HK1586 arrogant announcement!

.

It’s not a charity organization, it’s a Hacker Organization, a powerful Hacker Organization with three World Summit Grade Hackers!

Such a powerful Hacker Organization, it is obviously impossible to accept members casually, even if it is a Peripheral Member, it is not easy to get approval.

The four assessment tests designed by Shi Lei are only for determining the ability and identity of the Hacker, and then screening some Hacker and inviting to join the peripheral organization.

“What about foreign countries?” Shi Lei is actually more concerned about foreign situations. Relatively speaking, the foreign Hacker circle is more prone to Freedom and the powerful Hacker.

The domestic circle is too much restrictive. Whether it is Hacker-related knowledge or the overall environment, the restrictions are too much. In this case, the Lone Ranger Hacker is difficult to achieve high-end Gradation.

Tao Wenxian looked towards Raphael, “Raphael, let’s talk!”

For Hacker in overseas regions, Raphael knows a little better than Tao Wenxian, and Raphael has no deduction, but a detailed explanation.

“Overseas conditions are similar to Xia Nation as a whole. Especially in some poor areas, the Hacker circle, who is a bit strong, has chosen to join our test, and in the testing process, do their best to show their strength. As for the developed regions There are fewer Hackers participating in the test, and basically no Hacker, conduct test that has participated in the Hacker Organization.” Raphael explains the situation in overseas regions.

Shi Lei thought about it in his mind. This test of the Peripheral Organization Member will not only bring some powerful helpers, but also attract some enemies with ulterior motives.

Therefore, Shi Lei needs careful determine, what members should be recruited. In order to avoid the snake, it is not a snake bite.

“Izual, show the results of the current test!” Shi Lei commanded.

Now that it is two o’clock in the morning, the test system has collected a lot of information data.

“Yes, Sir!” Izual responded to Shi Lei and will test the data of the results. They were sent to Shi Lei and Raphael and Tao Wenxian respectively.

In the Virtual transparency screen of the LIPLens-type Information Processor, Shi Lei looks at the related information.

At present, there are 2783 people who have passed the First Round to evaluate the number of Hackers of the Server; only 424 people who have passed the Second field to evaluate the Server; as for the number of Servers that are evaluated through the Third Field, there are only 39 people!

The difficulty of the Fourth Field Assessment Server is mainly for the Hacker of the World Exceed Class standard, and the number of people currently passing is quite large. There are 30!

On the contrary, David Thomson, who has the strength of World Summit Grade, was met by Shi Lei and was met with Izual’s ‘love’. Until now, he was still trying to catch up with the Fourth.

The information of Izual statistics is not so simple data information. It is a more detailed classification of information.

For example, through the First Round test server 2783 name World Third-rate Grade Hacker, Izual carried out a detailed tree structure classification.

The First Grade classification is divided into three categories, ‘Known Identity’, ‘Unknown Identity’, and ‘Clue’ of Identity’. The three categories have the same meaning as the literal opinion, the last ‘Clue’ of Identity ‘class. Indicates that some identity clues have been obtained but cannot be finalized.

The so-called ‘Known Identity’. Instead of knowing Reality identity, I got the Sockpuppet identity in the network.

The Second Grade category is built under the category ‘Known Identity’ and is divided into three categories: ‘Part of an Organization’, ‘Free and Independent’, and ‘Unable to Judge’.

Although Izual analyzes most of the Hacker Identity Information, Shi Lei does not only choose the Peripheral Member of the ‘Free and Independent’ category. Some members will also be selected between ‘Part of an Organization’ and ‘Unable to Judge’.

This choice can effectively avoid some unnecessary disputes.

Every Hacker member of the ‘Known Identity’ category, Izual lists the relevant detailed information, including Internet Sockpuppet information, related Hacker event information, belonging to Organization information, etc., including some gossip messages, also listed by Izual. Come out.

Shi Lei didn’t have time to look through the First Round and Second field tests, more than 2,000 Hacker’s information, he directly looked through the Third field and the Fourth field test, a total of 39 name Hacker’s information.

These thirty-nine Hackers, most of them are Shi Lei’s old acquaintances!

Hacker Union’s ten Core Layers all passed the Third test. As for the Fourth test, only Black Blade, Black Demon, Black Hand and Black Ghost passed.

The other six Core Layers, especially the Black Tiger of the league Ranked Second, were not able to pass the Fourth test. This makes Black Tiger feel quite a face.

After all, Ranked Sixth, Seventh, and Eighth passed the Fourth test, and the Black Tiger of Ranked Second did not pass, making Black Tiger feel the crisis of status.

Black Tiger’s offensive and defensive strength is severely offensive, attack aspect, Black Tiger even surpasses World Exceed Class; but in defense aspect, Black Tiger is almost only the standard of World Third-rate. Black Tiger is able to pass the Third field to evaluate the Server. In fact, it is already a powerful blessing for the attack. Otherwise, Black Tiger will not pass the Third field test!

The five Core Layers of Dark Night Dynasty surpassed Hacker Union in personal strength and all passed the Fourth field assessment. The remaining twenty four Hackers, all of which are Hacker from overseas.

