The Era of Magic Technology

Chapter 123: The fierce counterattack of intelligent programs

()

(Late, sorry, for support!)

In a small Israeli villa, there is also a white man busy with excitement. He is one of the top ten hackers in the world known as Black God.

He also accepted the 15 million dollar hacking mission at the hacker forum.

However, what is different from Jimmy is that when he first got the server address, he knew that the target of this time was the server of China's Donghai Maneng Software Company.

Because half a month ago, someone asked him to hack the server at a high price.

He didn't accept it at the time. To be cautious, he first tried it out and found that he couldn't break into the server at all, and then refused.

Therefore, he started to study the magic energy algorithm based on the data of this server. After half a month, he was finally confident, so he took on this new invasion task.

"Steth ..."

The black **** whispered a curse, because he entered the server one second behind Jimmy, and only got the second place bounty, only a one million dollar bonus. Although one million seems to be a lot, it is enough for him to have fun for a while, but compared to the five million dollars of the first place, it is still a lot worse.

Not to mention, he was only one second slow, and that one second was worth four million dollars!

He smashed the mouse depressedly and said in a deep voice: "Jimmy must have studied the magic algorithm for a long time, and the **** magic algorithm has improved the defense of all servers. It seems that Mr. Wang, the owner of magic software, No, this is my chance. I will download the materials first ... "

He hurried into the server, looking for information to start downloading, before he had time to look at the information carefully.

At this time, his phone rang.

He looked at the data download and connected the phone. He found that the call came from an old colleague of Microsoft Corporation in the United States. He used to be a senior engineer at Microsoft because of a software leak incident. He was fired.

"Old man, I guess you must have been tasked with hacking the Magic Energy software server. It seems that the bounty is more than 10 million US dollars, and you will certainly not refuse."

The old colleague of the Black God asked anxiously with a voice: "Is it not, man?"

The Black God had a bad feeling in his heart, and nodded, "Yes, brother, you know that I'm not working now, and to rely on these unseen tasks to make money. Unfortunately, I didn't get the first invasion. I didn't get that Five million dollars, old man, is there a problem? "

"Of course there is a problem, and I advise you to exit immediately."

A senior engineer colleague from Microsoft eagerly reminded: "This task is dangerous, that guy is a lunatic, he dares to do everything. This task was released by Microsoft in conjunction with Google, Oracle, and Apple. You know them Why not do it yourself? "

The black God frowned. "Because they all failed last time."

Last time, his own invasion operation failed, so he knew that none of the hacking attacks in those days were successful, and all of them were blocked by the efficient and rapid defense program of the magic software server. No one has successfully entered, and since then, the defense software of all high-tech companies and government agencies around the world have started to use the magic algorithm, which has been comprehensively upgraded.

Shen Sheng, a senior engineer at Microsoft, said: "Man, it's not just that simple, it wasn't just failure last time. As far as I know, all the high-tech company headquarters servers involved were attacked at the time, and a lot of company core information It was downloaded, Google closed the server link for this, and the official website crashed. But no one has traced who did it, just guessing that guy. "

"So, they dare not reveal themselves again this time, they can only post tasks on the hacker forum. Guys listen to me and leave immediately, that person is dangerous."

The Black God looked struggling when he heard the words of his old friend. There was a trembling in his hand holding the mouse, hesitant not to press on the button to stop downloading, and watching more and more data being downloaded. After downloading it in half a few minutes, it seems to be about to succeed.

When I sell the data, I will get 10 million US dollars. Then I hide it and live with peace of mind. I will not touch the computer for a long time. What can the other party do?

Black God has luck in his heart. He must admit that the person who invented the magic algorithm is very powerful, but that is only very powerful on the Internet. What can he do without the network?

With this in mind, he did not stop downloading the data, and said to his old friend with a hint of voice: "Brother, I know what to do, you can rest assured."

"I knew you always had this fluke, so it was only then that Microsoft found out and fired you, man ..."

Senior Microsoft engineers have to talk and persuade.

The download page in front of Black God suddenly stopped the data flow. He hurriedly checked the network connection and found it to be good. A vigilance rose in his heart, and his fingers trembled and finally clicked the button to stop downloading.

"Let's talk next time, man, I have an accident here. It would be great if you called me half an hour earlier."

Black God spoke to an old friend, hung up the phone, and started frantically operating the computer with both hands, and he regretted it already.

He knew that his old friend was right, the other party started to fight back, and it seemed that he had shot it himself.

Looking at the level of precision and stern counterattack, he must have shot the godfather-level program master who was known as the father of magic energy, which enabled the entire Internet to achieve an upgrade.

However, since he was a hacker for several years, he has prepared thousands of broilers to hide his identity.

Therefore, he was not panicked, immediately operated the computer and jumped out from the server of the magic energy software company, and fled to a prepared broiler computer in South America, but when he had not yet performed the operation to erase the log of the broiler, he I found that computer suddenly crashed and couldn't do anything ...

A black bead of sweat began to appear on the forehead of the black God. He knew he was in great trouble this time, but still murmured in disapproval: "Let me see how powerful you are ..."

He started to escape and jump constantly, trying to hide his identity, so that his real IP identity would not be tracked by the other party.

However, every jump he made will be tracked. And the computer he jumped every time immediately crashed, the processor and the hard disk chip of that computer were burned under an instant overclocking.

The black God's face became whiter, and he whispered, "This guy, are you just staring at me? This is so unfair. Jimmy was the first to invade. I was only the second. . "

What he didn't know was that at the same time, Jimmy deep in New York said the same thing.

In a New York apartment, Jimmy also sweated and began to run a computer to escape the Internet. He watched as one of his broilers was destroyed, his heart was bleeding, but he still had to run away, taking the other side to flee on the world-wide Internet, but the other side could still accurately trace his own every time data flow.

Let him have a sense of suffocation ~ www.readwn.com ~ Jimmy also scolded angrily: "Does this guy just stare at me alone? God, although I was the first to invade, but I downloaded The data is not finished, and it has not been sorted out yet. The black guy is the second ... "

In dozens of other places, the same thing is said.

All the hackers involved in the invasion of the magic energy software server were hit hardest and fastest to counterattack, forcing them to flee at full speed, they were stored, and a broiler located around the world was tracked and destroyed.

In less than a minute, hundreds of computers in different continents and countries around the world were burned with processors and motherboards.

Wang Xiao was standing in the central server lobby of the Magic Software at this moment. He didn't do anything, just uploaded the intelligent program he designed, and then looked at him coldly.

Everything is the automatic counterattack of intelligent programs.

In the Internet around the world, there was a shock of chicken flying dogs jumping. (To be continued.)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like