Chapter 160: Invasion

The base of Yang Zhihang on the seventh floor of the space prison.

Zhang Hong, as usual, stayed in his room, fiddling with the computer in front of him. At this time, she seemed a little bored, and she didn't know what to do while holding the mouse.

Zhang Hong, he casually threw the mouse aside and said: "It's really a product of the 22nd century, this kind of mouse is too low-level, right?" Give me a control cloud. Get things done in minutes. ”

Just then, an anonymous email arrived.

Zhang Hong, seeing this happening, first launched an application, and then slowly opened the email.

It reads as follows.

Hello, Zhang Hong.

First of all, don't be nervous, this is not a viral email, it's just a letter sent to you. Of course, even if it's a virus, you'll have enough power to destroy it.

Don't you care who I am? You should know in your heart that there should be many people looking for you. For you, you can't imagine how many people in this world are watching your every move. Space Prison: This place is not a haven for you to shelter. The information you stole from the United Nations, we must take it back.

You are smart and know to hide the information you get in the game of Space Prison. And the app does it all, and it's all in your hands.

Of course, we don't know if we can get the complete information if we get the application and clear all the games in the space prison?

But there's one thing I can tell you right now. What you ended up leaving this piece of information on Earth, we've cracked. On the surface, it is an application that involves large and small information and content, but in reality, it is a password safe that hides the United Nations information you have stolen. The app may seem small, but it's actually a lot of what's inside.

It's a trap you've set. But we've removed the trap. You divide the information you steal into two parts, one part of which is integrated into the real-life network. And to get this part of the content, it's on the app you left behind. It's just a key.

However, it is such a key, and it is still open, and the key to the other part of the content lies.

I don't know if it's a deliberate act in your world, or if you've already had a plan. You spread this part of the game to the Space Prison game ahead of time. And force our personnel to decrypt the game of space prison.

But it's just a small thing for us.

In the space prison game, which is transmitted by our agents, we have set up a comprehensive decipherment of the inside of the space prison on Earth. But I never thought that as long as we unravel the content of these two parts, we will be able to obtain complete information.

But the password for your application of the 24th-order magic cube is really a bit of a headache for us.

We've even used the power of military-grade computers to decipher your code in real time. According to preliminary information, it would take a full decade to decipher your password at the speed of computing the cloud alone.

Ten years, that's enough time to make the information you stole useless.

So after thinking about it, we still have to find you.

After all, you must still know this string of passwords.

Of course, it's not just us, I'm sure other countries are doing the same.

Don't worry, we'll come to you.

Zhang Hong deleted the information directly after reading it.

Zhang Hong, staring at the ceiling, smirked: "It's up to you, it's up to you people, come with the ability!" I'll see how capable you are. ”

Zhang Hong was silent for a while, and then thought again: This is also a kind reminder to me from that group of people. The password of my 24th-order magic cube is an extremely powerful algorithm. He disagrees that the Magic Quadrant has a fixed cracking mode. The cracking program of the magic cube changes over time, once it enters the cracked program, it must be cracked according to the special cracking method of the magic cube, if there is any mistake on the way, then it will start all over again, and the path of cracking will change.

What's more, this is the twenty-fourth-order magic cube. It takes 24 steps to completely decipher.

Zhang Hong, thinking of this, suddenly frowned, he lay in front of the computer, and said helplessly: "What if I am really caught by them and force me to say the password?" Forget it, let's talk about it then! ”

Zhang Hong, who was in a daze for a while, decided to start strengthening the construction of his computer matrix. As long as his computer matrix is stronger, the longer the opponent will want to break through. It also provides time for you to transfer your own secure data.

Suddenly, at this time, his computer showed that a network attack and defense system he had established had been breached. It was Stephen Chu who did it.

Zhang Hong, when he saw the news, couldn't help but nodded: This network attack and defense system is based on Yang Zhihang's original self-built network system.

Zhang Hong, after thinking of a code, sent a message to the past: Yes, this system has been broken for you, so it is estimated that you will not be far from breaking the network system of Yang Zhihang's organization.

Soon, on the other end of the network, Stephen Zhu, came with news: Haven't you been in charge of the network system they organized? The strength should be high, right? How so?

Zhang Hong explained in no uncertain terms: The network system of this organization was established by me at random. Even if you break through, you won't get anything very important. And I control the network system composed of this computer, which is probably the most robust network system in the space prison except for the computing cloud. Add to this the calculations, the use in space prisons, there will be some limitations.

