Two Dimensional Journey

Vol 2 Chapter 1277: , The mysterious code!

And it was the short and fat white man who typed four times on the keyboard to steal the highest authority of the "Prophet" supercomputer, and used hackers to control a large number of other small and medium supercomputers, and the number was in the tens of thousands. After the advanced computer listed. wap.wuxiaspot.com

On his computer screen, there was also a glare of red.

"Warning, warning, the last defense is broken 80. It is on the verge of collapse. Once again warned, on the verge of collapse..." The dazzling alarm sounded at the same time, notifying the opponent that Zhang Xiang was about to destroy all of his The trap directly attacked his computer.

However, at this moment, a smile appeared on the face of the short, fat white man.

"That's right, it's this time, that's the time that I can smash you into the abyss in one fell swoop when you are happiest!" The short, fat white man's face showed an expression of extreme excitement, even A blush appeared on his cheeks.

If he didn’t know, he thought he saw a beautiful woman

But in fact, this is not the case.

"Everyone has organized the resources of the other three supercomputers." The short, fat white man stood up and scanned the surroundings, holding the small pistol tightly in his hand.

That was when he knocked down the man in black suit, he touched it easily from the opponent.

But at this time, it is playing a very important role.

Looking at the dazzling pistol, everyone nodded hurriedly even if they didn't want to.

"That's good, all the computer resource control authority is transferred to my computer. I want to gather it into a huge data torrent, and I will crush the other party to pieces at once!" Hate gleamed in the eyes of the chunky white man.

However, there are still guys who are not afraid of death, and they are speaking again.

"However, in this case, the load will be too heavy. If there is any accident, not only our side, but all the computers connected to the line, as well as the network there, may completely crash..." A very enchanting blond woman with a bulging front and back curls couldn't help but said.

However, what responded to her was a gunshot and a crater appeared on the wall beside her.

"I said, so what? Don’t let me say it a third time! Don’t let you slept with me a few times, just thinking you can do whatever you want. If wap.wuxiaspot.com has another time, it will be tricked. It's your proud tit!" said the short, fat white man with a grimace.

And looking at that crazy scene, what else dare you say? Can only do what he said.

And the woman who looked very enchanting was also pale, and her body slowly limped to the ground, and she said in horror: "Yes...".

The smell of urine was also permeating the scene.

And just when all the resources were gathered on the computer in front of the short and fat white man, it was also when Zhang Xiang made a charge of energy and threw such a punch.

As Zhang Xiang slowly touched the wall of the broken library with a fist, a series of chain reactions began to take place.

The wall that was originally extremely hard, as if encountering some unstoppable energy corrosion, turned out to slowly disappear like fly ash.

And, spreading towards the entire library area.

"Alarms, alarms, the last defense have been broken, alarms..." A series of alarms sounded, and the dazzling red letters almost occupied everything on the big screen.

However, at this moment, the excitement on the face of the short, fat white man reached its peak.

He took out a silver-white USB flash drive that could only be constructed by alien technology.

That was something he got accidentally during a meteor shower not long ago.

In his research, there is a mysterious code from an unknown alien force in it.

And the core of that piece of code is only one, that is, to swallow enough data resources to evolve itself, and then swallow all powerful data streams cleanly.

As for the deeper things, he hasn't researched it yet.

However, it does not matter.

Except for the data flow in the network, which one is the most powerful?

Undoubtedly, there is only Zhang Xiang's share.

Therefore, in the next moment, he hesitated for less than ten and one second, and then inserted the silver-white U disk.

On the computer's page, a completely dark page appeared immediately, with only certain words.

"Come on, come on, my baby, crush the opponent, crush the opponent into pieces, and attack, storm torrent!" The short, fat white man slammed on the button of the offensive program.

However, what the short, fat white man didn't see was that a dark light flickered from the USB flash drive and fell into the computer.

In the next instant, countless data torrents converged from those four supercomputers, from dozens of small and medium-sized supercomputers controlled by the "Prophet" supercomputer, and tens of thousands of advanced computers.

A torrent of data swept across the screens of those computers.

At the same time, the CPU occupancy rate of all computers, as well as the usage of memory resources, suddenly soared to nearly 98. The case began to generate a lot of heat, and the temperature of the CPU soared to nearly 100 degrees.

But fortunately, whether it is a supercomputer or a controlled computer, it is a valuable existence, and the cooling equipment equipped is extremely luxurious.

When detecting the temperature surge, it also automatically speeds up the cooling.

However, in the face of the continuous high-intensity calculations, even some advanced computers have begun to surpass what the cooling device can afford, and some relatively junk computers have begun to smoke.

Even for the four supercomputers, the temperature soared to nearly two hundred degrees.

When the dozens of large cooling devices were turned on at the same time, and a large amount of coolant was poured into the super-hot place, it was considered normal.

But the effect of such a crazy call to the data stream is beyond imagination.

"Oh my god, how can we gather so many data streams."

"Yes, if we use this data stream to attack any developing country, I am afraid that its network will be paralyzed..."

"Yeah, with such a strong power, even if you don't use technology, direct attack is the most powerful attack... No matter how good the technology is, it can't resist such hard power..."

Everyone in the room looked at the huge data stream gathered, their faces couldn't help showing shock.

Even though they have experienced several large-scale confrontations between countries, they have never seen such a powerful data stream attack.

Because, if such a big data flow offensive were really gathered, the damage and impact would be beyond imagination.

At that time, I am afraid it will cause a real national war in reality.

Thinking of this, everyone present couldn't help but shudder.

‘But, fortunately, all he has to deal with now is just one person. Otherwise...’ Everyone is thinking comfortingly.

However, looking at the huge data flood, some people present were gloating.

"I don't know which country is so unlucky, it will become the place where this crushed data flow has hit," some people murmured in a gleeful voice.

Because, even this huge network resource did not attack any country.

However, just where such a huge data stream passes will put a huge burden on the country's network.

At least, the passage of such data flow will cause major network congestion.

If the attacked opponent has the ability to counterattack, the aftermath caused will also cause considerable damage to that country's network.

Of course, the extent of the damage depends on the strength of the counterattack.

'However, no matter who it is, unless the power of a country is gathered, it is impossible to counterattack for a moment, right? No, even if the power of a country is gathered, it is impossible to block it for a moment. Things, let alone being alone, I'm really crazy, how could I think that the other party would have the ability to fight back? ! ’

The programmer who thought of this couldn't help but shook his head mockingly.

However, he did not expect that in this world, he really has the existence of personal ability to fight against the country!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like