Urban Master of All Powers

Chapter Thirteen: The Heaven-Defying Showdown with the Fifth Generation Computer

Back in the dormitory, Fang Mengze still had a lot to say.

"You guys are talking about how xo did it, "I'm tired and need to rest"... It's really cool to say, this is a master. Our hacker war seems to be playing in his eyes."

The third child, Zhang Deng, felt sorry for him.

What Fang Mengze said was right. Chen Ling, who could manipulate data, was really a so-called hacker.

"Tonight is really cool. The great xo gave me motivation. Tomorrow, I will decide to confess my love to her!!" Fang Mengze was full of loyalty. God knows how many times he confesses his love every day.

After a year of acquaintance, Chen Ling knew that what Fang Mengze said most was to end being single. This is naturally a normal physiological phenomenon in college, but Fang Mengze made the brothers in the dormitory very strange. Fang Mengze is a little handsome, and his family seems to be quite rich. During his confession career, there are many younger sisters who like him. The strange thing is that this guy always repeats his confession. Chen Ling said that the second child, you kid, is simply taking the confession as fun.

"The heavens and the earth are a mirror, my heart is more precious than pearls."

"That's also a black pearl." Chen Ling's words made the brothers laugh, and you are quite humorous, youngest.

Fang Mengze raised his middle finger: "The youngest is in the limelight tonight. When the school weekly newspaper is published next week, the youngest will definitely become a celebrity at Huada. Just wait for your MM to fill your desk with love letters."

The bedroom laughed again.

...

After getting up and washing up as usual, the princess made a glass of milk, and walked to the desk with her bare feet.

She opened the notebook, touching the computer this time gave her a strange feeling in her heart. In her dream last night, the princess kept thinking about xo. To be honest, she was very confused by the hacking method xo used last night. The ability to clear attack data in an instant, restore network operation, and control full computer authority is definitely beyond the reach of a human being, even a large organization cannot imagine it.

But there are various indications that xo is indeed alone!

What kind of person can do this?

Wang Hao entered the computer with this question.

A message popped up.

"xo has started to attack the central mastermind of the fifth-generation computer of the United States!!"

If the other hackers had heard the news, the milk would have spilled from shaking hands. The fifth-generation computer is the terminator of hackers, a powerful computer that is called the tombstone of hackers.

But the princess didn't, except for a fleeting moment of stagnation, she took a sip of milk as if nothing had happened, as if she had expected it a long time ago.

"The background of the central mastermind of the fifth-generation computer in the United States is not that simple, xo, that is not an ordinary computer." Princess Yaya thought to herself while drinking milk.

...

On March 23, 1983, US President Ronald Reagan delivered a famous speech;

The specific core content of the speech is: use various means to attack the enemy's outer space intercontinental strategic missiles and spacecraft, so as to prevent hostile countries from launching nuclear strikes on the United States and its allies. Its technical means include deploying high-energy directional weapons or conventional strike weapons in outer space and on the ground, and conducting multi-level interception at each stage of the enemy's strategic missile attack.

During the Cold War, the nuclear power of the Soviet Union was far superior to that of the United States. The United States was afraid that the nuclear balance would be broken, so the United States had a budget of more than 1 trillion US dollars to design and build 4 lines of defense, which could ensure a 99% destruction rate of incoming nuclear bombs.

At the same time, when a nuclear war occurs, use anti-satellite weapons to destroy the enemy's military satellites, attacking and weakening the enemy's surveillance, early warning, communication, and navigation capabilities.

That's right, this is the world-famous scam that made the Soviet Union suffer a lot - "Star Wars Project"

The CIA's revelations in the future really made people think that this was just a propaganda method used to bring down the Soviet Union. What they don't know is that with the global expansion of nuclear deterrence, the strategic defense plan of nuclear bundling has always been in the US budget.

The United States is trying to build a "strategic defense system" to defend against more than 90 percent of nuclear attacks on the homeland, but to operate such a defense system requires an unprecedented ultimate computer to run.

This computer must have three characteristics.

First: information transmission faster than the speed of light!

Second: The thinking logic of the machine's self-judgment!

Third: It can prevent any hacker's invasion!

This is the background of the birth of the fifth generation computer Turing!

American scientists once made a bold statement in the development of the fifth-generation computer: the Turing they will design will be a super-powerful hacker terminator, a terminal trend of future computers. This kind of computer will have powerful data self-computing and anti-intrusion capabilities. All the hackers in the world may not be able to attack the server if concentrated. At that time, the United States will become the safest place for data in the world!

This is indeed the case. When the United States announced a major breakthrough in the development of the fifth-generation computer, it once opened the server to invite any hackers to welcome the invasion.

But in fact, except for the top few hackers who were able to fight the firewall for more than ten minutes, the other hackers were undoubtedly killed in a second.

