The Era of Magic Technology

Chapter 187 Super Hacker War

(At least two updates today, whether there is a third update depends on the specific situation, please give some support, give some motivation...Thank you...)

Mayflower is a legend in the history of hackers. It is the only super hacker who can make the US government helpless after the first super hacker Kate.

And the period when Kate was on the Internet was still the barbaric period of the Internet, so although his record was extremely brilliant, it caused a shock all over the world at that time, and made the world realize for the first time the horror of the Internet and the horror of the combination of technology geeks and computers. .

After Kate was arrested, she was restricted from touching anything related to radio for life.

But many people didn't recognize Kate's technology very much, thinking that it was just because the security technology was underdeveloped at that time, and she was caught by a Japanese in the end.

But the Mayflower is different.

The name of the Mayflower symbolizes the first batch of gold-seeking immigrants who set off from the United Kingdom to the American continent, and the ship they took—the Mayflower!

On that ship were the first batch of great men in the United States, and it also symbolized the beginning of hundreds of years of American history.

Five years ago, the Mayflower suddenly appeared out of nowhere. As soon as it appeared, it invaded the Pentagon, modified a homepage in it, and left a picture of the Mayflower ship, so everyone called him Mayflower.

In the following four years, Mayflower's record was brilliant and dazzling, becoming the undisputed number one hacker in the world.

He has hacked into the NATO Joint Military Command, the White House, the FBI and the CIA, and the EU headquarters, and all the major high-tech companies in Europe and the United States have not been spared...

Except for the Chinese Internet, he has never invaded, and his shadow is almost everywhere in Europe and America, leaving behind a figure that other hackers need to look up to.

However, after he invaded these places. He didn't do any acts of sabotage, he just invaded for the sake of intrusion, to prove his technology.

Therefore, the fbi, cia, and Interpol are all looking for Mayflower, and the most wanted ranking is very high, but all parties have not really tried to hunt down this super hacker, because everyone thinks that his destructive power is not enough and the threat is not high. , and the technology is too high. Hard to hunt down.

A year ago, Mayflower suddenly disappeared from the Internet, and several hackers who knew him never heard from him again.

A year has passed, and when everyone thought that he had completely withdrawn from the stage of hacker history, he suddenly appeared again.

Moreover, he suddenly appeared at the critical moment of the hacker war between China and the United States, as if the knight appeared at the most dangerous moment of the princess, rescued the princess, and killed the dragon. Become a great hero admired by the world.

At this moment, the flames of war have spread from Intel to IBM's main server, and Intel has completely fallen.

Bob, the director of the National Security Agency responsible for network security, was temporarily appointed by the White House. Lead dozens of network security experts and IBM's technical elites to fight against China's Honker Alliance.

"How is the situation in China?"

Bob asked with a dark face.

The subordinate immediately replied: "Black God, Satan, and Earl Arthur combined thousands of hackers to attack the main server of Maneng software for an hour and failed to take it down. When Chinese hackers invaded us, they have now attacked China's Other Internet companies have now broken through several major Internet companies in China, paralyzing the entire Internet in China."

Bob's face finally looked better, and he said in a deep voice: "These yellow-skinned monkeys are simply hateful, this is their due punishment. That Wang Xiao from Magic Software Company must be the hacker Sun!"

"Yes, we made a comparison, and the chance of the two being the same person is as high as 80%!"

The subordinate checked the data and replied: "However, the Chinese hackers who attacked IBM this time did not seem to have a sun. He disappeared after invading Intel's server. Their attack power dropped several levels immediately. Do we want to expand?" Fight back?"

Bob cheered up, and said seriously: "Look again. Don't worry, don't fall into the trap. How about Google, Apple and Microsoft?"

"They are still working on the aftermath, activated the backup server, and there has been no secondary attack so far."

The subordinates tried Google search and it was already available.

Then, he entered the Chinese Internet. Tried Baidu, can also be used?

What about paralysis?

He looked startled. I hurriedly re-entered several mainstream websites on the Internet in China, and found that they could be browsed normally, and online services were restored.

How is this going?

Just now, the Black God sent him a message saying that the Internet in China has been paralyzed. Why did it recover after a while?

Bob also noticed this abnormal situation, and said in a deep voice, "What's going on? Why did the black gods stop attacking?"

The subordinates immediately contacted Black God with a secret communication software. After getting the answer, they were shocked: "Boss, Black God said that their attack was blocked. Maneng Software sold its own security system to other Chinese Internet companies. The company has installed the security system of the magic software, black and they have a temporary way to target the security system of the magic software."

"The entire Chinese Internet is now as impeccable as China Railcom!"

Bob's eyes widened. He is mainly responsible for network security, and he is definitely a master of technology. He knows how high the technical content is.

It can directly improve the Internet security of the entire country by several levels, and become a defense like Railcom.

This kind of security system can be said to be the dream of every country.

pity!

It's from China, developed by Magic Energy Software, and it's Wang Xiao's technology. With the current bad relationship between the United States and the other party, it is impossible to buy this kind of security software from the other party.

What's more, even if it is bought, will the United States dare to install the security system designed by the Chinese in government agencies?

They definitely dare not, who knows if there will be a hidden door to the system left by Wang Xiao? At that time, will the other party only need to enter a code to paralyze all servers equipped with this security system?

