HK1580 Mysterious Hacker ! [Spring Festival wishful! 】

.

The design assessment mechanism is divided into four Grades!

Breakthrough First assessment server, requires World Third-rate standard, not only the attack aspect of the World Third-rate standard, but also the defense aspect also meets the World Third-rate standard.

If the defense aspect does not reach the level of World Third-rate, it may be countered by the assessment server, clear out the assessment server, and thus eliminated.

Accomplished the First step test, and in the evaluation server, found the Second Link Assessment Server’s Link Address, trying to invade the Second Assessment Server, at least the World Second-rate standard, the same is the offensive and defensive World Second-rate standard, Not a single aspect of World Second-rate.

The Third Assessment Server corresponds to World First-rate and World Quasi Exceed Class, and the Fourth Assessment Servers need to fully meet the World Exceed Class level before they can break into.

The Hacker who entered the Fourth Assessment Server is the truly recognized member, but it is also said to be OffiCIA l Member!

To get a Hundred-thousand US Dollar subsidy every month, you need to be aware of the Identity Information situation. Otherwise, do you really think of Shi Lei as a big head?

In the inspection mechanism, the First Assessment Server is the easiest to be broken through, but Shi Lei is currently observing a Hacker who participated in the First Round assessment.

This one Hacker currently competes with the First Assessment Server. If only from the macro analysis, Hacker’s attack and Server’s defense strategy are almost evenly matched.

But in fact, Shi Lei found an abnormal situation!

This one looks like a poorly crafted Hacker that meets the World Third-rate standard. Maybe very powerful. Because, this Hacker’s attack data, actually does not choose to bypass the assessment server’s defense strategy, but the front crack!

Not only that, this Hacker’s way of cracking is very clever, and it will hardly cause the Reporting System of the Server’s defense policy.

If it wasn’t for Shi Lei, it happened to be the existence of this Hacker. He does not know the situation of this Hacker. But now Shi Lei inadvertently discovered the invasion of the Hacker, and Shi Lei quietly observed the Hacker.

‘Hey, this technique is…’ Shi Lei flashed a familiar feeling in his mind, but Shi Lei couldn’t remember what the specific information was.

In desperation, Shi Lei continued to observe the invasion of the Hacker.

The battle between the Hacker and the First Round Assessment Server continues. If you want to use a word to describe it, it is warm boiled frog!

That’s right!

This Hacker seems to be fighting the First Round Assessment Server in a warm boiled frog!

He is a bit of a disintegration of the First Round Assessment Server’s defense strategy, which seems to be evenly matched, even faint and powerless, but all are illusions!

This Hacker shows great strength. Contained the First Round assessment server, slowly let the First Round assessment server slowly fall.

In addition, Shi Lei is set up to evaluate the information collector inside the Server, which is a small measure to collect the Hacker invasion side case and the defense plan. Also blocked by this Hacker.

Shi Lei sucked in a cold breath , in the heart

‘Damn. Who is this guy? It turned out to be so powerful! ‘Shi Lei secretly considers in the heart, the other party can actually prevent the information collector, definitely not a general, at least not the so-called World Third-rate standard!

Shi Lei did not immediately alarm the mysterious Hacker. Instead, I am ready to continue to observe and see what the purpose of this Hacker is.

Trying to mix in? It is also through the testing mechanism to track the relevant server information, thus collecting useful intelligence data.

“Izual, will check out the Hacker data of the Server through First Round. It will be displayed in ascending order according to the time of the invasion breakthrough!” Shi Lei told Izual.

“Yes, Sir!” Izual immediately put all the Hacker data that passed the First Round Assessment Server into the Virtual Transparency screen of the LIPLens-type Information Processor.

In the Virtual transparency screen, Shi Lei looked at the relevant situation. With the fastest Hacker, it only took Forty-seven seconds to break the First Round evaluation server!

Shi Lei took a look at First Place’s related information, First Round’s assessment of the Server’s information collector, and collected the Hacker’s related data.

By analyzing the data, Shi Lei’s face showed a disdainful smile. This is the fastest Hacker, not a threat. Because this Hacker does have technology, but he used the computing resources close to 3tflops to get the First Round Assessment Server in such a short period of time.

First Round’s evaluation of the Server’s computing speed is only less than 0.1tflops, and it is almost impossible to attack with nearly 30 times of resources.

