Genius remembers "→网." in one second to provide you with wonderful novels to read.
Gu Nianzhi held Huo Shaoheng's hand hard and said calmly: "Just deprogram, I will block these attacks for you. I will block you for as long as it takes."
Huo Shaoheng looked at Gu Nianzhi deeply, "Together?"
"Together!"
Gu Nianzhi put on the Bluetooth headset, greeted the staff in the central control room, and took over the command.
"All parties listen to my orders. If you continue to fight with the blue team, I will break into the external network and compete with them as a civilian hacker."
Gu Nianzhi wore a Bluetooth headset that could change his voice and quickly entered the network system.
As a series of instructions were entered into the system, Gu Nianzhi gradually saw another world, another online world composed of data and logic.
In this world, you can’t tell whether the other person is a human or a machine.
It no longer matters who issued each instruction, a human or a machine.
What matters is who these instructions serve and where they take us.
Just when the blue team was frantically attacking the Chinese Empire network and conquering one node after another, a powerful force suddenly rose quietly from their occupied area.
Gu Nianzhi first entered the third area captured by the Blue Fang. She unexpectedly discovered that in addition to the resistance forces of the cabinet and the military, there was also a hacker alliance organized by the private sector!
These people may be just ordinary programmers, students, managers, or clerks in real life, but because of their interest in the Internet, their familiarity with computers, and their love for the country, they discovered that the country's network system was affected by When there is an external attack, organize yourself to fight against the external attack!
Gu Nianzhi immediately realized their power.
Although ants are small, they are better in numbers and can attack elephants.
Gu Nianzhi had an idea in mind.
She fluttered her hands and tapped the keyboard, typing out commands one after another to make the network work for her. First she chose to confront the most arrogant Skull and Bones on the blue side!
She wanted to get the head start, and she also wanted to issue a warning!
The Skull and Bones attack is not very clever, and the repetitive mass mailing method is actually very primitive.
Gu Nianzhi quickly repelled the Skull and Bones Society's attack, and then took advantage of the victory to pursue it. He followed the opponent's attack route and cracked the Skull and Bones Society's backdoor program in one fell swoop!
Then, she released her iconic target, a round and tender pink pig with a wagging tail!
"Pink Piggy!"
"It's Pink Pig!"
"The pink pig is here!"
"Hurry up like a law!—The pink pig is here! The evil spirits are gone!"
The laughter and cheers that rang out on the Internet could be heard with your ears!
The private hacker alliance, which had been defeated by the blue team but was still unyielding, immediately paid attention to the signal released by Nianzhi and broke into the intranet system of the Skull and Bones Society.
Skull and Bones is one of the codenames used by the U.S. military's secret laboratory, just like Gu Nianzhi's "Pink Piggy."
The difference is that everyone knows that Skull and Bones is one of the code names of the U.S. military, but there is no exact information that Pink Piggy is one of the code names of the Chinese Empire's military.
It appeared briefly in the night sky half a year ago and then disappeared.
Although many people suspected that this person was an insider of the Chinese Empire's military, no one had clear evidence.
This time, the pink piggy returned to the world and still fought for the Chinese Empire, but it was fighting with the civilian hacker alliance. It seemed that it had distanced itself from the military staff and did not cooperate with each other.
In fact, Gu Nianzhi's operation is more appropriate to cooperate with the private hacker alliance.
When she appeared on the Internet, she used a civilian IP. Unless you were in the central control room, it was impossible to find out whether her IP was actually a civilian IP.
At this time, the United States has not yet broken through the central control room of the Chinese Empire, so they can only be suspicious.
When Gu Nianzhi showed off his signature "pink pig" logo, network hackers around the world went crazy!
They almost rushed to tell each other: the pink pig who had disappeared for half a year was back!
All eyes are turned to this war without gunpowder on the Chinese Empire network.
"Hackers in District 3, don't be discouraged. I'll give you a set of codes. You can launch an attack on the other party's terminal every five minutes, forcefully occupying all the other party's network bandwidth."
Gu Nianzhi used the voice-changing headset to communicate with the hacker alliance in District Three.
Gradually, more and more people joined them, whether they were hackers or not, as long as they knew how to use computers and send commands using DOS, they all joined.
There is strength in numbers. At this time, the power of the group finally appears!
When many spontaneous hackers helped attack the terminal network of the secret laboratory in the United States, Gu Nianzhi hid himself, tried to use Prolog to imitate the other party's four-line instructions and wrote a string of code, slipped in through the back door of the Skull and Bones Society, and entered the other party's intranet Waved around.
Her program is not mature, and the other party's understanding of intelligent programming is more mature than theirs.
Soon, she was discovered.
Before being detained, Gu Nianzhi calmly released his "pink pig" logo again, took a screenshot and posted it to a forum where hackers gather.
