Chapter 687: A Stranger
Adam, the most legendary hacker in North America, also stepped on the corpse of a lot of masters, and he is a world-famous figure in North America and even in the world's hacker circle. Pen % fun % Pavilion www.biquge.info
Several famous hacker wars in the world also have his figure to a greater or lesser extent, and every time he makes a shot, he hits the key point, almost all of which are amazing performances that kill the country with one stone.
What's more, he likes to mentor his juniors on weekdays, and hackers in North America are all convinced of him.
The personnel of the Cyber Security Bureau suddenly regained their consciousness and mobilized relevant pictures.
From the various analysis and monitoring of the data, to some page changes on the live broadcast platform, even people who don't know how to hack can see the tension at this time.
I saw that the original peak was sitting alone, and the imposing "Great Freedom Heavenly Demon Phase" gradually began to feel that the picture was torn, and judging from the cracks displayed on the picture, Lin Mu could no longer maintain the full appearance of this painting.
It was the precursor to the familiar Adam move!
In the excited eyes of countless North American informed audiences, and in the sound of light breathing behind the screens of countless netizens, there are more and more cracks on the "Heavenly Demon Map", and the more light is revealed in the meantime.
It's like the allusion that the peacock swallowed Rulai, but was broken out by Rulai!
……
And in this situation, which resembles a stalemate, the online world, the endless flow of data, almost to a terrifying level, every millisecond, the two sides set up viruses, analysis, control programs are engaged in countless confrontations.
Countless opponents' technical programs were observed by both sides, and countless inspirations under urgency were given realistic procedures to attack and defend, and under this stalemate, Adam secretly applauded the opponent in front of him.
"This set of viruses directly attacks all kinds of system files, and there are many variants! The attack and killing ability is just that, although it is powerful, but after two days of observation, it has some ways to prevent it. It's just that the most terrifying thing is the evolutionary ability of this recessive virus! This virus seems to have a huge database, and it will adjust the relevant data according to the vulnerabilities of my program, so as to cause greater specific killing ability! What a terrible virus learning and evolving ability!" Adam secretly praised in his heart.
If you make a visual analogy, the virus that Lin Mu has done is like an army that can change arms at any time.
When Adam is an archer, the virus becomes a sword and shield soldier under the adjustment of the relevant database.
And when Adam showed the offensive and killing ability of a pikeman, the virus increased the long-range bow ability, and at the same time reduced its own related and useless configuration, and the special lethality of Adam increased rapidly.
"The more I know about my information, the more harmful your virus will be to me, and in the end, it is even possible to evolve a 'Adam Killing Virus' and use it against me, which is simply natural restraint! I'm curious, with your temperament that likes to leave information in the core area, what kind of words will you leave me after I decipher your surface layer of 'Heavenly Demon Map'? Interesting Asian!"
Although there is no way to find out Lin Mu's true identity, the approximate location can be calculated according to the response time of network data.
This principle is based on the fact that the transmission of signals is not real-time, and the offensive and defensive battles beyond the ocean, even if there are various self-set programs completed, there is still a lot of information, which needs to be actively adjusted by Lin Mu.
This kind of adjustment has appeared dozens of times in a row, coupled with some psychological speculation, which has made a top master like Adam know that Lin Mu is in Asia.
Adam, who grabbed the brandy next to him and poured a big mouthful, his eyes were a little red with excitement, he loosened his knuckles fiercely, and once again entered the battle that made him extremely excited.
Agreeing to Zhengfu's request to check Lin Mu's identity, it is not because he has a good impression of Zhengfu, but purely because his fighting spirit was provoked by Lin Mu.
Here are two equally lawless top hackers!
……
And in such a fierce battle, due to the limitations of the hardware equipment of this TV station, the live broadcast data began to be chaotic, and most ordinary netizens were no longer able to watch normally, and only those hackers who were proficient in data analysis and adjustment had the ability to watch the game.
A hacker chat channel in North America.
A new hacker excitedly said: "Finally saw the battle of the great god Adam! Master didn't believe that I could watch the battle at first, haha, now he has to teach me something new!"
"Oh, what do you see?" an electronic tone appeared in the audio channel.
The little hacker was a little surprised, those gods usually like to engage in small circles, and when they encounter big things, almost no one bubbles up in the public chat channel, and they are chatting with a few other familiar big gods and small channels, but I didn't expect to meet a colleague who likes to socialize today.
Thinking of this, the little hacker, who was extremely eager to communicate with others, said happily: "Obviously! This FT has long been targeted by the god Adam, almost at the beginning of the war, Adam infiltrated the inside of the FT program just now, so such a picture appeared." This is also Adam's usual method, although the two are now in a stalemate, but seeing that the light on this demon god map is getting stronger and stronger, in less than five minutes, Adam will break the other party's virus!"
Stranger: "Hehe, your eyes are bright, but have you noticed anything?"
The little hacker became interested: "What?"
"Now in this live broadcast room, there are less than 1,000 people left! All of them are hackers above a certain level in the world, and they almost represent the elite strength in the world. Moreover, they all observe and collect data on the outer borders, and from time to time they capture the 'residual battlefield data' of the warring sides, just like ordinary people who have picked up treasures, and collect them without hesitation......"
The little hacker was a little puzzled: "Is there any problem with this? If we can get some residual data of the gods, we can analyze some of the other party's ideas and compilation methods, which is a good means for us to improve our technology, isn't it normal to do this?"
"Hehe, it's normal......" This time, the other party's reply appeared more than 20 seconds late, and the other party was in a good mood, "But what if these treasures that were picked up also contained in the camouflage and viruses deliberately released by the other party? What if at this time, such a virus conducts a stealth data observation in your computer......"
The little hacker was shocked, and then he didn't care: "How can it be so simple! Is it really that we are all vegetarians?" Such difficulty is tantamount to silently entering a heavily guarded prison under the watchful eye of everyone, and then silently taking a prisoner out when most of the monitoring equipment is normal. Everyone is not stupid, how could such a thing happen!
"Oh, is it?" (To be continued.) )