The difference between the two worlds is not only in the virus, but also in the system name, execution environment and so on.For example, there is no freebsd, no unix/xenix.

is a new system name that belongs to this world.

After Shen Zhi's analysis and consideration.

It should be a system similar to the xp or lower version of his world.

relatively backward.

So you must change it when you enter it.

As for the offensiveness in the source code, there is no need to change it.

This is the core thing.

This is exactly what Shen Zhi wanted.

The execution of input commands is basically the same in both worlds.

Because the computer language is the same, it saves a lot of things.

Virion size.

The offset of the file's main icon.

Interface changes.

Command adjustments.

Make a picture of a panda burning incense, and add a few lines of words.

The code is very long, and it takes several pages to write on paper.

This is why viruses are not easy to make.

In this era without open source.

It's hard to find a reference.

So the world's top virus makers are struggling every step of the way.

Because if there is a logic error or instruction conflict in these instructions.

For example, the logic of the most critical infinite loop violates 0.4.

Then this virus is useless, and it can't exert its effect at all.

It will become a non-aggressive virus.

This is also difficult to make.

So as a virus, there can be flaws.

Such as attacking flaws, avoiding flaws in antivirus software, and spreading flaws.

It doesn't matter, but there must be no problem with instruction errors on the offensive source code.

In that case, the virus would not be called a virus!

Shen Zhi tapped his fingers very fast.

It has to be precise!

Shen Zhi kept confirming it many times.

If it goes wrong, then the delivery of the virus will fail.

Not only did it fail, but it also aroused the attention of the four enemy countries.

The other party will definitely take strict protection and do a good job of defense.

At that time, if you want to attack or release viruses, it will not be as simple as it is now.

It must be foolproof! ?

Chapter 195 The whole world is waiting for that person!

Shen Zhi's fingers tapped rapidly on the keyboard.

There was a "cracking" sound.

This sound can only be heard by those around you.

Many people raised their heads and looked this way curiously.

What is Shen Zhi doing?

What is written?

code?

The classmate sitting next to Shen Zhi recognized it.

This is storage.

This is the structure priority queue, graph, tree.

and also..

what's left

Why haven't you seen this grammatical semantics? !

Obviously many of them have been learned before, but why is it very strange to combine them together? !

What code is Shen Zhi writing?

He doesn't understand.

"Cough cough." The teacher on the stage coughed lightly, and then said, "Listen carefully to the class."

The classmate sitting next to Shen Zhi hurriedly looked up at the teacher.

I saw that the direction the teacher was looking at was their side!

The classmate immediately showed an apologetic expression.

Then he looked back at his computer.

The teacher didn't care about Shen Zhi either.

After all, Shen Zhi is not his true student.

Seeing that he was holding the computer, the interface didn't look like a game interface. In addition, Shen Zhi didn't speak in this class and didn't disturb other students, so the teacher 24 didn't care about it.

As long as it's not playing games, as long as it doesn't affect the classroom order.

Shen Zhi was still writing "Panda Burning Incense", his ears seemed to block out the surrounding sounds, and he didn't hear the teacher's words.A few minutes later.

The source code of Panda Burning Incense has been modified.

The Panda Burning Incense virus test failed, and a logic error was reported.

The final modification, the adjustment of the source code of Panda Burning Incense is completed.

testing successfully.

Panda Burning Incense was successfully made!

OQ

Hackers from the four countries headed by the United States are still recruiting.

The team has gradually expanded.

There are simply more people than when they attacked China just now.

at this time.

Voe: What about people?Disappeared suddenly? "

An: After quitting the websites of the highest organs of various countries, it has not appeared again. As for what to do, maybe it is just to put down a domineering speech, scare everyone, and not plan to appear again, right?Or was the address checked? "

Zhaoqiao: "The popcorn is all ready, and I'm going to watch a show, why are they gone?"

90: "Sure enough, it's just to scare everyone."

mn: "What other skills does he have? It is very likely that hacking the websites of the top organs of the four countries in one go is his greatest skill."

An: "Sure enough, I misjudged the person."

90: "This S may just want to show off, after all, this kind of thing is too common in hacker circles."

voe: "At least get the rest of the work done. I think s may be a veteran, and there may be bigger actions in the future. I think so. I hope s won't let me down."

Teruhashi: "It seems that it will not appear again. After all, the team of the four countries has now expanded to more than 200 people, and there are still people joining."

90: "Don't you all join in?"

An: "Xian really invited me, but I declined. I still prefer to watch the battle."

voe: The attitude of a boss hahaha! "

The top hackers around the world will have such cliques, and like ordinary people, they will form their own social circles.However, for hackers, their social circles are all of similar strength.

□ □

This kind of hacker battle, which has not been seen in more than ten years, will not be missed by all hacker masters.

Just like the entertainment industry, some newcomers rise up, and niche students who lack traffic will be replaced.

Finally, it depends on the strength to speak.

But today, everyone thought that the most eye-catching thing was Huaxia's big r.

But unexpectedly, a more surprising person suddenly popped up.

That's s!

No one has ever heard of this name.

It is possible that the once all-powerful hacker disappeared and reappeared in front of everyone with a different name.

Or, he is just a newcomer.

they do not know.

Everyone doesn't know.

Just guessing.

Most people wonder if that S will appear again?

How to attack?

Did you say "even if you are far away, you will be punished"?

You can't just attack the website of the highest authority, right?

之所以这么好奇,他们是觉得每'.日."更;新.'新:壹!小'说?群!.5;4":3;6':;5,9,",3,8!:.9?.进攻这件事不太现实。

After all, S is only one person.

The other party may have assembled more than 200 people now.

What can he do alone?

No matter how capable he is, the counterattack will not cause any serious losses and influence to the four countries

After all, the team formed by the hackers of the four countries not only has many people, but also many experts.

Although I have to admit that S is also a master, but a master against a group of masters?

Lost in terms of numbers.

Since the gang of hackers in Shikoku has already started to recruit people to form a team.

He must have also laid a net against S, just waiting for him to come in.

All forces in the four countries are ready to encircle and suppress S.

How did S get in?

In addition, S is an away game, not only facing hackers from four countries.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like