Here comes the tombstone of the fifth generation of computer hackers!

So when he learned that there were a large number of ddos ​​floods attacking the fifth-generation computer network, Turing's main designer, Dr. Freeman, only dropped a few words-even God will be surrendered by Turing!

...

Chen Ling looked at the screen carefully, watching that the data of the global network he manipulated was filtered one by one by the terrifying firewall.

Terrible computing power, the data of the huge information flow is eliminated in less than a second, and at the same time the firewall starts to screen the information that may expose the attacker in the data and then conducts anti-intrusion.

Chen Ling wasn't worried at all. Using the data manipulation order, he had already issued an intrusion order to the networks all over the world. That is to say, netizens who are surfing the Internet now are unaware that their computers have been treated as broilers, and they only feel that the Internet speed is very slow today.

In fact, Chen Ling can ignore this matrix firewall, but from the AI, he has learned that the fifth-generation computer is perfect, almost terrifying.

The so-called machine logic will slowly evolve with the increase of data, which means that the United States is doing a stupid thing that only happens in a movie called "Terminator".

Of course, this kind of stupidity is probably hundreds of years away from happening.

At present, Chen Ling has already figured it out, that is, to use ordinary hackers' intrusion methods to completely capture this mastermind, and then infect the logic virus embedded in the computer program data, which may stop the evolution of the computer. .

God knows if this super-era technology was developed by the United States because of the Zenith Star technology. Anyway, Uncle Sam must not be allowed to become bigger, otherwise the world's police will probably become the world's urban management.

The matrix firewall is also difficult to resist the general attack of the data flow of the global network. After successfully entering Turing's core server, Chen Ling cheered up. The real challenge is coming.

Countless information seemed to be crowding in from all directions at the same time, making Chen Ling dazzled and dizzy.

Chen Ling could use superpowers to clear these data, but he didn't do so. After watching their hacker attack and defense battle last night, Chen Ling also had a little interest in such a pure intrusion at first.

Chen Ling didn't immediately order the establishment of the administrator program this time. He already knew that there was no administrator command for Turing's internal data.

What Chen Ling can do now is to continue to launch the flood attack of the data flow. Turing's super-light-speed communication filter is called a fast one. Megabytes of information will be cleared in less than a second. If it is an ordinary hacker, it will be killed alive. Play to death.

Chen Ling is not worried, anyway, he has already issued a super massive attack on the global network against AI, unless the global network is shut down, it will depend on who will die, the only thing that worries Chen Ling is that the United States will cause vigilance and force physical disconnection of the AI. It really fell short.

Chen Ling asked the computer to start scanning the AI ​​for vulnerabilities, and at the same time he had to carefully hide his identity from being discovered by the AI, otherwise he would be kicked out in the next second.

A great hacker once said: No matter how powerful the program is, it is written by humans, and machines will never be able to defeat human intelligence.

After all, the fifth-generation computer is only a preliminary development, and it is far from reaching the level of invulnerability.

Chen Ling began to intercept the information code inside the ai, with the purpose of controlling the laws of the data, which was like peeling off the last coat of ai.

Finally, in the continuous analysis, the last coat of AI was stripped off.

Chen Ling sneered and gave the last order.

"All the data that enters the AI ​​is converted into intelligent data, and all these data are integrated... Then a new program instruction is issued: I want to establish the highest authority!!"

AI's intelligent counterattack is actually the characteristic code for this data, and if there is any discrepancy, it will be regarded as an abnormal expulsion. However, with Chen Ling's complete understanding of AI, the offensive information has become in a state where AI cannot be recognized, so there is only one end. The fifth generation computer finally dies down and the more powerful data flow controlled by Chen Ling anti-assimilates AI, thus achieving The point of truly controlling your smart computer!

...

All network security experts, computer programming masters, and top hackers in the world are paying close attention to this battle against the fifth-generation computer.

When the matrix firewall was breached, the entire network was in an uproar.

Dr. Freeman's face was also frozen, but his confidence in the fifth-generation computer kept him from shutting down the core network of the computer. He didn't believe that a single person could invade the inside of the main brain.

Even 10,000 top hackers can't do it.

Things greatly exceeded his expectations. When the final control of the computer was taken away, Dr. Freeman screamed heartbreakingly: "Physically block all frequencies immediately, the network!!!!"

Already frightened scientists immediately pressed the final emergency button.

Because the fifth-generation computer is different from the past, there is also a certain period of time for physical shading to transition.

"Turing starts to completely shut down the program, the countdown starts in ten seconds, 10, 9..."

Freeman watched the intelligent machine Turing being played by a hacker, his face was full of despair and disbelief.

There are actually people in the whole world who can do it! !

.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like