Chapter 452: The Hacker King Appears

(At least three more today, make up for the 10,000 reward for troublesome children's shoes that I said last time...... Ask for votes, ask for support...... )

Last year, Hacker King became a legend in the hacking world.

Almost single-handedly, he resisted the hacker attacks of the entire West, and the counterattack was unusually sharp, so that the countries that participated in the attack suffered a lot of losses.

The direct loss of the whole world is more than 10 billion dollars, and the important thing is that the kind of virus that can destroy the hardware, no one has been able to crack it so far, unlike the time reporting program left in the CIA headquarters, the two are not on the same level.

This time, hackers with ulterior motives immediately sowed an extremely aggressive virus to retaliate for the losses suffered by the virus last time.

A large number of company computers have been attacked by viruses, which are viruses that attack hard disks and destroy files, and many companies have suffered losses, and many company file information has been destroyed.

"These guys, too vicious, directly destroyed all the information on our company's hard drive."

"This is a big loss......"

"The information survey I just did was stored on the hard drive, and now it'······s all gone."

With the advent of the information age, office tends to be automated, computer office has become a trend, and a symbol of high technology, and the dependence on this tool is becoming more and more heavy.

Once a computer is attacked and suffers huge losses, it is a huge blow to the entire company.

In just over half an hour, the ferocious attack directly paralyzed the servers of several major Internet companies in China, and even computer security companies could not withstand it.

The emergence of the hacker king has given hope to the Chinese IT experts.

Western hackers are excited, they have entangled so many masters this time, in order to break the myth, make the hacker king hate, and do nothing against them.

There is no shortage of masters in the West, according to the book of the Chinese IT language, they have also studied the composition and mechanism of the Chinese language system, and they think that they understand this virtual programming language, so they will be so confident.

But!

It's time when the King of Hackers comes along.

Western hacker masters have only found that the information they know can not help them, and the attack of the hacker king is still very sharp.

"Since you have all torn your faces, then I am not welcome, I will repay you tenfold for what you give us!"

This line of words appeared on the battlefield in the form of program code.

The battlefield is the China Portal, which is the last position that gathers almost all the hacker masters in China and the West, and staged a series of tough battles here.

As soon as Wang Hengxiao appeared, he directly got the highest authority here, and then directly replaced the website's server and directly replaced it on his supercomputer, and a powerful defense system appeared.

Hundreds of powerful data attack streams attack on the defense system, but all of them fail.

Because, this defense system is unpredictable to them, everything is unknown, like a wall in the dark, they can only hit it like a headless fly, hoping to knock down this wall that they can barely see.

This is a pure Chinese system, the core instruction set of pure Chinese.

There is a world of difference from the logic and composition of the Chinese language mentioned in the published Chinese IT language book.

For Western masters, this is unknown, they don't know how to break through to it, and they don't even know what it is.

"Shit, what is this? What is gibberish? Can't find anything? ”

"We can't break his defenses......"

"This defense system is more powerful than the last one, there is no trace of it, it seems to be a pure Chinese system······ We don't know anything about it...... "...,

What is unknown is powerful.

The attack by hundreds of top hackers lasted for half an hour, and there was still no sign of loosening.

This kind of god-level defense system shocked the top people in the IT industry seen by the whole world.

Even, in a hurry, hackers used some extremely aggressive viruses that they usually dare not use, but they still couldn't find the vulnerabilities in them.

Wang Hengxiao sat in the boss's chair and watched quietly for half an hour, watching the flickering data streams on the screen and the feedback information, all of which were memorized.

The reason why two supercomputers were built in this heavenly apartment that is not about to belong to him, and he spent effort and money to build a pure Chinese supercomputer, is to accumulate experience, implement his ideas for several years, find the shortcomings, improve them, and be more perfect when building bases in Africa or Afghanistan in the future.

At this time, hundreds of top hackers in the world were attracted to test the performance and defense capabilities of this supercomputer with a pure Chinese system again

There's no denying it!

In the face of the unknown, even a master is helpless.

The pure Chinese system tends to be perfect, so that they don't know how to start with the Dao, because they don't understand and don't know the Dao.

However, Wang Hengxiao still saw the strength of the other party from this half-hour attack, saw some loopholes in his own program, wrote them down, and improved them next time.

