Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> Infinite terror of killing gods

Volume 2 Chapter 2 I am Chu Xuan...

Previous page        Return to Catalog        Next page

    Chapter 2 I am Chu Xuan Walking quickly to the computer, a simple ring on Luo Zheng's finger suddenly flashed, and something like a U disk appeared in his hand.  This ring was exchanged by Luo Zheng for a space treasure. It is a higher-level "spiritual treasure ring" than Zheng Zha's Na Ring. Among all the items that Luo Zheng exchanged, it was the most valuable, costing a total of 2,500  The reward points and two D-level side plots are almost twice as expensive as Zheng Zha¡¯s Najie.  But here at Lord God, you get what you pay for. Although the value of this Lingbao ring is expensive, it is worth 2,500 reward points and a D-level side plot. Not only does this ring have three cubic meters of storage space, it is the same as the Na ring.  It can attack those spiritual substances, and also has a special mind-purifying function, which can help the wearer eliminate distracting thoughts and maintain a state of pure mind and few desires. It has a good auxiliary effect on practicing meditation. This is really a treasure for Luo Zheng.  , so he redeemed this spiritual treasure ring without hesitation.  A cold feeling flowed from this ancient ring. Luo Zheng felt calm inside. He installed the hacker system into the hotel's computer. Suddenly, the computer screen went black, and then a series of data appeared, flickering and beating.  , and soon the computer made a sound.  "The super hacker system has been successfully launched and is now beginning to invade all network systems around the world. Please select the information you want to query" Luo Zheng brought a headset-like thing. This is actually a technological product among the Lord Gods, which can transform the content of his imagination.  As information, he passed it directly to other people's minds or to computers. He was deep in thought and reminiscing. In his mind, he recalled every bit of information about his sister. Soon, a little girl appeared on the computer screen. She looked at  She looked about twelve or thirteen years old, and she looked so cute, just like a little fairy in mythology.  On the screen, I saw her wearing a white dress and red leather shoes, jumping up and down, full of liveliness and cuteness, especially her pair of big watery eyes, which flashed one after another like two dark gems.  Suddenly, looking at Luo Zheng, she raised her two little arms like lotus roots, and opened her little mouth, as if she was calling "brother" sweetly. Looking at this extremely cute little girl, Luo Zheng's eyes actually showed a trace of  Moist, a trace of remembrance.  This little girl who looks like a little fairy is Luo Zheng¡¯s sister, Su Ying, who has been separated for ten years.  "After entering the information, would you like to start looking for all the clues about 'Su Ying'?" An option popped up on the computer, and Luo Zheng clicked "Yes" without hesitation. Suddenly, the hacker system buzzed and started  After a quick calculation, the screen flashed, and a green earth covered with networks appeared. Then in the blink of an eye, endless red began to spread from a city in Italy, like the most powerful virus, in just a few minutes.  In a short time, 99.99% of the world's networks were captured, but nothing was heard. So the hacker system shrank, and all the red colors turned into dozens of dots, as if they were breaking through the surface with all their strength.  Target that one ten thousandth of the network and start attacking with all your strength At this moment.  The United States of America, the Pentagon.  "Sir, something bad has happened. Our supercomputer has been attacked by unknown hackers. One hundred and eight firewalls and countless protective networks were all penetrated in just an instant. Oh, damn, it is cracking our password layer.  Oh my God, how could this be possible, how could it happen so quickly" The Secretary of Defense of the United States was dumbfounded as he watched the supercomputer they were proud of being compromised in just thirty seconds. For a moment, he just thought it was a fantasy.  My mind went blank.  "Impossible, impossible, I must be dreaming. Our supercomputer has an average technology that exceeds that of the entire world for nearly fifteen years. How could it be captured so easily?" After a moment of surprise, the Minister of Defense immediately began to fight.  He called all the top hackers and wanted to counterattack. However, at this critical moment, he suddenly received a call from an important person and heard the person say coldly.  "There is no need to find a master hacker. This hacker's hacking technology has almost surpassed contemporary technology for at least twenty years. I will give you enough rights to mobilize all the manpower and material resources you can mobilize. Be sure to attack it as soon as possible."  This hacker discovered that only we, the USA, are qualified to possess such technology" Not only the United States, but also many of the world's top technological powers have had their security systems attacked by inexplicable hackers, almost in the blink of an eye.  In a short time, they captured the system they were proud of, copied all the information in it, and selected it crazily "Ah, God, who did this" "It's impossible, in the worldThere is such a powerful hacker What, not only our country, other countries have also been attacked by this hacker?  " "At least it is more than 20 years ahead of our world's highest technology level, otherwise it would never be possible to achieve such a step, it is too powerful" The hacker system that suddenly appeared is like a hacker system that comes and goes without a trace, flying into the sky  Escape, an all-powerful peerless master, a peerless thief, no matter what kind of trap he is, he is immune to all traps. Even the most technologically powerful institution on earth is completely unable to withstand the attack of this master and can only  With helpless eyes, I watched it collect all the important core data stored in the computer, and then select it "It's strange that this was done by humans. It's simply unimaginable that our 'Garden of Eden' is the most technologically advanced place on earth.  This place has a technological level that has surpassed the world's top technology for at least nearly thirty years. Even a country as powerful as the United States is far from being able to compare with us in this technological field. But why does our protective layer fail in just a few minutes?  Was he captured by this person?  "In a mysterious underground research institute, a man wearing a huge red robe and dressed like a priest was yelling and asking. This scared the researchers in the institute into silence, and no one dared to speak, but just  During the silence, someone suddenly seemed to have discovered something. He shouted in shock, "No, Lord Bishop, this hacker has invaded our core system. Oh my God, he actually destroyed all the password layers we edited with ancient divine texts.  Attack, how is this possible No, no, 'Eve''s information has been copied" "What?  The information about 'Eve' No, this is our most important secret. It is related to the rise and fall of our Holy See. It must not be allowed to be known to anyone Go, immediately dispatch all the Holy Guards, use the most advanced technology, at all costs  "We must find this audacious blasphemer in the shortest possible time" In just five minutes, this super hacker system shocked the entire world. However, the most shocking thing is not its power.  But while invading the global network, a short video was attached In China, Beijing, in the Longyin Base, the base's most powerful supercomputer, the "Longyin T1200", was completely out of control at this time.  , as if being attacked by a hacker, but this hacker is different from the imagined hacker, frantically harvesting important core data. I saw that after this mysterious system captured the "Longyin T1200", it not only failed to copy any data away  , but it continuously transfers core technologies and confidential information collected from various countries to this supercomputer for free. This strange thing is like a safe being opened effortlessly by a master thief.  Open, but this thief not only didn't take it out for a minute, but kept stuffing the property he got from other people into this safe. This thing is really hard to understand, but when the data is transmitted to a certain extent,  , a video appeared and everyone suddenly understood what was going on. "I am Chu Xuan"
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report