Since Fang Jue handed over VR technology to the state, the senior management of China immediately began to build a large-scale military simulation system based on this set of technology.

With the server and supercomputer provided by Fang jueyu, the most troublesome financial and hardware problems have been directly solved. As long as the military people build the virtual world of the simulation system, they can put it into use.

With this system, China's military capability can be improved by leaps and bounds in a short time, and the combat literacy and practical experience of soldiers are bound to reach the top in the world.

In less than two months, this system was put into use.

Soldiers are not just two words. Only real iron men can be called these two words. In order to improve authenticity, all senses have been raised to the maximum in this system.

In other words, if a soldier is injured in the system, he will feel 80% of the real pain, and the impact on all aspects of the body can be reflected in his own body in the same proportion.

With this system, special soldiers are produced like an assembly line. They have not experienced real gunfire and war, but their actual combat experience, on-the-spot reaction and so on are almost the same as those who have experienced actual combat!

But the news leaked out!

When Tengxun announced this technology, many countries with foresight had already made psychological preparations, which affected not only the Internet market, but also the pattern of the whole world!

But they didn't expect that China's speed was so fast. If it is allowed to develop, China's military strength will definitely become the first in the world. At that time, any sun, beauty and strength will be overtaken by China one by one.

With the normal development speed of those countries, this technology may not be available in ten years. If nothing is done, China will stand on the top of the East in ten years!

A large group of countries hit it off immediately, immediately summoned domestic network talents and launched a fierce attack on China's Skynet. In any case, we must get the core data of that set of VR technology!

"Hold on, hold on!" At the headquarters of China Skynet, a large group of elites are buried in resisting the attack of that group of hackers.

"There are reinforcements!" A technician shouted.

Defending Skynet is not only a matter for soldiers, but also a matter for the whole of China. At the beginning of the creation of Skynet, the designer also developed a system. Once attacked, civil experts can also join through special channels.

More and more network experts got the news and joined the action to protect Skynet. Finally, the momentum of the attack was stabilized a little.

However, this is still just a drop in the bucket. The number of countries participating in this operation has reached more than a dozen. The other party's means are very clever. The IP addresses queried are almost all over the world. Skynet staff can't lock those countries at all.

"Xiao Yi, check it for me!" Fang jueyu's tone was cold, and he was angry.

A moment later, Xiao Yi got the answer: "host, there are a total of 12 countries, and they are all developed countries!"

"OK, these countries are very popular. What is this? The twelve nations? " Fang jueyu said with a smile, "Xiao Yi, help me kill them! Die! "

"Is the host!"

Fang jueyu opened his computer and easily joined Skynet's defense.

At this time, Skynet has many defense loopholes. While filling these loopholes, the staff also need to protect those intact areas. The manpower is becoming more and more scarce. If it goes on like this, it won't last for 20 minutes at most.

"Brothers, it's hard for you. I'll give you the rest!" A row of red words appeared in front of the computers of all Skynet staff and Chinese folk experts participating in the guard work, with a signature: CN.

"I rely on my brothers, my computer has been hacked!"

"Me too! But it seems that the other party has not done any damage. It seems that he is here to send a message! "

"Have you heard of it?"

"I don't know. With such technology, it should not be a nobody!"

"Whatever, it looks like Skynet has been saved!"

In the forum of joint protection Skynet, the pot exploded.

"Boss, someone stepped in and deprived us of our authority!"

"What? The authority inside Skynet has also been deprived? " The head of Skynet trembled. If the other party wanted to steal China's secrets, it was like looking for something!

"Can you get the permission back?"

"No, all our permissions have been lost. Skynet is no longer in our hands." It's the first time for technicians to encounter such a thing after working all their life. What kind of computation and technology can they do this?

"Boss, all the loopholes have been repaired!"

"What? So soon? "

"Yes, and the CN began to fight back! CN... China, yes! This is our country! The trough is too strong to repel the joint attack of more than a dozen countries. Is this an organization or a person? "

This group of experts can only watch CN's unilateral massacre at this time. Such data bombing and network garbage bombing disappeared without touching the firewall of Skynet.

"Ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha ha Fang jueyu watched this war with interest. He can only be a spectator in this scale of network war.

"Xiao Yi, we've had a good time. What's an old Chinese saying? Reciprocity, right? Give them some color to see! " Although these people didn't get anything, Fang jueyu won't let them go easily!

"Leave it to me!" Xiao Yi said.

At the same time, in the secret information bases of 12 countries, a large group of powerful hackers have been unable to follow. The man called cn is really terrible. He doesn't know what code he used. He actually formed an airtight protection network in front of Skynet. Their attacks are like tickling.

Batches of kidnapped broilers were paralyzed. They had to replace them again and again, but they didn't have any eggs.

"No, our system has been invaded!"

"What? How is it possible? How can the other party trace our address? "

"I don't know!"

"Hold on, we must hold on. If our information is broken, our country's data will be..."

"It's over!" A group of hackers smashed the mouse and keyboard in their hands, "our firewall has been broken through, and the other party only took three seconds..."

"What? Has been broken through? " The person in charge suddenly turned pale.

Such a scenario occurred in the information security departments of 11 other countries. The information protection network built by them was as fragile as a piece of paper under the attack of their opponents.

Countless information leaks and countless data are stolen, which is doomed to chaos in the whole world the next day