Chapter 187: Super Hacker War

(At least two more today, whether there is a third watch depends on the specific situation, everyone give some support, give some motivation...... Thanks a lot...... )

Mayflower is a legend in the history of hacking, the only super-hacker after the first super-hacker Kate who can make the U.S. government helpless. ●⌒,

And Kate's period of dominating the Internet was also the wild period of the Internet, so although his record was also extremely brilliant, it caused a shock to the world at that time, and made the world realize for the first time the horror of the Internet, and the terrible combination of technology nerds and computers.

After Kate was captured, she was restricted from touching anything related to radio for the rest of her life.

However, many people did not recognize Kate's technology very much, thinking that it was just the reason for the underdevelopment of security technology at that time, and it was finally caught by a Japanese.

Mayflowers, on the other hand, are different.

The name Mayflower symbolizes the ship Mayflower, the first gold diggers who set out from England to the American continent!

The ship contained the first big names in the United States, and it also symbolized the beginning of hundreds of years of American history.

Five years ago, Mayflower suddenly came out of nowhere and invaded the Pentagon as soon as it appeared, modifying a homepage in it, leaving behind a picture of the Mayflower steamer, so everyone called him Mayflower.

In the following four years, Mayflower achieved a brilliant record and became the undisputed number one hacker in the world.

He has invaded the NATO Joint Military Command, the White House, the IA, and the EU headquarters, and all major high-tech companies in Europe and the United States have not been spared......

Except for the Chinese Internet, he has not invaded, and his shadow is almost everywhere in Europe and the United States, leaving other hackers to look up.

However, after he invaded these places, he did not do any acts of sabotage, but simply invaded for the sake of invasion, in order to prove his skills.

So, forcing and IA and Interpol are wanted for Mayflower. And the wanted ranking is very high, but all parties have not really bothered to hunt down this super hacker, because everyone thinks that his destructive power is not enough and the threat is not high. And the technology is too high, it is difficult to hunt down.

A year ago, Mayflower suddenly disappeared from the internet, and several hackers who knew him never heard from him again.

A year has passed, and everyone thinks that he has completely retired from the stage of hacker history. He suddenly appeared again.

Moreover, he suddenly appeared at the critical moment of the Sino-American hacker war, as if the knight appeared at the most dangerous moment of the princess, saved the princess, killed the evil dragon, and became a big hero admired by the world.

At this moment, the war has spread from Intel to IBM's main server, and Intel has completely fallen.

Bob, the NSA's director of cybersecurity, was temporarily assigned by the White House to lead dozens of cybersecurity experts and IBM's technical elites to fight against China's Red Guest Alliance.

"How's the situation in China?"

Bob asked with a dark face.

The subordinate immediately replied: "Black God and Satan." Count Arthur's three people joined forces with thousands of hackers to attack the main server of magic software for an hour but failed to take it down, and when the Chinese hackers invaded us, they have now attacked other Internet companies in China, and now they have broken several major Internet companies in China, paralyzing the entire Chinese Internet. ”

Bob's face finally looked a little better, and he said in a deep voice: "These yellow-skinned monkeys are simply hateful, this is their deserved punishment." Wang Xiao of that magic energy software company must be the hacker sun! ”

"Yes, we compared, and the odds of the two being the same person are as high as eighty percent!"

The subordinate looked at the number jù. He replied: "However, the Chinese hacker who attacked IBM this time does not seem to have Sun, and he disappeared after hacking into Intel's servers." Their attack power immediately dropped a few notches, should we launch a counterattack? ”

Bob perked up. Yan said: "Look again, don't be in a hurry, don't fall into the trap." What about Google and Apple, Microsoft's side? ”

"They are still working on the aftermath and have launched a backup server, and there are no secondary attacks at present."

The subordinate tried Google search and it already worked.

Then, he entered the Chinese Internet. I tried Baidu, but it can also be used?

What about the paralysis that is said to be good?

He looked startled, and hurriedly re-entered several mainstream websites of the Chinese Internet, and found that they could all browse normally, and the online services were all restored.

What's going on?

Just now, the black god sent him a message saying that it had paralyzed the Chinese Internet, why did it recover after a while?

Bob also noticed this anomaly, and said in a deep voice, "What's going on?" Black God, how did they stop attacking? ”

The subordinate immediately contacted the black god with a secret communication software, and after getting the answer, he was shocked: "Boss, the black god said that their attack was blocked. Magic Software sold its security system to other Chinese Internet companies, which installed the security system of Magic Software, and they temporarily tried to target the security system of Magic Software. ”

"The entire Chinese Internet has now become as invulnerable as Tietong!"

Bob's eyes widened, he was mainly responsible for network security, and he was definitely a master of technology, and he knew how high the technical content was.

It can directly improve the Internet security of the entire country by several levels, and it has become an iron-clad defense.

This kind of security system can be said to be the dream of every country.

Pity!

That's Chinese, it's developed by magic software, it's Wang Xiao's technology. With the current bad relations between the United States and the other side, it is simply impossible to buy such security software from the other side.

What's more, even if it is bought, will the United States dare to install a security system designed by Chinese in government agencies?

They definitely don't dare, who knows if there will be a secret door to the system left by Wang Xiao inside? Will the other party only need to enter a code to paralyze all the servers installed with this security system?

No one dares to take this risk.

