Chapter 112: The Mysterious Hacker Appears Again

Time is like a hot quicksand, taking irresistible steps, swallowing the whole world step by step, and the memories of the past are like the last residual temperature of the quicksand evaporating

As the quicksand swallowed up, a storm was slowly brewing, and the driving force behind the formation of the storm was the terrifying excellent code, and the hackers who were endlessly attracted by the excellent code also flocked to the FBI in the past few days, thus increasing the formation speed of this storm again.

The storm was already looming with immeasurable destructive power, but the center of the storm was surprisingly calm, with the F.B.I. and the country's official intelligence agencies and anti-terrorist organizations making no official announcement about the world's hackers gathering in their countries to compete for code excellence.

This phenomenon is extremely strange, many authoritative media in the world are also vying to report on this incident, and even set up a special column to discuss this incident, the information disclosed by the world media is too huge, from the beginning of the development of the Internet, to the spread of the Internet throughout the world to make a general summary.

The public was bombarded with such a huge amount of information, even some people who did not pay attention to the Internet at all, began to discuss network security, and there was no clear conclusion between the media about the world's hackers showing their desire to compete for excellent code, and the official position was not expressed for a long time, which invisibly covered this incident with a veil of mystery.

With the increasing attention to network security in recent years, hackers, a hobby profession that breeds in the dark night, have gradually become a popular trend, but this popularity requires hardware, and it is completely impossible to play such a high-IQ game without this ability.

Therefore. Many people would love to watch such an event unfold. And not them as the protagonists of the event. All these spectators need is a result, a result that will make the blood boil.

For these spectators, winning or losing is as simple as that, and the process is not that important.

And this battle is enough to attract the attention of many people, because the outcome of this battle affects the patriotic complex in everyone's hearts, and the final ownership of excellent code will become the focus of heated discussions, and this battle is not unprecedented for hacker rookies.

In the hacker world, many people can't hold back the excitement in their hearts. Control the broiler to roam around the FBI's official server, collecting some available intelligence, but these people do not dare to take the initiative to attack, the FBI is silent, but his strength should not be underestimated, if they take the initiative to attack, I am afraid that they are now in the middle of the way out of the country.

They were waiting, waiting for an opportunity for a battle to break out, a swarm of bloody fighters, and that would be when the world's hackers would attack the FBI. Only then will you be able to fish in troubled waters.

As time passed, hackers from various countries began to get agitated. There is no previous calm at all, and ZG is no exception, and there is a lot of discussion about this battle in China, and the leaders of many hacker groups are also discussing matters related to the alliance, after all, there are too many uncertainties in that unfamiliar domain.

The members of the alliance must have the experience of hacking foreign designated institutions, and the number is not a matter of number, but of the fine, and this situation has been ongoing in the domestic network community, and as the alliance process progresses, the originators of some foreign institutions being eroded by hackers have also been found.

The hacker attacks that shocked the Internet world were also made out again, and the hackers who hid their identities gradually surfaced, it turned out that these people really existed between them, these people undoubtedly have extraordinary hacking capabilities, and it is indeed exciting to be able to fight with these people in some battles.

The blood of the restless hackers is burning little by little

Last night, it was the first time that Mu Xuan had rested without scruples in the past twenty days, during that time, although Mu Xuan was tired again, after lying in bed, his brain still reasoned uncontrollably about the logic between codes, and the rest time was extremely insufficient, and now Mu Xuan has also improved his strength to a stagnation stage, so Mu Xuan can relax a little, and some things are better gradually.

At this time, at 14 o'clock Beijing time, Mu Xuan sat in front of the black laptop, his melancholy eyes slowly scribbling across the screen

Mu Xuan is browsing the famous hacker forums in various countries, undoubtedly in these forums, there is a smell of gunsmoke, Mu Xuan silently lurks in the hacker forums of various countries, and also carefully explores some of the movements of the MG hacker forum, strangely, the MG hacker community is as silent as the MG official, and there is no saber-rattling reaction to the attack on the FBI by various countries.

"It's strange, MG is extremely unusual!" Mu Xuan was very puzzled when he compared the MG hacker community with the hacker community in other countries.

For this situation, Mu Xuan can't speculate without grounds, after visiting most of the world's hacker forums, Mu Xuan once again focused on his own country, his own hacker forum, and the hacker base issued an official solicitation order to form an alliance.

The hacker organizations that are required to be formed include the Red Guest Alliance, the Hacker Alliance, the Escape Realm, the Sky Rail, the Wandao, and the Inch Mang, of course, each organization requires members to have carried out terrorist attacks on foreign designated institutions, and it is a terrorist attack that has escaped from the whole body.

Mu Xuan looked at these conditions and smiled helplessly, not to mention whether he had any intention of forming an alliance, didn't he kick himself out directly? In retrospect, I had never carried out a single attack on a foreign institution, let alone a terrorist attack.

