Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 326: Comparing myself with myself (Part 2)

Previous page        Return to Catalog        Next page

    Chapter 326: Comparing myself with myself (Part 2)

    Chapter 326: Comparing myself with myself (Part 2)

    "Boss, the phone is on the top." A captain came over and said quickly behind Black Hawk.  Black Hawk nodded helplessly and then stood up and walked towards the telephone in the distance.

    "Director." Black Hawk answered the phone and said quickly.

    "Black Hawk, can you tell me what's going on? Who is this L?" the voice on the phone asked directly.

    "Team leader, aren't you making things difficult for me? If I could have known, I would have gone out by now. It's not like you don't know how to use computers. Do you think we can find each other?" Black Eagle gave a bitter smile and was helpless.  said.

    "Hey, Xiaohei, don't take it too seriously. Aren't I forced to come here and ask? Let me ask you, someone above asked me, and I didn't want to either." The director on the other end of the phone chuckled.  Two voices said, and the age of the voice was probably about the same as Black Eagle.

    This title makes Black Eagle even more depressed, Xiao Hei?  Why does it sound like a dog?  No, the purebred black back in the 8th round is called Xiaohei.  "I'm asking you, just answer how you want. Whatever you call me, I have nothing to do now. If you can find a way to find gscsd, I will find l." Black Eagle immediately retorted depressingly.  .

    "Ah, the weather is nice today. I went out to see the moon. You can take charge of things here. Anyway, if you have a chance, contact that L. As for the United States, there are people from the Ministry of Foreign Affairs who are wrangling.  You don¡¯t have to worry, because American hackers have also invaded our website this time, so don¡¯t worry.¡± The director quickly said a word and then walked away.

    Damn, this bitch.  Black Eagle rolled his eyes, today is the first day of the new year, you go to Mao to look at the moon.  Black Eagle put down the phone depressedly. When he saw everyone around him looking at him strangely, Black Eagle immediately glared: "Look at everything and hurry up to work. Don't you yourselves feel ashamed? Your work is so capable.  Ask someone to help." Black Eagle was tall and thick, and his glare was quite scary.

    It's just that almost all the people working in this hall are very familiar with Black Hawk. Everyone looked at Black Hawk with a smile and didn't take it seriously. Some of the old subordinates even whistled and said: "Boss, you are like this."  Don't get angry at us. Besides, this matter is too outrageous. What's wrong with l or gscsd helping? At least they haven't done anything harmful to the country now. Just let gscsd be blacklisted.  I'm already very sorry. Speaking of which, gscsd has helped us a lot."

    "Yes, yes. Boss, I say you should tell the boss that the gang has withdrawn. Firstly, they have helped us. Secondly, they have not done anything harmful to the country. Thirdly, what do you think?  What's the point of being on the black list? We can't find anyone. Japan is more powerful than us. The wanted order for 100 million US dollars is still there, but gscsd is still alive and kicking. People should still eat.  You should drink, and this time I went directly to play with those birdmen from CIA." Another person also stopped what he was doing and said.

    In fact, they don't have much work now. The only thing they can do is monitor the websites of various domestic government departments. However, at the moment, more than 20 government department websites are occupied by l, and American hackers are basically attacking these 20 government departments.  There are many government websites. It is estimated that these hackers can't lose their dignity and continue to attack other websites, and they are just wasting their time.

    On the contrary, Chinese hackers in the United States have a great record. The technical staff of the three official websites of CIA, FBI, and NSA should be dedicated to unified management. The efficiency of defense has improved a lot, but the attack efficiency of gscsd has also improved a lot. Both sides still have  In a stalemate, the counter-tracking of a wave of masters organized by CIA and others just now has no effect. Although several broilers of gscsd were scrapped, but these masters' broilers are caught in large quantities, so it is not an option to continue like this.

    "Are you sure this L is not the same L who is in the same chat room with us?" Lan Mo asked.

    "I'm not sure, but it's probably unlikely. This level of strength is a bit too awesome. It takes a lot of operations to defend more than 20 websites. But God should know this. God told me,  This l is a rookie he met on the anubis website, and this rookie has grown to this point in just a few months." Guzhu Canmeng said with some uncertainty.

    "God, you said it." Lan Mo immediately changed the target.