Four of them have attracted Shi Lei’s High Degree attention!

First is InuYasha, which is the name of an anime character, translated into Xia Nation as ‘Inuyasha’. This Hacker’s real identity, Shi Lei has some understanding.

InuYasha is the Woer of Wo Sang Nation, but not the Security SpeCIA list of Wo Sang Nation Official, nor the Hacker of Wo Sang Nation Hacker World Organization, but a Bounty Hacker, Bounty Hacker chasing money.

It is rumored that InuYasha’s real identity is the mixed-blood of Xia Nation and Wo Sang Nation. Although he lives in Wo Sang Nation, he does not agree with Wo Sang Nation, so he chose to become Bounty Hacker.

These are not the main points. The point is that InuYasha’s strength is very strong, reaching the level of World Grade!

Such a powerful Hacker, if it becomes a Peripheral Member, will be greatly promoted!

The second Hacker, which was followed by Shi Lei High Degree, is also very famous. Even formly and Mirror Science and Technology Group have had a very unpleasant contradiction.

This Hacker’s Sockpuppet at Hacker World is called Declared Dead!

A powerful Hacker that reveals a terrifying taste from the name of Sockpuppet, also reached the level of World Grade, and even showed signs of breaking through to Summit.

The strength of Declared Dead exceeds that of InuYasha, and it is possible to become the World Summit Grade Hacker in a short time!

Shi Lei doesn’t mind Declared Dead formerly and Mirror Science and Technology Group, trying to invade Brave’s World’s. Bounty Hacker’s rule Shi Lei is quite clear. Just collecting money, nothing else, no personal gratitude and grudges.

However, whether it is InuYasha or Declared Dead. If it is only a Peripheral Member, Shi Lei will not ask too much. But if they want to become an OffiCIA l Member, they must leave Bounty Hacker’s Industry.

There are also two Hackers who are watched by Shi Lei High Degree, and they are also Bounty Hacker. They are Batman and Dark Lord. These two Bounty Hackers are also 狠characters, both of which are Quasi World Grade’s Expert. Exceeding the standard of World Exceed Class, only half-step away from World Grade!

Shi Lei sighed, it seems that with the progress of the era, computer hardware is getting higher and higher Grade. Computing performance is getting stronger and stronger, and Bounty Hacker’s Industry is getting harder to mix.

Otherwise, how can these Bounty Hackers take part in the test?

Bounty Hacker’s business is indeed getting worse. The simple Task, the low bid, there are many low-end Hackers rushing to deal with.

The high-end Task, the amount of the reward is indeed very high, but the Task is usually difficult to compcomplish, and may even try to gain an advantage only to end up worse off, Bounty Hacker’s own High Grade Zombie, even the Supercomputer Zombie Go in and lose.

In this case, Bounty Hacker only recognizes bad luck!

‘Four Exceed Grade Bounty Hacker? ‘Shi Lei secretly thinks about how to treat them. Accepting these four people becomes a Peripheral Organization Member, that is the absolute thing.

Even Shi Lei can give 100,000 US Dollar bonuses every month without their real identity, waiting for these guys.

Shi Lei’s really thinking issue is whether or not to test the four guys and get their real identity together, so that the mark is completely marked.

On the other hand, David Thomson was finally provoked by Izual. David Thomson slammed the keyboard and yelled loudly: “Fuck! Deception! Cheating! This is deceiving everyone, and the Fourth Assessment Server can’t pass! ”

David Thomson really can’t pass the Fourth field assessment server, even if he has already called 110tflops’ Concentrated Distribution Computing Resources, he can’t break the defense of the Fourth Field Assessment Server.

When David Thomson controlled 80tflopsConcentrated Distribution Computing Resources, he felt that by adding a little bit of attack data flow’s computing resources, he could completely break the blockade of the Fourth Field Assessment Server.

With this in mind, David Thomson added a Supercomputer with a speed of only 5tflops. Although there are not many 5tflopscomputing resources, according to David Thomson’s speculation, 5tflopscomputing resources is enough to influence the battle.

While David Thomson was preparing to celebrate the victory, the Dues System of the Fourth Assessment Server was temporarily promoted.

This is of course Shi Lei authorized Izual, commanding Izual to call more IWNMiwang resources for defense.

First time When this happened, David Thomson thought he had guessed the error and put another Supercomputer with a speed of 15tflops.

Continuously investing in 20tflopscomputing resources, let David Thomson think that he can finally succeed, but the defense of the Fourth Field Assessment Server is still solid.

And David Thomson made it clear that the Fourth Field Assessment Server’s computing resources promoted to 300tflops. The angry David Thomson can only access a Supercomputer with a speed of 10tflops for the last stroke.

However, David Thomson once again found the Fourth Field Assessment Server, controlling the computing resources promoted to 350tflops, and suppressing his offense.

David Thomson finally couldn’t stand it. At Li Jian Nation Hacker World’s major open to the public website, he issued an angry and arrogant announcement!

(To be continued~^~)

PS: Still 3500+ conscience!