Since there was no reply from the owner of the computer, Feng Xiaotian could only find other ways to contact him. ¨Q, ww¡üw.23¡ùwx.co¡Þm Feng Xiaotian controlled the computer to circle around the perimeter, trying to find a breakthrough. As a result, after turning around, he discovered that another computer closest to this IP was being used. Human invasion. Feng Xiaotian only took a brief look and suddenly discovered that the attack method of this invading guy was extremely special. This guy seems to be ignoring the defense system and is invading almost all-pervasively. This is the second time Feng Xiaotian has seen such an invasion method! A thought suddenly flashed through his mind: This is clearly the elves' invasion mode! As a truly intelligent program, the Elf can ignore all defense systems, and all system vulnerabilities are invisible to the Elf! This guy can actually do this. Could it be that it is a new intelligent program developed by othersor is it simply an elf? Feng Xiaotian couldn't help but shake his head slightly when he thought of this. If it were really an elf, then you don't need to make such a big noise if you want to invade a computer. The invasion of the elf is absolutely silent. There is no way that anyone in this world can do it. Great discovery! Even if he is not an elf, Feng Xiaotian still feels that the situation is a bit serious, because he found that this guy already has certain characteristics of an intelligent program, such as its ability to see through all program loopholes, which is really scary. In order to find out the truth of the matter, Feng Xiaotian immediately restrained his mind and started to attack this guy. Even though this guy is very capable, Feng Xiaotian is not afraid at all. Although the other party has the ability to see through program loopholes, Feng Xiaotian has the ability to write the most perfect program. The program he writes has very few loopholes. Even if he faced this guy, Feng Xiaotian didn't feel that he was in any danger. When Satan and Kevin saw that the passive intelligent program had defeated the opponent and was invading the opponent's computer, they both showed expressions of satisfaction. Although the passive intelligent program is far from their ideal intelligent program. But its capabilities are also extremely powerful. Especially passive intelligent programs can mobilize human brain cells as computing units. This is unmatched by any computer in the world! Even if only a small number of brain cells can be mobilized to seat computing units, the number of human brain cells reaches tens of billions, and the superposition calculations of a small number of them are extremely terrifying. In terms of performance, it is definitely not inferior to any existing supercomputer in the world. ! It is precisely with the support of this powerful computing speed, coupled with the various methods set by Kevin to peek into the loopholes, that the passive intelligent program can reach such a terrifying level! When Satan saw the opponent's defeat, he couldn't help but said proudly: "Even a passive intelligent program cannot be resisted by ordinary people. But this guy evacuated the quantum program with devouring characteristics and insisted on going into battle on his own. This time he finally suffered. Come on!" Kevin was also extremely satisfied with the results, but he thought more deeply. He chuckled and said: "Steven, we can't be too proud. The quantum program in the opponent's hands obviously has certain capabilities. Intelligent characteristics, this shows that we are not the only ones in the world who are studying intelligent programs, there are others who are working on it. Before real artificial intelligence is developed, it is better for us to be careful when hearing this. After a moment, he asked: "Master, since you want to keep a low profile, why do you still let the passive intelligent program continue to attack? Won't this attract the attention of other interested people?" Kevin smiled and said: "I just want to take a look. Is there a file backup in the other party¡¯s computer? It is best to have a file backup of the quantum program so that we can use it to study it and have a way to deal with this kind of program again in the future. " Satan heard this. He hesitated and said: "But this quantum program is still very powerful. Even if the passive intelligent program invades the other party's computer, if it encounters the quantum program again, the outcome is not easy to predict. After all, the passive intelligent program is supported by the human brain. "How can you bear it without rest for a long time?" Kevin smiled and patted Satan on the shoulder: "Steven, you have finally made progress and can look at the problem very comprehensively." Kevin said this. He paused for a moment, then continued: "Master naturally thought of the problem you thought of. Master felt that the reason why the quantum program was taken back by the opponent was probably because there was something wrong with it. Its attack method is to devour, and all the attacks are directed towards it. Its data flow will enter its mouth. This is like a person who always feels uncomfortable after eating too much. Maybe it has lost the ability to continue fighting, otherwise the opponent should have sent it out to resist the passive at the critical moment. Smart program, but the other party did not do this. They just watched you lose and the computer was invaded. This means that the other party has no other options, so your worries will probably not arise.?