"Huh? Why didn't a solicitation order be issued? Mu Xuan watched well-known hacker organizations in China compete to issue hacker solicitation orders, but he didn't find a thousand miles of cold in it.

"I don't know what the hell is going on with the frozen everything and the flames, we don't have that much time?" Thinking of the flames and others who had no news again, Mu Xuan was a little distracted.

This battle is bound to be extremely dangerous, and the stronger the strength of the others and others, the more chances they have to compete for the code of excellence: "I hope they can show up before the battle comes!" ”

Mu Xuan once again tossed between various hacker forums, but it seemed very relaxed, but Mu Xuan suddenly found that his keyboard was out of control. A few words appear at the bottom of the screen

"The system defense is not bad"

"Click on the font with your mouse. You can use the keyboard to type" followed by another sentence.

This is the case. Mu Xuan reacted immediately, he was invaded unnoticed, but his computer defense is indeed very strong, it is impossible to be invaded by the other party without being aware of it, who is the other party?

Mu Xuan looked at the text, didn't care so much, followed the prompts, and entered the subtitles like lightning: "You invaded me?" ”

"You're underestimating the defenses of your computer. I'm just controlling your keyboard and some of the programs, and it's going to take a little bit of effort to get full access to this computer. After Mu Xuan typed out the subtitles, the text responded with lightning speed.

Mu Xuan's pupils narrowed slightly as he looked at the text typed by the other party, it seemed that the other party had indeed invaded his computer without him noticing, and at the same time, Mu Xuan pulled blood and began to analyze the traces of the other party's invasion

"Who the hell are you?" Mu Xuan asked the doubts in his heart.

Why was the other party invaded? What kind of person can be able to hack into their computer without noticing? Why did he invade himself and let himself know of his existence? What exactly is his purpose? A series of questions flashed through Mu Xuan's heart.

"This is the second time I've hacked into your computer, you should know who I am, right?" The words flashed lightning again.

"It's you, you're the mysterious hacker who covered up the unique fluctuations of reincarnation for me?" When the other party replied, it appeared in Mu Xuan's eyes. I was indeed quietly invaded by a mysterious hacker before, and I thought of this. Mu Xuan quickly reacted, a little surprised.

Mu Xuan was very puzzled, how did he find himself? And judging from the other party's two silent intrusions into his computer, the other party's attainments in hacking technology must be extremely terrifying.

The first time there was a virus system on your computer, as long as the intruder made changes to the system, she would be infected by the virus system, but the mysterious hacker was not infected by the virus system and successfully invaded his computer, which is enough to prove that the other party is not an ordinary person.

"Looks like you remember me? Didn't you use his previous computer? The other party was puzzled, obviously when the other party invaded Mu Xuan's computer, he also found that the computer used by Mu Xuan had changed.

"Of course I remember you, there was a little bit of a problem with the old computer, but how did you find me when I wasn't using the old one?" Mu Xuan took advantage of the other party's doubts and asked his own questions.

For the mysterious hacker who helped him cover up the fluctuations of reincarnation, Mu Xuan always remembered that the two parties did not leave any contact information at that time, and after changing the computer, Mu Xuan was also worried that the mysterious hacker would lose contact with him.

"You've been using reincarnation lately, and there's a tracker I put in there, but don't worry, I won't hurt you." The mysterious hacker explained.

"Tracker?" Mu Xuan muttered, he didn't find that there was a tracking program placed in that code, in the network, Mu Xuan has not established an absolute trust with strangers, judging from the current situation, as long as there is this tracking code, he seems to be under the surveillance of the other party all the time.

"Don't worry, if I'm going to erode you, I won't tell you such a thing, and besides, I don't need to ink with you here, it's really easy to erode you, even though your computer is very strong." Seeing that Mu Xuan didn't react for a long time, the mysterious hacker explained.

"Also, don't try to use your analysis tool, you won't be able to detect any trace of my presence." The mysterious hacker added.

At this time, Mu Xuan was indeed carefully looking at the data analyzed by the blood drink analysis tool, but the blood drink showed that everything was normal, normal was only a superficial phenomenon, Mu Xuan did not expect that the mysterious hacker would be able to get rid of the blood drink scan, and seeing the explanation of the mysterious hacker, Mu Xuan gave up the analysis

At the moment when Mu Xuan turned off the blood drink, a distant region sighed: "This analysis tool is indeed strong enough, if it weren't for his own perversion, he would really be discovered by the other party, it seems that his strength is also improving rapidly." ”

Mu Xuan looked at the text and thought about it, what the mysterious hacker said was indeed true, but Mu Xuan didn't know why the other party invaded his computer again, obviously this is the biggest mystery.

"What is your purpose?" Mu Xuan asked. (To be continued......)