I'm back from American comics
025 Hackers on the Ocean
After looking at the program code for three hours, the basic framework of AI has only been built for less than 50 units.
However, at this time, Gu Yi stopped.
Because his network protection system gave an early warning, someone was trying to forcefully invade his system from the outside.
"Is there really someone who wants to hack me?"
Gu Yi saved and closed the code program he was writing, took his hands off the keyboard, and gave up any operation.
After a while, the mouse cursor on the computer desktop started to move on its own.
It seemed that the hacker who tried to invade had successfully entered and took over Gu Yi's control of the computer.
"This guy has something." Gu Yi just praised his opponent, but did nothing else.
The mouse opened the notepad by itself, and typed bold characters in the text of the notepad——
"I have already broken through and completed the three questions you left. If you can't come up with anything new, you have to admit that you are rubbish..."
The word "garbage" was deleted again before it was completely typed.
The latter sentence was changed to - "You have to admit that you are my defeated general."
It is probably that this hacker friend who did not want to be named suddenly realized that if Gu Yi was trash, then he who defeated the trash would not be much better...
However, Gu Yi looked at the notepad with question marks on his face.
When did I leave you three questions?
Who are you?
The typing in the notepad continues——
"The first question is about the upgraded firewall you left in the Red Fox Technology server. It took me seven days to break through it."
"Remarks: It's not that I spent seven days without eating, being hungry, or sleeping! I just used the fragmented time in the seven days to solve the problems you left! I'm usually very busy!"
Gu Yi:......
What's going on with this inexplicable sense of arrogance?
But speaking of it, it turned out that this hacker was the same one he had fought against at Red Fox Technology.
"The second question is about the problem of your computer i. Your computer is constantly stealing the domain name i in the Neon District, Korean District, and Russian District. It will take me three days to lock your real i address. ”
"Remarks: You just turned off this program yourself, and I was really close to locking your real i! So, the second question counts as your surrender!"
Gu Yi:......
Before, when Gu Yi invaded multiple systems to find evidence against Lin Yaoxin, he did write a program on his laptop to steal i domain names from other regions.
Later, this program was never lifted.
And after this hacker obtained a clear photo of Gu Yi's face through the Red Fox Technology camera, he locked down Gu Yi's true identity by invading the Public Security Bureau.
When preparing to invade Gu Yi's previous laptop, he discovered an interesting program that stole domain names.
So, with an open mind, she regarded this as the second test that Gu Yi left for her.
"It's the third network protection system. It only took me three hours to find the loophole and break through it!"
"Remarks: Although your network protection this time is much more complicated than the one left at Red Fox Technology, it is not much different in essence. The same tricks are useless to me!"
Gu Yi:......
Then you are great, do you want to give you a round of applause?
This hacker spent seven days solving the Red Fox firewall problem and only spent three hours solving the problem of Gu Yii theft using the network protection system.
Such changes were not due to the fact that her business ability had improved by leaps and bounds in the process of solving Gu Yi's three questions.
Is such that.
The programming method used by Gu Yi is encrypted, and the encryption method is the way from the Marvel world.
The hackers here at Blue Star have never seen this before, which is normal.
Computer language can be completely understood as language. The language Gu Yi used was undoubtedly a foreign language that no one in Blue Star could understand.
Therefore, when the hacker dealt with Gu Yi's first problem, the biggest workload was not finding loopholes, but trying to translate and understand Gu Yi's "new language."
By the time of the second question, the hacker had already mastered "Gu Yiyu" to a certain extent.
Finally, consider the fact that it only took her three hours to hack into Gu Yi's computer. Now, she has probably mastered the encrypted language from Marvel.
I have to say, this hacker has something.
Gu Yi waited until the hacker on the other side finished saying everything he wanted to say before he started typing on the keyboard.
Control of the computer returned to Gu Yi's hands almost instantly, and the hacker who successfully invaded only had the right to remotely view Gu Yi's computer desktop.
At the same time, a running code program popped up quickly.
Lines of characters passed by, and finally locked on a string of i domain names.
This was not over yet. A map with a black background and various red and green lines popped up immediately, and an address was locked at the same time——
"No. 679, Oak Street, Gold Coast, Australia."
Everyone should still remember the "old cunt routine" that Gu Yi talked about before.
Regarding network protection upgrades, Gu Yi has always had his own routine when he was in the Marvel world.
It usually looks like this. After upgrading the network protection to the upper limit of his capabilities, he will "accidentally" leave a small loophole in the vast data.
This vulnerability is so inconspicuous that only top hackers can find it.
But if the hacker who discovered this vulnerability got excited and used it as a way to break through the protection system... then he would have fallen into Gu Yi's trap.
But in fact, inside this so-called "small loophole", there is a code program called "i Tracker" that Gu Yi carefully concealed and disguised.
Anyone who attempts to intrude through this vulnerability will trigger the i tracker, which is equivalent to actively exposing the real i address.
Once the real i-address is exposed, for hackers, it is no different than the last layer of fig leaf being peeled away.
Back in the Marvel world, many powerful hackers suffered losses due to Gu Yi's routine.
The old scheming trick is very insidious but very stable and practical.
At this time, Gu Yicai calmly typed on the notepad that the hacker had typed -
"This is your real i, and your real address right now."
Finally, Gu Yi typed in a few more command programs and completely kicked the hacker out of his system.
"The game is over, you have lost."
You'll Also Like
-
Starting with the Kurotsuchi Mayuri template, hooking up with Orochimaru
Chapter 63 3 hours ago -
Knight: I’m Emperor, and I’m going crazy with the purple light at the beginning!
Chapter 110 3 hours ago -
Zongman: Starting from practical education, having many children brings happiness
Chapter 210 3 hours ago -
Hogwarts: Who hasn't collected a Horcrux?
Chapter 84 3 hours ago -
Honkai Q&A, the Far East Demon Cave is exposed at the beginning
Chapter 297 3 hours ago -
Science world, ma'am, I am really a detective
Chapter 263 3 hours ago -
Adult Comics: Starting with the Making of the Laughing Bat
Chapter 90 3 hours ago -
Solving the case: The opening scene solved a major shooting case, and the boss Ji Jie
Chapter 313 3 hours ago -
About the time I became a foodie in High School
Chapter 92 3 hours ago -
American comics: Weaving the future, starting with the Ultimate Sky
Chapter 71 3 hours ago