This way of cracking is completely different from the Hacker that Shi Lei currently observes!

Through the time Ranked First’s Hacker, like a full-bodied orangutan, and Shi Lei currently observing the Hacker, like a wise man, interweaving inescapable net that can’t break through, stepping through the First Round assessment server step by step. It is annihilated and will not convey any news, and will not reveal his existence.

‘This guy, who is it? It has taken more than five minutes now. This mysterious guy is still fighting against the First Round Assessment Server. What exactly does he want to do? ‘Shi Lei guessed while observing.

With the invasion of Mysterious Hacker, Shi Lei gradually discovered what the Mysterious Hacker was doing. This mysterious Hacker is not only cracking the First Round assessment server, but also analyzing the defense mechanism of the First Round assessment server.

To make matters worse, this mysterious Hacker, while silently destroying the defense mechanism of First Round’s assessment server, analyzes and rebuilds the defense mechanism.

Of course, the defense mechanism that Mysterious Hacker rebuilds is definitely not the original defense mechanism, and it definitely incorporates the intrusion code belonging to Mysterious Hacker.

‘Damn guy, has it reached this level? ‘Shi Lei in the heart High Degree, paying attention to it, from this Mysterious Hacker’s situation, this guy has at least reached World Grade, even directly to the extent of World Summit Grade.

Without this level, it is impossible to conceal the information collector of the First Round Assessment Server and rebuild the defense mechanism of the First Round Assessment Server.

‘Wait for this guy to pass the First Round assessment server, when entering the Second field assessment server, it is estimated that it can be determined, how much this guy has reached! ‘Shi Lei in the heart secretly thought.

With Shi Lei quietly observing, more than three minutes passed by, the mysterious Hacker finally accomplished the First Round assessment, and in the assessment server, found the Second Site Assessment Server Link Address.

According to the assessment setting, once the Hacker who participated in the assessment left the Assessment Server of First Round, it will automatically disconnect from the First Round Assessment Server.

Mysterious Hacker knew this rule and he entered the Second Field Assessment Server without any thought.

Somewhere in the mysterious place, in Dark Shadow, a guy who can’t see the men and women, currently tapping the keyboard, even through the light of the screen, can’t see the hands of the keyboard, what it looks like, because this Hands with gloves!

“What is the situation with First Round Checking Server? Let me see this, what is the background?” The guy hiding in Shadow talks to himself, from the sound determine, it should be a Middle-aged man.

The man hidden in Shadow, exactly as stated by Shi Lei, who was observing the Mysterious Hacker, rebuilt the defense strategy of the First Round Assessment Server, and added the source belonging to him in the defense strategy, as predicted by Shi Lei. Code .

It was a tracking and positioning code, the mysterious man hidden in Shadow, trying to determine the Internal Network through First Round.

If Shi Lei is not very lucky and just discovered the situation of this Mysterious Hacker, I am afraid that this Mysterious Hacker is really likely to succeed.

After all, according to Shi Lei’s design, once the First Round Assessment Server is passed, it will return to the sequence of IWNMiwang.

The Mysterious Hacker’s intrusion was wonderful, shielding the information collector, rebuilding the defense policy, and hiding the location and tracking code in the defense policy. When the First Round Assessment Server returns to IWNMiwang, the tracking and locator will start and send the relevant information to the mysterious Hacker.

The mysterious Hacker can also know the existence of IWNMiwang, thus further investigate IWNMiwang’s data.

Fortunately, however, Shi Lei discovered this mysterious Hacker and knew that this guy had rebuilt the defense policy in the First Round Assessment Server.

Therefore, Shi Lei told Izual to thoroughly scan the First Round Assessment Server that tested Mysterious Hacker and reset it.

When the Izual implement Shi Lei’s command, the mysterious Hacker actually chuckled, “Server reset? Well, a little opinion! Looks like these assessment servers, all belong to all? Or, using Virtual Server technology? ”

Since the First Round Assessment Server has been reset, the mysterious Hacker has lost access to more data, and he can only continue to invade the Second Field Assessment Server.

Shi Lei also has more opportunities to observe this Mysterious Hacker, determine the identity of this Mysterious Hacker…

(To be continued~^~)

PS: Thank you for your support, thank you all, and wish all friends a happy harvest in the new year!