In half an hour, the other party has already used all the means, and some people are already trying the same means repeatedly

Wang Hengxiao kept all the data in the past half an hour in his heart, which could be improved when he continued to write the system in the future, and said lightly: "That's how you do it." ”

Truly!

At this time, Kevin, who was in a small room in California, felt that he had a kind of embarrassment of poor donkey skills, this inexplicable system was so weird, even unpredictable, scratched his hair, and said in a deep voice: "Damn, this may be an oriental language program again, could it be that they have written a whole set of Chinese systems?" ”

"It can't be!"

Kevin didn't believe it, his hands were beating rapidly, the keyboard was making an overwhelming sound, and the data flow on the screen was fast to the limit, sending out his last attack!

However, it still didn't work.

Even Kevin felt the opponent's active attack, and the opponent had been passively defending just now.

One by one, the data flow tracked the attacker just now, and spread it to the whole world through the network.

Thinking of the methods of the hacker king last time, Kevin decisively broke away from the battle through one broiler chicken after another, and at the same time called the other companions to quickly get out of the battle.

Obviously, they all underestimated the combat power of this hacker king, or rather, their self-confidence swelled to the point of getting carried away and forgetting the horror of that hacker king.

At this time, many people reacted, and the other party began to fight back.

Fight back, they're not afraid!

They are confident that they can defend their positions now, and anyway, they have already destroyed China's IT industry, taken advantage of it, and turned around to hold their own territory, then they will be victorious.

But their defense, under the attack of the Hacker King, obviously looked very pale.

One after another, the data stream attacked the air, and everywhere it passed, the computers emitted a puff of black smoke, burning the CPU and crashing.

Just like last time, many ordinary office workers working in the office don't even know what's going on, they just turn on and off their computers, and they don't know anything about the hacker world, but their computers are used as a springboard for broilers by hackers, and they are not immune to attacks.

Japan!

At the headquarters of Fujitsu Electronic Computer Corporation, a group of technicians were sweating profusely and tapping on the keyboard. …,

"Hurry ......"

Song Lin Jian shouted with a twisted face: "We must hold on, we can't lose our host ......"

Fujitsu is one of the world's top IT companies, and after a joint venture with Siemens, it has become the largest IT supplier in Europe, with business covering all businesses in the IT industry, and the design of supercomputers ranks among the top 10 in the world.

This time, Fujitsu's in-house computer experts directly participated in the hacker war to attack China's newly developed IT industry, and it was these Japanese computer experts who first spread the virus, causing great harm to China's computer industry.

However, the super hacker known as the Hacker King appeared.

They don't have the ease of participating in the attack, they don't have the schadenfreude of spreading the virus, and they have all the fear at this time.

Woohoo······

Wow··················

With a few muffled sounds, a row of computers that were being used, a dozen computers suddenly emitted a puff of white smoke, and then the screens went black and lost their effect.

Everyone present was stunned, and then their faces changed dramatically.

As the leader, Song Lin Jianyi, who was in charge, said loudly: "Quick, go cut off contact with the outside world, announce the maintenance of our host, and then cut off the power supply..."

"Songlin-kun, it's too late......"

Deputy Ogura said with a dull look in his eyes, looking at the big screen of the host over there, it was already pitch black at this time, and a smell of burnt paste emanated.

The main machine is the fastest supercomputer in Japan, it was designed and assembled only last week, and a supercomputer in the world has not yet been announced, and it is a secret weapon that is ready to enter the ranks of the fastest computers in the world.

This moment!

Fujitsu's headquarters fell silent.

Panasonic ...... Sony...... Mitsubishi ...... And so on, the computers and host servers of famous Japanese companies have all been taken care of.

Even, the main computers in several famous research institutes in Japan were ransacked.

The whole of Japan was in a panic.

The power of hackers, at this moment, is clearly displayed in front of the world, compared to the damage they caused in China before, the losses they themselves have suffered are significantly magnified by more than ten times.

Last year, the first Sino-US hacker war, the panic caused by the hacker king to the world made people aware of the terrifying and destructive power of hackers, and the computer security companies in the world have developed rapidly.

This time, in order to show the destructive power of Western hackers, they are wantonly spreading viruses on the Chinese network, destroying the hard drive data of every computer the network can connect to.

Wang Hengxiao did more than them.