In addition to the audience, the people who pay attention to this competition naturally include the technicians and big guys of many network security companies, as well as Sanmei group and Yali company, which were named by Yu group before.

Although technically speaking, the progress of mobile phone enterprises is naturally a good thing, it is precisely because of the previous press conference that Yu Group belittled Sanmei group and Yali mobile phone, so that the two giants of smart products would rather have Xiaomi mobile phone taken by hackers every minute, and then be slapped in the face live, so that they can talk about Yuji with a straight face But compared with the people who paid close attention to the game, Lin Yu, the leader of Yu group, didn't care.

Obviously, Lin Yu has already known the result of the game, and he has no doubt about the ability of the system.

No matter how many people you have, it's no use.

But at the thought that more than 1000 people's computers would be scrapped in the capital stadium, Lin Yu could not help but mourn for the hackers.

When the network is finished, all the hackers who participate in the attack enter their camp one after another and start debugging. However, the technical personnel of Yu group, on the contrary, are sitting there chatting.

Whether it's the audience sitting in the field, or in front of the computer desk or TV at the moment, they all want to know what the final result of the game is.

Of course, they hope Yu group can give them a loud slap in the face, and then tell them loudly that the bully system is the strongest.

However, there are many worries about the technicians who have done computer research.

Because this competition does not specify what way to use to attack the bully system, therefore, whether it is distributed denial server attack or brush script, it is a very rogue and rogue attack!

One of the two attacks is to use hundreds of puppet machines to access the server, which makes the access of the server reach saturation to a certain extent, and finally makes the server progress slowly and reduce its defense.

Another kind of brush script is similar to this attack, that is, by constantly brush script, and then constantly let the server reach saturation, and finally to crash the server.

At the beginning, Yu group didn't make any agreement with the other party, so many computer experts were worried that Yu group was still too young and not as cunning as them.

But where do they know that the bully system has a function similar to the cloud disk, which is to transfer part of the access to the cloud disk when the access operation reaches saturation, so as to save the access space for the system!

When all the preparatory work is finished, the referee counts down:

"3, 2, 1! The game starts!"

with the referee's order, all the hackers start to be busy. Through the live TV screen, the audience can see the sound of hitting the computing level keyboard from all directions.

At the same time, along with the monitor, there is a super large clock, and the competition period is three hours.

At the moment when the referee called, the countdown started.

Next to the monitor, a reporter pointed to the message that appeared on the huge monitor at any time:

"now we see that 40 hackers have entered the first level protection circle and are breaking through the second level protection circle! "

" as we can see here, the first hacker to enter the first level defense circle is a hacker from No. 332. He spent 11 seconds to enter the first level defense circle, and his computer skills can be predicted! "

with that, after a round of camera scanning, the hacker named 332 was found in a corner of the venue.

A lot of people, especially on the live broadcast, have expressed their opinions.

"This time, brother Muyu is a little suspicious of death. NIMA, such gods have been dug out to fight with brother Muyu. I don't know if brother Muyu can counter attack this time! "

" this time, it's estimated that it's a little suspense. After all, it's not a two Hacker Expert. Some of them are directly organized to attack brother Muyu's bully system, and I don't know if they are targeting the one million dollar reward. "

" isn't it? These people all have good jobs in reality, and they can easily get paid even if they don't need to work every year. Moreover, I have a hunch that there must be people secretly sought by Sanmei group and Yali company! I'm really worried about Yu group. "

on the other side, the executives of Sanmei group and Yali mobile phone company who are watching the live broadcast are also smiling.

Here is a collection of the world's top computer talents. Even if you add the system manually, you can't stop their endless attacks, not to mention that you don't have to fight in the mode of manual operation.

Five minutes later, a lot of people began to sweat.

Today, they need to abandon their ideas and work together to fight, otherwise, the bully system may really rise once!

But what makes them a little uneasy is that the group that takes violent and hooligan style attacks has made a lot of puppet machines.But in front of the big screen, the mobile phone can operate the value is still around 98, there is no downward trend!

And the puppet machine they put in by dozens of groups almost broke through five digits. What's more, it's just a mobile phone operating system!

Do you want to be so rebellious

"Miyamoto, this system is not as simple as we think! "

" the puppet robots we put in are almost used, but it seems that they have no effect. We'll get some puppet machines later. Only when we postpone the system analysis on our side can they have a chance to succeed! "

for three hours, they feel they have enough time.

Moreover, many of their scripts and puppet machines were prepared in advance, and Yu group did not stop them.

But these hackers just think that Yu group and Xiaomi mobile phone don't understand it.

...

after hard work, in the 47th minute, the hacker master named 332 broke the second layer of protection circle again.

But judging from his expression, he was a little tired.

High intensity attack is a great challenge to his physical strength and energy.

Therefore, after cracking the second layer of protective ring, he chose to drink some water and closed his eyes for a rest.

Thomas closed his eyes and gasped.

He is the only one who successfully hacked the Amazon website when he was a minor!

And he just experienced fighting with the bully system, only deeply realized the strength of this system!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like