling of powerlessness.

10 minutes!

Yahoo's official website fell again, the bright red page stayed for a while, then disappeared, and the host crashed.

Then!

In less than half an hour, Microsoft's position fell.

An hour later, Intel's position fell, and then quickly cut off the network connection. At this time, they didn't care about so much, but the virus did not know when it was already in their computer. Even if the network connection was cut off, the virus was gone. It erupted for a long time, with unparalleled power, all the computers in the headquarters crashed at the same time, and the main computer also went black, and a burnt smell permeated the entire headquarters building!

When it was found that the cpu was burned!

The expressions of Intel experts are the strangest, because at this time Intel is the largest cpu supplier in the world, more than [-]% of the computers in the world use their processors, and their own computers are even more so it is.With so many processors burned at this point, who bears the primary responsibility?

The terrorist hackers who launched the attack, of course.

Then there are those cybersecurity companies, but then, the main responsibility is the processor manufacturers.

Of course, there are benefits as well as disadvantages.

If so many processors are burned, they must replace them with new ones, and their Intel orders will be much more.

"Hold a press conference..."

Intel's CEO was the first to issue the order.

Top IT companies such as Microsoft, Apple, Dell, etc. all held press conferences at the same time.

But at this time, half a day has passed.

The rapid spread of the virus has almost paralyzed this country, which is highly dependent on computers.

On the official website of the White House in the United States, there is a bright red homepage posted on the big page - ten times more money back, no one will run away! --king!

A bright red man with a king's logo underneath.

This incident alarmed the US national security department, cia, fbi and other related departments.

After the last incident, cia's internal hosts were not connected to the outside world, so this time it was spared from suffering, but this cannot be the case for the fbi. The fbi is mainly responsible for domestic affairs, so it is wrong not to grant internal links to relevant domestic departments. It is possible, so they suffered together.

"We must admit that we have been provoked. Some people have used their capabilities to cause unimaginable harm to our country and violate the interests of our United States. We must fight back... Preliminary statistics show that this hacker attack has caused unimaginable damage to the United States. The direct economic loss has reached hundreds of billions of dollars...the indirect economic loss is more than ten times..."

The newly elected president of the United States, Lao Ma, has been in office for less than half a year, and his expression is very angry. This black president of civilian origin is the embodiment of peace in the hearts of many Americans. They hope for peace, so they chose this president.

"China must hand over this hacker who has caused huge losses to the United States, otherwise we will do it ourselves and use all means to catch this terrorist. When necessary, we will not hesitate to launch a war..."

The old horse's expression was serious and serious, and the flashing lights below kept flickering.

A reporter raised his hand to ask, stood up and said: "Mr. President, how did this hacker war first happen? Why can't we defend our own computer network? We have the world's most advanced computer industry, computer security companies ..."

The old horse said in a deep voice: "How it happened is not important anymore. The important thing is that now we have suffered huge losses. Someone must come out to take responsibility and the attacker must be severely punished."

Answered this question succinctly.

A Chinese reporter raised his hand and asked: "Mr. President, please forgive me for speaking bluntly. As far as I know, American hackers launched the attack first in this hacker war. Then Chinese hackers will counterattack, and China's IT industry has also been hit. Huge losses, the hackers in the United States did not go around, they left a large number of attack viruses, and the losses caused may not be smaller than the losses of the United States.”

"Then our Chinese hackers will fight back. May I ask who will bear our Chinese losses? As the American hackers who took the initiative to launch attacks, should they first bear the responsibility and be arrested and brought to court?"

President Ma stared at the black-haired female reporter fiercely, and said in a deep voice: "We are still investigating the details of the hacker war. What we can confirm is that we suffered huge losses under the attack of Chinese hackers. Others It is still unclear. This is the second time that the United States has been attacked by Chinese hackers, and we must give the strongest sanctions, otherwise we will not be able to make up for our huge losses!"

The Chinese reporter smiled and did not refute, because the truth is known to everyone in the world who has channels, especially in the press, politics, and IT circles.

Although the United States is used to deceiving its ears and stealing its bells, it may not dare to make any big moves when there is a huge deterrence.Deterrence... For example, Hacker King!

……………… The hacker war lasted for a whole day.

The first half of the day was the time when the Chinese IT industry was under attack, and the second half of the day was the time when Chinese hackers launched a counterattack under the leadership of Hacker King.

The fighting continued into the night.

Because, not only Americans are involved in the hacker battle, but also many countries, such as Britain, France, Germany, Russia, and small countries around China.

Wang Hengxiao's style of acting is to destroy all enemies.

As I said when I first played, pay back ten times.

This point has been achieved, and it will be repaid ten times. I think those people have already tasted it.

This time, Wang Hengxiao's strength is stronger than last time's because of the use of this supercomputer, Wang Hengxiao is already handy.

The dozen or so computer experts in the back were stunned and didn't leave all day. Even if their stomachs were growling, they were reluctant to leave, for fear of missing a little detail.

Hacker King!

They didn't expect this legendary figure to appear in front of their eyes, and it would be a young man. They witnessed all the operations of this hacker king, which can be called miraculous.

Several experts burst into tears with excitement.

It seems to have seen the hope of China's computer development, and the technological level of the whole of China has taken off.

Pa... Wang Hengxiao ended the attack in the UK, and the more than 20 attack data streams on the screen were cut off at the same time.

At the same time, Wang Hengxiao carried out more than [-] operations and attacked more than [-] countries. Each data flow mobilized the resources of the largest supercomputer. This is the logical advantage of the multi-point calculation of the Chinese IT language.

Huh... Letting out a long breath, Wang Hengxiao said flatly: "China will become a forbidden place for hackers in the world. No one can come here to do anything reckless, otherwise, they will pay more than ten times the price."

This is a declaration engraved on the official websites of governments around the world.

(To be continued)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like