"Brothers and sisters, do you want to visit the Skull and Bones Club in the United States?" Gu Nianzhi left the other party's backdoor port and cracked password on the forum.
This news caused huge waves in the world's hacker forums.
Skull and Bones USA backdoor port and cracked password!
How many people are out there asking for money
How could he be given up so easily by "Pink Pig"!
This opportunity is so rare!
Everyone knows that now that the backdoor port and cracked password have been made public, the Skull and Bones Society will definitely change the password immediately after learning about it.
So they only have a short window of time to exploit.
So without saying a word, everyone launched a general attack on the terminal of the US Military Skull and Bones Society!
The scale and quality of this attack cannot be compared to the civilian hacker alliance in the third district of the Chinese Empire.
The United States attacks other countries' network systems all the time and looks for vulnerabilities in other countries' networks. In the same way, other countries are also very interested in the network systems and vulnerabilities of the United States.
This rivalry never stops.
When staff at a secret U.S. military laboratory discovered that their network was suddenly congested and it was difficult to send even a simple command, they realized something was wrong.
"The pink piggy appears again?!"
"Are you really in the Chinese Empire?!"
"I said last time that the pink piggy should be an insider of the Chinese Empire. You still don't believe it?! You don't want to see who gets the biggest benefit!"
"It is true that this pink pig is an insider of the Chinese Empire, but the question is whether he is a member of the government, the military, or a civilian. This is the key."
"What's the matter? If they are civilians, do you still want to recruit them?"
"Of course." The person in charge of the U.S. military's secret laboratory looked arrogant. "I'm not targeting anyone, but compared to Pink Piggy, everyone here is rubbish!"
Everyone looked at their leader with a confused expression.
Have you ever said that about your subordinates? !
"FXXK! I can't bear it!"
"Fight him!"
These stimulated military laboratory workers once again devoted themselves to the crazy attack on the Chinese Empire.
But this time, Gu Nianzhi had bought precious time for Huo Shaoheng.
Huo Shaoheng finally cut off the logical link of the four lines of instructions, turning it from an intelligent program that can perform logical analysis and secondary programming on its own, into an ordinary source code.
Stripping away the intelligent system of this program, you can see what the source code behind it is actually doing.
Huo Shaoheng browsed the source code nervously, and at the same time, based on the source code, he searched the system for what these four instructions had done, hidden data, and misleading directions.
Gu Nianzhi had already returned from visiting all 27 districts of the Chinese Empire.
After learning about the situations in which districts were attacked or even captured by blue dots, Gu Nianzhi had an idea.
Her slender fingers were flying like butterfly wings, and she quickly typed out instructions one after another. Starting from area one, she set up obstacles for the invading blue dots.
Erasing them one by one, erasing the traces they left without hesitation, just like her Devourer.exe, every intruder can only be used to increase her appetite!
What doesn't defeat me will only make me stronger!
…
The secret laboratory on the other side of the ocean had just changed the backdoor port and restart password of the Skull and Bones Society, and then repelled the first wave of cyber attacks.
But soon, they discovered that after the first wave of blows, they faced a second wave of blows that was even heavier!
"Report! We have serious data loss!"
"Report! A devouring program has appeared in the first area of the Chinese Empire!"
"Report! Request evacuation!"
"Report! Request evacuation!"
"If we don't withdraw now, we won't be able to get the information we have!"
The person in charge of the U.S. military's secret laboratory kicked the computer desk hard, "FXXK! Pull-back! Pull-back!"
Just when the US military was retreating, Gu Nianzhi packaged a Troy.exe, disguised it with a smart program, and put it into the information data collected by the blue team's retreating people.
This small program was called a Trojan horse program, and it was just a small virus program that Gu Nianzhi randomly grabbed from the Internet.
It is not very useful. It will only destroy the data that the US military seized from the Chinese Empire's network this time and erase all the other party's hard drive data!
An hour later, the frantic cyberattack finally stopped.
In the central control room at the headquarters of the Special Operations Division, the staff did not dare to take it lightly. They still stared nervously at their own territory and constantly used software to scan the network, fearing that there were "ticking time bombs" left by the other party.
Gu Nianzhi believes that the best defense is offense, so her strategy perfectly implements this principle.
When you raise your butcher knife to others, you also expose your fatal heart.
In the secret laboratory of the U.S. military, laboratory workers wearing white coats outside military uniforms wiped their sweat with paper towels and said with lingering fear: "Fortunately, we evacuated early. We have gained a lot this time. - Come, let's Take a look at the most mysterious intranet system of the Chinese Empire!"
※※※※※※※※※※※※※※※※※※※※※
This is the third update. Three updates today.
Remind everyone of your monthly tickets and recommended tickets!
Hey guys! Mobile phone users please visit m.read for a better reading experience.