Reborn Ace Hack
Chapter 722 Xiao Yuan's Statement
"Professor." The researcher who came to ask Smith to answer the phone was also very excited, but he still did not forget the purpose of coming to Smith. He stood behind Smith and called him in a low voice again.
"Wait a little longer." When the researcher reminded him, Smith delayed answering the phone again because he really wanted to know the next development and naturally refused to leave easily.
The researcher had no choice but to turn around and leave first.
Smith stared at the big screen. At this moment, the blue color on it had begun to change. Centered on the Xuannie server that had just turned from blue to red, the originally pure blue area began to flash some black spots. The black spots represented the corresponding sampling nodes (
Some specific computers or servers) have no information feedback. After flashing blue and black for a while, some green spots begin to appear, and these spots are gradually increasing.
This situation makes Smith excited. Green means that the laboratory's chaos system server can get feedback information from the corresponding sampling nodes, and there are no longer those random broadcast packets with blue codes in this information, which means that these sampling nodes are no longer
Infected by code blue, all the code blue removal tools launched by anti-virus software companies around the world lost their function after ji issued the first announcement, so this situation has never happened again.
The situation is still changing. There are more and more green spots, gradually connecting into patches, and the area is getting larger and larger, squeezing the living space of the blue code step by step. This situation seems to be similar to innovative experiments.
The memory battle game often played in the office is very similar, except that the battlefield of the memory battle is the memory unit, and now the battlefield has been infinitely magnified to all connected computers in the world. The meaning of the memory battle is to learn from each other and communicate with each other, and at this time and Blue
The fight for the code touches the world's cyber security.
"Great!" Smith was undoubtedly very excited at this moment. He couldn't help shouting "good" again. Other employees in the laboratory also seemed very excited. The original dull atmosphere was swept away and replaced by
Tension and anticipation.
However, things did not go as smoothly as they expected. The green domain continued to expand to a certain extent. The blue code area and the edge of the green domain flashed violently, but the progress gradually slowed down and finally stopped.
.
"Professor, come and see." Smith was paying close attention to the big screen, feeling anxious about the current stalemate, when a researcher called him, and he turned to look at the Chinese researcher, "What's the matter?"
"Xiao Yuan issued a statement in the Xuannie community." the researcher said.
"Let me take a look at the statement issued by Xiao Yuan!" Smith was greatly surprised when he heard the words. He quickly walked over and approached the computer screen. At this moment, the page displayed on the computer in front of the institute was the public section of the Chinese Honker Alliance. Ji published
All announcements also exist in this section.
"Important announcement about blue code and hacker ji - Xiao Yuan (feonix)." The title is very straightforward, but because of the blue code in the title, ji attracted a large number of people to click, and it was written directly on the title
The signature also attracted the attention of many people. You must know that the news that ji is Xiao Yuan is still spreading crazily on the Internet.
I am Xiao Yuan (online ID: feonix), one of the founders of Xuan Nie Company and Xuan Nie Community, the developer of Xuan Nie Firewall, and one of the main maintainers of the Linux development version feonix. I am now concerned about the vicious worm Blue circulating on the Internet.
The code and hackers used the ID (ji) I used to carry out crazy damage, which seriously threatened the network security of the world and destroyed my reputation. I hereby declare as follows:
1. Currently, the code name ji is used on the Internet, with the help of blue code, to threaten global Internet security. The actual code name of the hacker in the Artificial Intelligence Laboratory of Jiangzhou University is n. Ji is a special ID that I used once in a special situation.
I was informed by n during online communication and was used by her falsely. I am very dissatisfied with her approach of maliciously threatening network security and causing wanton destruction to achieve her own goals, and I firmly oppose it.
2. The Artificial Intelligence Laboratory of Jiangzhou University does not have the artificial intelligence algorithm n mentioned. The reason why she did this is because the Artificial Intelligence Laboratory of Jiangzhou University was founded by my mother. I accidentally offended her, so she used a
Planting something that didn't exist to force my mother into a desperate situation was just to take revenge on me.
3. The reason why it took so long for me to publish this statement after the emergence of Code Blue is because all my energy was previously focused on deciphering and researching Code Blue. Now I have researched how to effectively restrain Code Blue.
method, the success rate is 50%. We are currently in a tug-of-war with n, and the success rate of defeating it is 50%.
4. Code Blue has very powerful parallel computing capabilities. It will automatically divide all areas infected with Code Blue into logical blocks, thereby forming an unimaginable computing cluster around the world. The computing power it currently possesses is far beyond
Beyond me, this situation is very unfavorable to me. I also need to form a subordinate
I want to use my computing cluster to obtain more computing resources. Therefore, after I help you clear the blue code from the computer, I will temporarily implant a new computing process n in it. This process will help me complete the computing resources.
The integration is used to fight n. Please don’t panic and fight side by side with me.
5. The calculation process n will be automatically deleted after I completely clear the blue code. Please do not delete it yourself, otherwise it will have serious consequences. Please forgive me for this behavior, because human selfishness is an original sin, and I cannot let this happen.
This original sin affects my battle and affects the network security of the world, so I have no choice but to do it. I want everyone to guarantee that after the blue code is cleared, the processes implanted in everyone's computers will be completely deleted.
Finally, thank you all for your cooperation, and please pray for me, hoping that I can completely defeat n and give everyone a normal and healthy network environment - Xiao Yuan.
The entire statement was written in both Chinese and English. After reading it, Smith frowned slightly and felt that the writing and wording of this article did not resemble Xiao Yuan's style because he had seen some of Xiao Yuan's writings before.
The overall writing style is somewhat different from this statement.
"Is there another person who impersonated Xiao Yuan's name?" Smith couldn't help but have such a thought in his mind, but he was not sure, and at the same time he felt powerless, because no matter whether the person who made this statement was Xiao Yuan or not, he
Outsiders can only watch the battle between N and N, and other people can't do anything besides keeping their computer on and not going offline casually. Moreover, with N's previous experience of using blue code to threaten, this person can now
The outcome of the battle with n is half the battle, and it is estimated that not many people would dare to ignore his threat.
"Whether this guy is Xiao Yuan or not, I hope he can really clear out the blue code and keep his promise to delete the computing process he implanted. Otherwise, the wolf will really be driven away and the tiger will come again."
, it is ordinary users and the health of the entire computer network that will suffer in the end." Smith thought.
At this moment, Smith suddenly heard a noise from the researchers in the room, and at the same time someone asked him to look at the big screen. He raised his head and wanted to look at the big screen, and found that the stalemate on the big screen began to change drastically again.
, this change made him change his face.
You'll Also Like
-
Planting a sacred tree from Douluo
Chapter 254 7 hours ago -
Douluo: Tang San took me to the Wuhun Palace
Chapter 130 7 hours ago -
Be the boss of the heavens from the world of Ke Xue
Chapter 182 7 hours ago -
Dou Po: I, Young Master Taixu Ancient Dragon
Chapter 190 7 hours ago -
Dou Po: Xuan Emperor Xiao Xuan
Chapter 305 7 hours ago -
Starting from Konoha heavy gold to seek a son to revive Uchiha
Chapter 113 7 hours ago -
Douluo: A Peerless Man, A Fake God
Chapter 146 7 hours ago -
My kaleidoscope pupil technique is dark blue with dots
Chapter 235 7 hours ago -
I of Douluo made up the future video
Chapter 501 7 hours ago -
Predator Reborn
Chapter 1066 7 hours ago