No one dares to take this risk.

Drip, drop, drop...

Suddenly, there were several hurried alarm sounds from several computers.

Bob yelled, "What happened?"

A technician rushed to report: "Boss, it's Sun, he made another move. He has already entered the IBM server, obtained super privileges, and we were kicked out."

"He's too powerful, we can't stop him!"

"Ibm has also been kicked out, there is no way for the time being, unless the server is shut down!"

"Other Chinese hackers also came in together, and IBM's server fell!"

Everyone panicked, but there was nothing they could do.

The information collected one by one was enough to make Bob's face furious.

Dozens of national network security experts cooperate with IBM's technical elites. Can't even resist the attack of a Chinese hacker?

What should I do then?

Is it possible to just watch this Chinese hacker doing mischief on the Internet in the United States?

Bob has an urge to turn the US Internet into a large local area network, so that there is a lot more room for maneuvering.

And at this moment!

Everyone found that Sun, who had just invaded the IBM server to obtain super privileges, suddenly encountered an opponent.

A stream of data also suddenly invaded IBM's server, and Sun began to snatch the server's super authority.

When Bob saw this data stream and saw the familiar operation method, a photo of an old ship flashed in his mind, and he was pleasantly surprised: "It's him who appeared, it's the Mayflower."

"Mayflower?"

"The Mayflower really appeared!"

"The guy disappeared for a year."

"We should recruit him and give him the best treatment. He will definitely improve our overall strength."

"But this guy didn't care about our contact solicitation, and didn't even think about joining us."

The technical staff of the National Cyber ​​Security Agency felt the pressure relieved.

For now. The world's number one American super hacker Mayflower and China's newly emerging super hacker Sun are evenly matched, and the battle between the two sides is inextricably linked.

In less than a minute, the two sides fought extremely fiercely.

Take ibm's server as the battlefield. The two streams of data are constantly interlaced and flickering. Each code, each logic program, each defense program, and each attack program are quickly written by two super hackers. If you crack one of my programs, I will immediately write a more Targeted!

In the confrontation between the two super hackers, you only saw two streams of data flickering rapidly.

Dozens of technical personnel of the US National Security Agency suddenly felt that they could not get involved. Hundreds of technical elites including ibm also feel the same way. These people usually think they are superior and they think they are figures in the field of computer technology, but now everyone feels their own insignificance.

At this moment, a large group of people in the IBM headquarters gathered around the server center, and the big screen of the server was constantly flashing a rapid data flow. The others felt a little dizzy, and couldn't understand the meaning of the data flow between the two of them at all.

However, everyone is a technician. From the status continuously reflected by the server, it is known that the two are in a fierce confrontation and are fighting for the authority of the server.

This top-level hacker battle is really the most exciting one in the history of the Internet, and it is definitely the most technologically advanced one. It can be said that it represents the most peak technology in the current computer field!

In this war, whether it is the National Security Agency of the United States or the technicians of IBM, the owner of this server. Or China's Honker Alliance can no longer intervene, and has become an audience on the side.

In an instant, this battle turned into a one-on-one duel between the Chinese super hacker Sun and the American super hacker Mayflower.

IBM's chief technology officer was a little thrilled to see this battle, but his own server could not make the decision, and he was still very depressed. He said with emotion: "Mayflower disappeared for a year, and the technology has improved a lot. He is now The input data is a brand-new algorithm, which may be developed by him himself. It is very efficient and beneficial to defense. However, there are some shadows of the magic algorithm in it. It can be imagined that Mayflower has not been complacent, and has been absorbing the outside world. technology to improve themselves.”

"However, the data flow of China's super hacker Sun is also a brand-new algorithm, but it is not the magic energy algorithm, but it also has the shadow of the magic energy algorithm, but it is also more efficient. Mayflower's algorithm is somewhat inferior."

Other technologists at IBM agree.

However, the chief technology officer of the National Security Agency saw more, and said seriously: "Sun's algorithm is obviously better. Mayflower temporarily resisted it, but I don't think it will last long. Sun is fighting for the bottom layer. Permissions, once you get the bottom-level permissions, you can control the entire server, and Mayflower will have nothing to do with it!"

The technicians who heard this were all silent, excited, depressed, and angry.

As a technician who witnessed the hacker war of the normal century, he was naturally excited; but he couldn't participate in it, so he was very depressed; the most important thing was that he couldn't decide his own territory, so of course the atmosphere was incomparable.

They have to admit that the Chinese are quietly seeing that they have caught up with the United States in computer technology, and even surpassed it slightly.

It seems that Mayflower's defeat is also a matter of time, and it is already somewhat difficult to resist Sun's offensive.

However, at this moment, several sharp streams of data were suddenly added to IBM's server, fighting against the Chinese hacker Sun together with Mayflower!

These hackers are Satan, Earl Arthur, and Black God.

They gave up attacking the Chinese Internet and wanted to do something in the American battlefield.

At this time, it became the Chinese super hacker Sun alone against four of the world's top ten hackers, including Mayflower No. 1 and Satan No. 2.

The entire world of hackers following the battle was shocked.

Isn't this Chinese super hacker sun too powerful?

It seems that the position of the world's number one hacker is about to change hands. (to be continued ~^~)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like