Drip Drip......

Suddenly, several rapid sirens rang from several computers.

Bob shouted, "What happened? ”

A technician hurriedly reported: "Boss, it's Sun, he's shot again, he's got into the IBM server, got super permissions, we've been kicked out." ”

"He's so powerful, we can't stop it!"

"IBM was kicked out as well. No way yet, unless the server is shut down! ”

"Other Chinese hackers have also come in, and IBM's servers have fallen!"

Everyone was a little panicked, but there was nothing they could do.

One by one, the information is summarized and you are enough. Bob's face was furious.

Dozens of their national cybersecurity experts and IBM's technical elites can't even resist the attack of a Chinese hacker?

So what to do?

Is it just watching this Chinese hacker do anything wrong on the American Internet?

Bob had an urge to turn the American Internet into a large LAN as well, so that there was much more room for manoeuvre.

And at this moment!

Everyone found that Sun, who had just hacked into the IBM server to gain super privileges, suddenly ran into an opponent.

A stream of Jù also suddenly invaded IBM's servers, and Sun began to snatch super privileges from the servers.

Bob saw the number of jù flows, and saw the familiar way of operating. A photo of an old steamship flashed in his mind, and he suddenly said in surprise: "It's him who appeared, it's Mayflower." ”

"Mayflower?"

"It's really Mayflower that appeared!"

"This guy disappeared for a year."

"We should recruit him and give him the best treatment, he can definitely take our overall strength up a notch."

"But this guy didn't pay attention to our contact solicitation, and he didn't even think of joining us."

The technicians of the National Cyber Security Agency are feeling the pressure relaxed.

For the time being, the world's No. 1 American super hacker Mayflower and China's newly rising super hacker Sun are on a par, and the battle between the two sides is inseparable.

In less than a minute, the two sides were in a fierce battle.

With IBM's server as the battlefield, the two digital streams are constantly staggered and flashing. One by one, one by one, one by one, one by one, the attack program was quickly written by two super hackers, you cracked a program for me, and I immediately wrote a more targeted program!

The confrontation between the two super hackers, you and me, everyone only saw the rapid flickering of two numbers.

Dozens of technical personnel of the US National Security Agency suddenly felt that they could not get involved, including the hundreds of technical elites of IBM, who usually thought that they were superior to others and that they were figures in the field of computer technology. And now everyone feels small.

At this moment, a large group of people at IBM headquarters gathered around the center of the server, and the large screen of the server was constantly flashing with a rush of numbers. The others were a little dizzying, and they couldn't see the meaning of the two people's numbers at all.

But. Everyone is a technician, and from the constant state of the server, it is clear that the two are in a fierce confrontation and are fighting for the authority of the server.

This top-level hacking war is really the most exciting one in the history of the Internet, and it is definitely the most technologically sophisticated. It can be said that it represents the pinnacle of technology in the field of computer science now!

In this war, neither the US National Security Agency, nor the technicians of IBM, the owner of this server, nor the Chinese Red Guest Alliance, can not intervene, and they have become spectators on the side.

In an instant, this battle turned into a one-on-one duel between the Chinese super hacker Sun and the American super hacker Mayflower.

IBM's chief technology officer was a little thrilled when he saw this battle, but his own server could not call the shots, so he was still very depressed, and said in a sighing tone: "Mayflower has disappeared for a year, and the technology has improved a lot compared to before." The number jù he is now entering is a completely new algorithm, which may have been researched by himself, which is very efficient and conducive to defense, but there are some shadows of magic energy algorithms, and it can be imagined that Mayflower is not complacent, and has been absorbing external technology to improve herself. ”

"However, the number of China's super hacker sun's algorithm is also a new algorithm, but it is not a magic energy algorithm, but there is also a shadow of a magic energy algorithm, but it is also more efficient, and Mayflower's algorithm is somewhat inferior."

Other IBM technologists agree.

However, the chief technology officer of the National Security Agency saw more, and said sternly: "Sun's algorithm is indeed obviously more clever, and Mayflower has resisted it for the time being, but I don't think it will last long." Sun is competing for the underlying permissions, and once the underlying permissions are obtained, they will be able to control the entire server, and Mayflower will have no choice at that time! ”

The technicians who heard this were silent, excited, depressed, and angry.

As a technician who witnessed the hacker war of the normal century, he was naturally excited; But if I can't participate, I'm very depressed; The most important thing is that you can't call the shots on your own territory, so of course the atmosphere is incomparable.

They have to admit that the Chinese are quietly catching up with them in computer technology, and slightly surpassing them.

It seems that Mayflower's defeat is also a matter of time, and it is already somewhat difficult to resist Sun's offensive.

However, at this time, IBM's server suddenly added a few sharp streams of numbers, and Mayflower fought against the Chinese hacker Sun!

These hackers are Satan, Count Arthur, and the Black God.

They gave up attacking the Chinese Internet and wanted to make a difference in the U.S. theater.

At this time, it became the Chinese super hacker Sun to fight alone against four of the world's top ten hackers, including the first Mayflower and the second Satan.

The whole world of hackers who followed the battle was shocked.

This Chinese super hacker Sun is too powerful, right?

It seems that the position of the world's number one hacker is about to change hands. (To be continued.) For mobile phone users, please visit wènhttp://mnet

http://mnet