HacKer

Chapter 1586: arrogant announcement!

It is not a charity organization, it is a hacker organization, a powerful hacker organization with three world-class hackers!

Such a powerful hacker organization obviously cannot accept members casually, even if it is a peripheral member, it is not easy to get approval. ;

The four assessment tests designed by Shi Lei are only to judge the ability and identity of the test hackers, and then select some hackers and invite the joined peripheral organizations.

"What about foreign countries?" Shi Lei actually pays more attention to foreign situations. Relatively speaking, foreign hackers are more likely to have free and powerful hackers.

There are too many restrictions in the domestic circle. Whether it is hacker-related knowledge or the overall environment, the restrictions are too much. Under such circumstances, it is difficult for a lone ranger to reach the high-end level.

Tao Wenxian looks at Raphael, "Raphael, let's talk!"

For hackers in overseas regions, Rafael knows more than Tao Wenxian, and Rafael has not deduced, but elaborated.

"Overseas conditions are similar to those of Xiaguo as a whole. In particular, some hacker circles in poverty-stricken areas have chosen to join our tests and have tried their best to demonstrate their strength during the testing process. As for the developed regions. There are fewer hackers participating in the test, and basically no hackers who have participated in hacking organizations are testing." Rafael describes the situation in overseas regions.

Shi Lei thought about it in his mind. This field recruited members of peripheral organizations for testing. Not only will it bring some powerful helpers, but it will also attract some enemies with ulterior motives.

Therefore, Shi Lei needs careful judgment. What members should be recruited so as not to be a snake bite?

"Jie Shier, show the results of the current test!" Shi Lei commanded.

Now that it is two o'clock in the morning, the test system has collected a lot of information.

"yes, private r!" Yi Zhuer responded to Shi Lei, the data of the test results. They were sent to Shi Lei and Rafael and Tao Wenxian.

Inside the virtual transparent screen of the lip lens information processor, Shi Lei looks at the relevant information.

Currently, the number of hackers who passed the first assessment server. There are 2,783 people; only 424 people passed the second evaluation server; as for the number of servers passing the third evaluation server, only 39 people!

The difficulty of the fourth assessment server is mainly aimed at the world's super-class hackers, and the number of people currently passing through is quite large. There are 30 full!

Instead, Thomson David, who has the world's best strength. Due to the special attention of Shi Lei, he was greeted with the ‘thick love’, and he is still struggling with the fourth assessment server.

The information on the statistics of the clothes is not such simple data information, but more detailed classification information.

For example, through the 2783 world-class third-rate hackers in the first appraisal server, the shackles carried out a detailed classification of tree shrews.

The first-level classification is divided into three categories, ‘known identity’, ‘unknown identity’, and ‘clone identity’. The three categories have the same meaning as the literal meaning, the last ‘clue identity’ classification. Indicates that some identity clues have been obtained but cannot be finalized.

The so-called 'known identity'. Instead of knowing the real identity, I acquired the vest identity in the network.

The secondary classification is based on the category of 'known identity' and is divided into three categories: 'owning organization', 'free independence', and 'unable to judge'.

Although Yizhe analyzed most of the hacker identity information, Shi Lei does not only choose the peripheral members of the 'free independence' classification, but also select some members among the 'owning organization' and 'unable to judge'. .

This choice can effectively avoid some unnecessary disputes.

Every hacker member of the 'known identity' category lists all the relevant information, including Internet vest information, related hacker information, organization information, etc., including some gossip. The quilt was listed.

Shi Lei didn't have time to view the information of more than 2,000 hackers through the first and second tests. He directly looked through the third and fourth tests, a total of 39 hackers.

Most of these thirty-nine hackers are Shi Lei’s old acquaintances!

The ten core layers of the hacker alliance all passed the third assessment. As for the fourth assessment, only the black knife, the black magic, the black hand and the black ghost passed.

The other six core layers, especially the black tiger ranked second in the league, failed to pass the fourth assessment. This makes the black tiger feel quite lost face.

After all, the sixth, seventh, and eighth all passed the fourth assessment, and the second black tiger did not pass, so that the black tiger felt the status of the crisis.

The black tiger's offensive and defensive strength is severely offensive. On the attack side, the black tiger even surpasses the world's superb; but on the defensive side, the black tiger is almost only the world's third-rate level. The Black Tiger is able to pass the third test server, and in fact has already been a strong blessing for attack. Otherwise, the black tiger could not pass the third test!

The five core layers of the Dark Night Dynasty surpassed the hacker alliance in terms of personal strength, and all passed the fourth assessment. The remaining 24 hackers are all hackers from overseas.

