Chapter 175: System Jun's Anti-theft Daily

System Jun, this powerful cartoonist system, was formerly known as the animator system.

Anime, that is, the combined name of animation and manga.

However, the newcomer found that there was only the term manga artist in this world.

Yes, there is only a noun for cartoonists, so it calls itself a cartoonist system.

It doesn't matter.,Anyway, the host is a Lori who loves two-dimensionality.,Animation or something has to be touched sooner or later.。

The host is a big Lori, one meter five tall, with an IQ about the level of an ordinary person, and a very tasty white face.

Usually she either runs to the office to paint, or goes to Jiabaili's room to sleep with a pillow, or rolls the sheets in the bedroom.

Of course, sometimes the host will close his eyes in bed and make up for it with a god-level manku.

Just as he was thinking about it, he noticed that a stream of seemingly normal but abnormal data was slowly flowing into the alien computer of the veil fog.

"Hmm, who is this, hacking into the computer again."

If the system has a mouth, he will definitely pout his lips at this time, and he is very disdainful.

At this time, Shawu was turning on the computer, and she herself ran to Jia Baili's room to play, and she didn't know about the hacker's incursion.

System Jun wanted to make a pouting expression in Sawu's mind, but after thinking about it, he didn't alarm the host, after all, it was just a trivial matter.

"I'll see who is so idle and sends hackers to harass them."

The system Jun directly used its high-dimensional downward investigation method, and soon jumped thousands of fake strongholds in nanoseconds along the data, came to the hacker, and investigated the people who contacted him before.

After a second, the system already knew the idea.

The employer is a secret research institute in the Americas, and it has made great progress in researching artificial intelligence, but after seeing the technology of the yarn fog, it resolutely decided to make a big purchase.

It's a pity that at that time, Sawu refused any acquisition request, so this agency decided to hack it for the sake of human progress and scientific and technological progress.

In addition to them, in fact, there are people in various countries who send hackers to take action, including Huaxia, and there are also people who want this technology.

But none of them stole the real thing, only a garbled program.

Now the system Jun is also concocting the same method, letting go of the authority to let him steal.

When he steals it and finds out that it is not like that, he must be mad.

Because this software is garbled when it opens, there is nothing to the hell.

Of course, in the face of the real master, the system gentleman deliberately left a real window program, which was divided into three and hidden in the depths of the computer.

At this time, Jiutianjun had already gotten into Shawu's computer, and he didn't find anything along the way, which was surprisingly smooth.

"The mouse doesn't move, it looks like the person is not there."

As he thought about it, he had already packed a very small virus.

Drops –

The virus has been installed successfully, and 100% access to the computer system has been obtained!

Looking at this line of subtitles, Jiu Tianjun's eyes narrowed, and he seemed to be aware of the dangerous qi.

The smoother it goes, the more careful you must be, because this is the highest level of deception, and there is nothing more than this in the empty city.

"Did you steal the software?"

At this time, the mouse on the computer screen of the foggy did not move at all, but the five computers on the hacker's side displayed different operation interfaces at the same time.

"Stolen!"

"Steal."

"Hmm."

“OK。”

The answers of the four colleagues were very succinct.

Jiutianjun also stole it here, it was too simple, he directly found the Geji software in a Chinese name file on the C drive, opened the lightning verification, and immediately transmitted it to his own computer.

"Boss, this is too simple, this software has no encryption measures, did we steal it by mistake?" No. 2 challenged.

As soon as the words fell, No. 3 exclaimed in surprise and said, "Boss, this thing is garbled, fake!" ”

"What!"

When this sound landed, the other three exclaimed in unison, only Brother Jiutian was as motionless as a mountain, his face expressionless.

This file is opened once on the original machine.,Obviously there's no problem.,Why is it invalid when it's copied?,Is it bound to hardware?

"Wait until I turn on the camera and take a look...... She's not in the room, so let's do a thorough search. ”

Jiutian glanced at the camera lens, and inside was a girly bedroom full of Bilibili small TV plush dolls and 2233 and other figures.

This time, the comprehensive investigation is not simple, and no procedures are missed.

Soon, after five minutes of thorough investigation, they discovered that there were three dynamically encrypted files deep inside the computer.

It's very hidden, and if you use the antivirus's search engine to find something, you will never be able to find this hidden thing.

Three encrypted files, it is possible that two of the three inside are fake, and only one is real.

Of course, it's also possible that all three are fake.

Luckily, it's a five-person group, and there's enough of them.

"Crack it with all your might!"

"Yes!"

Jiutian is a hacker boss, and he is the best at cracking anything.

"Complete this parkour puzzle game within 300 seconds, or this file will begin the self-destruct process."

The first encrypted file in front of you pops up a parkour game, you can control the villain with the mouse, complete a series of super difficult parkour moves, and the file will be unlocked after clearing the level.

"Snort."

Jiutian snorted disdainfully, didn't bird it at all, and directly used a homemade hacking tool to find the vulnerability of the encryption program.

In his opinion, normal decryption is too slow, it is better to look for program loopholes, or brute force cracking.

After a while, all three used hacking techniques to steal the encrypted files.

All three files are mutilated, and when you open the file, it shows that the run failed.

However, they moved the three files to the same folder to form a complete software.

"I'll open it and take a look."

Jiutian took a deep breath and nodded with a calm face.

At this time, the interface changed, the stars in the sky were surging like a tide, and there was a ruin under the night, Ze Yu, who was wearing a black bikini, had a starry blue fire dancing in his right eye, and a super long double ponytail flew in the air, and the black cloak rose and fell like a wave, and his aura was bursting.

Then everything is in half of the picture, and a library girl appears on the left, wearing a burgundy knit sweater, flipping through the book with a side face, quiet and natural.

A beautiful girl with pure natural gas quality!

2D beautiful art style!

Brother Jiutian's pupils shrank slightly, and he was shocked by this opening interface, after all, the comics he used to read were all old painting styles, and the visual impact brought by this time was simply immeasurable.

But he quickly returned to normal, his face still expressionless, and nothing could shake him.

"There's nothing wrong with this opening interface, that's it."

After confirming that something was true, he randomly found the lyrics from the Internet and copied and pasted them, and a second later, the melody of Zeyu's female voice version jumped out briskly, making people unable to find fault with it.

Then Brother Jiutian used the advanced production option again, and after a while, he came up with a crude audio of a six-second three-voice singing.

"Yes, this one went surprisingly well."

Brother Jiutian wiped a cold sweat, and a smile finally bloomed on Leng Jun's face.

Although the cracking process is very difficult, the joy of this moment is indescribable.

……

On a quiet night, an underground secret research institute in the Americas receives a mysterious document.

On the screen, you'll see a dense selection of music compositing options, and the word "xe" written on the top bar of the program.

"Yes, this file is the virtual singer software, you hurry up and crack the program and learn the artificial intelligence program inside."

An old man wearing a white hexagram, with a white beard and old spots, straightens his waist, and his eyes are bright.

He should have been lifeless, but at this moment, he was full of vitality, as if he was back at the age of twenty-five, full of hope for the future of artificial intelligence programs.

Next to him, a group of Bai Dagua programmers also responded excitedly: "Yes, director! ”

When they were excited, the system looked at them, wondering if they would implant a computer virus and blacken this secret research institute so that they could die.

[.]