My network matrix can basically be said to be invincible. After you have broken through the network system organized by Yang Zhihang, you can try my computer matrix.

Stephen Chu: Okay! I don't know why, you don't cover your computer matrix with Yang Zhihang's network system.

Zhang Hong: There are some things of my own in this. In addition, if my computer matrix is expanded to protect the network system organized by Yang Zhihang, then I will inevitably upgrade it to adapt to a network system that is beginning to take shape. It will undoubtedly waste more of my experience and time.

Stephen Chu: I see! Oh well, I'll try your computer matrix next.

Zhang Hong: Okay.

The code is canceled and the program is closed.

At this time, it was inside Liu Junhe's organization on the sixth floor of the space prison.

Liu Junhe was nervously looking at the computer screen. The two of them are starting the implementation of the computing cloud simulation central server.

However, in the corner of the room, Stephen Chu was tied to the ground. Wu Haidong sat on top of it, looking up at the hologram floating in the air. Looking at Stephen Zhu's appearance, it seems that he has fainted.

Liu Junhe said about these data: "Are you going to try to break his computer matrix? ”

Zhao Xiaoqin turned her face sideways and said happily: "This Zhang Hong is indeed very smart. He knew that computing clouds would have some limitations in the space prison. But we carry this virtual central server. can help us remove this limitation. ”

At the same time, Qing Tianle also explained: "When we confronted the Johnson brothers at the network level yesterday, we found that they seemed to take a different approach than us. We are carrying a virtual central server. And they are using a military upgrade program that uses a computing cloud. The overall computing cloud specs are higher than ours. But their speed is still limited. It seemed that they wanted to suppress Zhang Hong's computer matrix at the program level.

Now for us and the Johnson brothers, it's a matter of who can crack his computer matrix the fastest. Hopefully we can get what we want from his database. Even if we don't have a final password, we can still lock his location in this way, so as to carry out the final capture. ”

Liu Junhe nodded: "Then you two will have to work hard." If this is the case, then we can avoid causing a large-scale conflict. ”

Qing Tianle was busy with the work in hand, and said: "Of course, although these people are criminals, they are also individuals. Nor can we let more people die unexplained because of our actions. For us at the moment, if we take action as soon as possible and get what we want. Finally, you can rely on your organization to provide us with shelter, so that we can directly drag the arrival of the transport ship at the end of February. ”

Finally, the next step is to start the intense network attack and defense.

Zhang Hong clearly felt that his computer network matrix was being invaded. He boots up ten computers at the same time to deal with attacks from unknowns.

Lyra, by establishing a virtual central server to improve the speed of operation in network attack and defense.

With the upgraded computing cloud, the Johnson brothers decomposed the computer matrix.

Zhao Xiaoqin said excitedly: "The invasion was successful. The matrix model was broken by our computing speed. It's a matter of time before it is breached. ”

In addition to this, in the seventh layer of Li Jialin's organization. Brother Johnson gave a sudden high-five. Big Johnson clenched his fists tightly and said with an excited face: "Sure enough, it is easy for the upgraded calculation to break through his so-called computer matrix." ”

Little Johnson couldn't stop clapping his hands: "Our work will be easier next." ”

Two computing clouds, in different locations but doing the same thing, begin the final chime.

Johnson Brothers: 8.65%

Lyra Combo: 9.76%

…………

Johnson Brothers: 43.99%

Lyra Combination: 49.50%

………

Johnson Brothers: 87.91%

Lyra Combo: 90.66%

………

Just when the eyes of both sides were watching the progress of the first percent of the computer. Suddenly, the progress bar stopped moving. Frozen in place. Soon, a message appeared.

The target network is gone!

Tianqin's eyes couldn't help but widen when she saw this, and Zhao Xiaoqin said in disbelief: "What is the situation? The target network is gone! What did that guy Zhang Hong do? ”

The Johnson brothers were originally happily waiting, but the final result, the appearance of this scene, made them slap the table: "Why, what is this?" The target network disappears, does its matrix still have hidden software? ”

Suddenly, the invading parties saw what was displayed on the computing cloud and immediately came to their senses.

They said almost in unison, "That guy has upgraded the matrix system." The way the matrix model is composed has also been reset! ”