Four of the hackers caused Shi Lei's high attention!

The first one is inuyasha, this is the name of an anime character, translated into Xia Guoyu is ‘Inuyasha’. Shi Lei has some understanding of the true identity of this hacker.

Inuyasha is a hacker in the Wasang State, but not an official security expert in the Wasang State, nor a hacker in the Wosang State hacking community, but a bounty hacker. A bounty hacker chasing money.

It is rumored that the true identity of inuyasha is the hybrid of Xia Guo and Wozang. Although he lives in Wozang, he does not agree with Wozang. So the choice became a bounty hacker.

These are not the key points, the point is that the strength of inuyasha is very strong, reaching a world-class level!

Such a powerful hacker, if it becomes a peripheral member, will greatly enhance the power!

The second hacker who is highly concerned by Shi Lei is also very famous. Even there has been a very unpleasant contradiction with the Mi Rui Technology Group.

The hacker’s vest in the hacker world is called the dead!

A powerful hacker who revealed the horror of the vest name also reached a world-class level, and even looming signs of breakthrough to the peak.

The strength of the deceased. More than inuyasha, it is possible to become the world's peak hacker in a short time!

Shi Lei did not mind that the deceased had once confronted the Mi Rui Technology Group and tried to invade the world of the brave. The rules of the bounty hacker are quite clear. Just paying for money. Nothing else, no personal grievances.

However, whether it is inuyasha or the dead, if only become a peripheral member, Shi Lei will not ask too much. But if they want to be a full member, they must leave the industry of bounty hackers.

There are also two hackers who are highly concerned by Shi Lei, and they are also bounty hackers. They are batman and Lord Dark. These two bounty hackers are also embarrassing characters, both of whom are quasi-world-class players. Exceeding the world's superb level, only half a step away from the world class!

Shi Lei sighed. It seems that with the progress of the times, computer hardware is becoming more and more advanced, computing performance is getting stronger and stronger, and the industry of bounty hackers is becoming more and more difficult to mix.

Otherwise, how can these bounty hackers take the test of getting together?

The business of bounty hackers is indeed getting worse. Simple tasks, low bids, and a large number of low-end hackers rush to deal with.

High-end missions, the amount of rewards is indeed very high, but the task is usually difficult to complete, and it is even possible to steal chickens without eclipsing the rice, and the bounty hackers' own high-level broilers, even supercomputer broilers, are also lost.

In such a situation, the bounty hacker only knows bad luck!

‘Four super bounty hackers? ‘Shi Lei secretly thought about how to treat them. It is an absolute thing to accept these four people as members of the peripheral organization.

Even Shi Lei can give him a bonus of $100,000 a month to serve these guys without their real identity.

The real question that Shi Lei really thinks is whether or not to test the four guys and get their true identity over, so that the mark is completely marked.

On the other hand, Thomson David was finally provoked by the clothes, and Thomson David slammed the keyboard, angry loudly: "Fuck! Deception! Cheating! This is deceiving everyone, the first The four assessment servers simply could not pass!"

Thomson David did not pass the fourth test server, even if he had already called 110tflops of intensive distributed computing resources, he could not break the defense of the fourth test server.

When Thomson David controlled 80tflops of intensive distributed computing resources, he felt that by adding a little bit of computing resources to attack the data stream, he could completely break the blockade of the fourth evaluation server.

With this in mind, Thomson David added a supercomputer with a computing speed of only 5tflops. Although 5tflops of computing resources are not many, according to Thomson David's speculation, 5tflops of computing resources is enough to affect the battle.

While Thomson David is ready to celebrate the victory, the defense system of the fourth assessment server has temporarily increased its strength.

Of course, Shi Lei authorized the clothing, and ordered the squad to call more iwn secret resources for defense.

The first time this happened, Thomson David thought he had guessed the error, so he invested in a supercomputer with a speed of 15tflops.

Continuously invested 20tflops of computing resources, so that Thomson David thought it would finally be successful, but the defense of the fourth test server is still solid.

And Thomson David clearly discovered that the computing resources of the fourth assessment server increased to 300tflops. The angry Thomson David can only reconnect to a supercomputer with a speed of 10tflops for the final stroke.

However, Thomson David once again found the fourth assessment server, controlling the computing resources to 350tflops, and suppressing his offense.

Thomson David finally couldn't stand it, and issued an angry and arrogant announcement on the major public websites of the Li Jianguo hacker community!

(To be continued, please search for astronomical literature, the novel is better updated faster!

Ps: Still 3500+ conscience!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like