¡± Kevin¡¯s words completely conquered Satan, and he only heard him flatter him: ¡°As expected of the master! What I want is thoroughness and meticulousness! This guy is probably a hacker. The most fearful thing for a hacker is to be successfully hacked. Since he can't even think about it at the last moment, it seems that he should really - um what is going on? " Before Satan finished speaking, he suddenly discovered that the passive intelligent program was retreating from the other party's computer. At the same time, an attack alert was displayed on the computer screen. Kevin also discovered this, and he put away his smile and looked carefully After looking at the specific situation, I saw a stream of data attacking the passive intelligent program. The extremely powerful vulnerability detection ability of the passive intelligent program seemed to have lost its effect. It was retreating steadily under the opponent's attacks and could not attack it at all. This guy poses no threat! "Thisthis" Kevin was also a little confused. Seeing that the passive intelligent program was beaten by the opponent, he was a little stupid and at a loss. Come, I saw him saying uncertainly: "Master, is there no loophole in the data stream sent by this guy? Otherwise, it is impossible for a passive intelligent program to retreat steadily, but is there really a program without any loopholes in this world? " After Satan's reminder, Kevin finally reacted and said in horror: "This is absolutely true! Even if you don¡¯t believe in the other party¡¯s programming ability, you should still believe in the power of passive intelligent programs, right? The current situation is already very illustrative! The data stream sent by the other party does not have any loopholes! In other words, even if there is a loophole, our passive intelligent program will not be able to detect it at all! " Satan looked pale and said: "If this is really the case what should we do? " Satan was a little frightened. If this is the case, then the guy who is attacking the passive intelligent program can definitely be called the God of Programming! The passive intelligent program is not his opponent at all! " Kevin thought for a while, and then said in a deep voice: " In addition to the ability to quickly exploit program vulnerabilities, passive intelligent programs also have many other powerful functions. This guy can deal with one of them, but I don't know if he can deal with the other functions? " If it were in the past, Satan would definitely agree with Kevin's words, but Kevin taught him the ability to think in all directions. After hearing Kevin's words, Satan couldn't help but look solemn and said: "Master, since this guy has programming The ability to have no loopholes, and other abilities are also very unusual. We'd better be careful, in case we are not the opponent It seems that we can only sacrifice this passive intelligent program. "Satan's so-called sacrifice refers to unplugging the data cable connected to Earl Aton's brain. This will terminate the work of the passive intelligent program, and the other party will suddenly lose its IP address, and its secrets will not be lost. Exposed. But in this way, the passive intelligence program will be completely destroyed, because the computer has already sent calculation instructions to the brain. If it does not get the instruction to stop the calculation, Earl Aton's brain will continue to be busy until it can no longer support it. Kevin looked at the statue-like Earl Ayton and sighed: "That's all. The work of the passive intelligence program is basically completed. Even if we lose it, our loss will not be too great. " While the two of them were talking, the passive intelligent program was still in a state of retreat. Its ability to exploit program loopholes was of no use at all. It was like a headless fly, being beaten away by the other party. " This is like two people. In the competition between masters, one of them has the ability to see through the opponent's weaknesses. When facing others, he can always attack from the flaws, making the other party unable to resist. But this time he encountered an opponent with no flaws, and the ability he relied on instantly changed It lost its effect. The master felt confused because he was caught off guard, so he could only be beaten passively. But this situation soon changed. Kevin saw that the passive intelligent program was losing ground and immediately tapped the keyboard to give it instructions. Kevin said to himself while he was busy: The reason why quantum programs are comparable to passive intelligent programs is because they have the ability to devour. All attacks in the network world exist in the form of data. As a result, the attack of the passive intelligent program is invalid, but you are only a human being and cannot swallow data. As long as you change the attack method of the passive intelligent program, I see how you can resist it! Soon, Kevin gave the order, and then the passive intelligence was completed. The program changed from being passive to being beaten, and suddenly launched a counterattack in flood attack mode! Feng Xiaotian had already gained a huge advantage, and saw that the opponent was about to be defeated. Unexpectedly, at this moment, the opponent suddenly launched a counterattack against him! Almost instantly, Feng Xiao was attacked by the flood.?I saw an overwhelming data flow coming towards me. It was as if the other party had mobilized countless broilers to send data flows in an instant. The power of the data flow was definitely beyond the imagination of ordinary people! (To be continued, please search Piaotian Literature. The novels will be better and updated faster!