    "I think it's very likely that it's L." God hesitated for a moment, then said seriously.  "Why?" Shenyuesha and others also got along with L briefly, but they didn't see what was so awesome about him?

    "The speed of his progress, I remember when I first startedWhen I met him, although he asked me very novice questions, he could directly get to the point. He asked some classic questions, and his growth rate surprised me. In just over a month,  The questions he asked made me think about them for a long time.  And this time he hasn¡¯t come up for nearly two months. The only time he appears is this time. More importantly, we know a lot of people. But among the masters, who among you can know the master whose vest is L?  God thought about it seriously and said.

    "That's true, but don't others need to change their vests? After all, we sometimes change our vests." Shenyue Sha still couldn't believe it, after all, this was too surprising.  Based on l's current performance, at least in terms of defense, he is obviously better than them all.

    ????????????????????? At least they, whether it is God, Lan Mo, Guzhu Canmeng, or the Roasted Whole Sheep brothers, cannot possibly defend more than 20 websites at the same time and be attacked by dozens or even hundreds of hacker masters without falling behind.  And it's still impregnable, with no flaws at all. Isn't this a bit too scary?  Even if the other party has some awesome firewall, the firewall still needs people's attention.

    Switching back and forth between more than 20 computers, just switching screens is enough for you, not to mention making various judgments.

    "It's unlikely. Regardless of whether a master changes his vest or not, his style can be seen from his invasion or defensive methods. We have never seen this L's style before. Of course, we cannot rule out which master is not  What awesome software has been developed? After all, the world is so big and there are still many hidden hacker masters. Isn't anubis an example?" Lan Mo shook his head slightly this time and said.

    "Forget it, let's not analyze this. It's useless. Can't we just ask him directly when we see him again? I don't think we should continue. It seems that everyone is paying attention to gscsd at the moment, and these governments  Many websites have simply been shut down for upgrading and maintenance, and we have no target to start with." Roasted Whole Sheep interrupted a few people and said quickly.

    "Then let's go watch the fun. Gogogo!" Lan Mo responded immediately, yelled a few times quickly, and stopped the attack in his hand.

    At this moment, as Roasted Whole Sheep said, the domestic situation in China is like Juventus encountering Manchester United who adopts a shrinking defense. Anyway, everyone is messing around, and the scene is not exciting at all.  But the situation in the United States is different.  At this moment, the hackers who are influencing the domestic situation in the United States are no longer just Chinese hackers. Almost all hackers from Israel, Russia, Europe and other countries have come to join in the fun.

    Once upon a time, CIA, FBI and other organizations were the places where these hackers would take a detour?  There was a time when these intelligence organizations were the only ones bullying hackers from various countries?  In particular, the FBI, CIA, and NSA have used the power of the US government to extradite hackers from many other countries around the world to the United States for trial.

    But when did hackers dare to challenge these intelligence agencies openly, and the first challenge was to attack four at the same time!  Although Kevin Mitnick once did the same thing, when Kevin Mitnick invaded, he also invaded secretly, unlike gscsd, which is open and aboveboard and just comes with you!  More importantly, although Kevin Mitnick once hacked into the FBI, he was also caught by the FBI.  However, there are currently a lot of wanted notices on gscsd, but I have not seen any information about which country has gscsd.

    The American hackers who came to China seemed to be a little discouraged, and the intensity of various attacks also dropped. Naturally, Zhang Yang was fine.  He immediately switched to the infected bug interface. Zhang Yang actually took the time to pay attention to the infected bug just now, but the infected bug always attacked in a very violent way, and was still dealing with the counterattack of some technical staff such as CIA. Zhang Yang could not see it.  Nothing came out, so he didn¡¯t pay attention to it later.

    At this time, there was basically nothing going on in China. Zhang Yang immediately switched to the core page of the infected bug, where he could see every operation performed by the infected bug.  As soon as he switched over, Zhang Yang immediately discovered that 80% of the infected system resources were frantically calculating and analyzing a program.

    The remaining 20% ??of resources are still used to attack the three major official website firewalls.  Zhang Yang was a little curious. A program worthy of the infected bug spending so much resources to calculate was naturally a very important thing. Zhang Yang immediately switched to the calculation page. He wanted to see what kind of thing would consume two satellites.  , plus the centralized resources of more than a dozen server-level broilers for computing.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report