Reborn Hacker
Chapter 49
The author has something to say:
Solve the number of people:
He Ran 3
Xiao Yatze 4
Qi Zhanhang 3
Taoist 5
monk 2
ghost hand 2
mob 4
Tuesday3
Swagger3
He Ran's grouping is determined by some feedback information after the virus program is activated, and the information includes some hacker keywords, hacker software, hacker programs, and some hacker operations.According to the information obtained, He Ran numbered the other party and assigned them to different people. Among the remaining unnumbered ones, 2 were top hackers, and the rest were also first-class hackers.
"Why, these few on my side seem to be of good level. I have also picked out some hackers before, and their level is obviously not at the same level." Qi Zhanhang said suddenly.
"Well, two of these people are top-level hackers, and most of the rest of the hackers are also on the edge of top-level hackers. If I'm not wrong, this is already a very high-tech hacker organization." He Ran replied.
He Ran's actions were finally discovered 5 minutes after the start. After all, although He Ran could hide the existence of his own computer and most of his own actions, he couldn't hide the actions of other people. Difficult to hide.
The opponent quickly counterattacked.
Black: Joe, my opponent knows two names well...
Joe: Huh?your acquaintance?Or an acquaintance of your brother?
Black: No, I mean, these are big names in hacking.
Tuesday: Yes, I also met a famous hacker here.
Swagger: Why don't I know anyone on my side?
Joe: Your level... well, it's screened.
Monk: Can you not chat first, whoever solves the opponent first, then come to help.
Thug: Ha, monk, you are not doing well.
Monk: My forte is defense, not invasion... Do you understand?
Thug: I don't understand, anyway, I know you can't handle your opponent.
He Ran himself directly used some computer system loopholes that no one had discovered yet to intrude, and most of the members of the Honker Alliance taught by He Ran also used this technology.However, it is said that there are system loopholes that no one has discovered in the contemporary era. However, many loopholes are just discovered by the people who did not announce them and are not known to most people. The magic weapon.
The two system vulnerabilities that He Ran used at the beginning should have been discovered by the other party, and they have already been patched, and the third system vulnerability was finally successfully invaded.Like He Ran, many members of the Honker Alliance have also experienced some setbacks. Even hackers like Monk, who mainly attack defense, have been experimenting with some system loopholes they know.Although the monk finally invaded the other party's computer, the other party's reaction speed exceeded the monk's imagination, and the monk fell into a stalemate for a while.Fortunately, the monk's cautious nature only invaded one computer, and the other four computers have not been moved, otherwise it would not be a deadlock.
Taoist: Boss Joe, I've done it here! !
Ghost Hand: Isn't it?This is luck again?
He Ran was a little dumbfounded at this time, Taoist priest's hacking skills can't be considered bad, but he is only relatively average in all aspects of hacker subdivision.The few people He Ran assigned to him were all near-first-class hackers, because he knew the luck of the Taoist priest, and one of them was a quasi-first-class hacker. Even so, He Ran never thought that the Taoist priest would solve his problem so quickly. those few people.
Joe: How...how did you solve it?
Taoist: When I just wanted to invade, I found that the computer of the strongest guy was being hacked, and I followed the intruder in. After entering, the other party immediately began to collect some financial evidence, and then Finally, the words "FBI is outside the door, please open the door" appeared on the screen.Then... well, it should be the real FBI, and his computer seems to have been confiscated directly.
Joe: What about the other 4 people?You got it too?
Taoist: Two of them were in contact with the guy who was captured by the FBI, so I don't have to do anything.For the other two, it seems that one happened to be hit by some kind of virus, and the information was leaked, so I went directly through the back door built by the virus to solve it. The other one was competing with others in technology, and I helped his opponent.Then I got it all done.
Monk: …
Thug: After today is over here, I'm going to try hacking into Taoist's computer.
Ghost Hand: Don't do this kind of thing that will put you in "prison disaster"...you know.
Tuesday: Joe, this guy...was your maze internet quiz, did he take it?
Joe: ...uh
Black: Is he the Taoist priest who almost got full marks?
Joe: Exactly...
When He Ran answered this way, he felt a lot of pressure.
Swagger: Is this the guy who pushed me over the head?What kind of shit luck is this? !
Taoist: I am born with divine luck!I am a Taoist priest, so of course God will favor me, a talent who is becoming rarer and scarcer in modern society.
Joe: ...Are you also a Taoist priest in real life?
Ghost Hand: I remember he said it when he first came in to introduce, I thought it was a joke.
Tuesday: Is a Taoist priest a profession?
Swagger: Megalomaniac, you don’t know this, Taoist priests are those bald heads who become monks in country Z.
Spike: ...
Monk: …
Ghost Hand: ...
thug:……
Joe: Cough, Swagger, you are talking about monks, Taoist priests are not bald.
As soon as He Ran said this, the chat room fell silent.
At the same time, in Country Y, Gary next to Lynn blushed and tried his best to turn the head of Lynn who was looking at him with teasing eyes back to the right position.
After the chat room quieted down, He Ran they began to concentrate on intrusion work again.
Within 2 minutes, the monk and the ghost hand dropped the line.Judging from this situation, it should be that these two guys were counter-invaded, and at this time, the total number of He Ran's enemies has dropped to 19. (Please refer to the author's words for the specific number of people to solve)
Joe: Taoist priest, go and deal with the rest of the ghost hands first.
Taoist: OK, I see.
At this time, He Ran also entered the first bitter battle since his rebirth.
He got into a tough fight because of his own persistence. Except for some mature software and programs written in zero language, the other intrusion methods are all in C language, and they are all hacking methods that will become popular not long ago. It can be regarded as He Ran's another test of gold for himself.However, the opponent is not weak, and is very proficient in technical things. In the process of tug-of-war with the opponent, He Ran even had a feeling of whether he would lose like this.
Of course, such an idea was born under the condition that Heran did not use most of the technologies beyond this era.
γ2: Who are you?Why are you attacking me?
Joe: I am a transcendent from country Z, hired by some people to deal with you.
γ2: Transcendent?You're the guy who beat Monsters and made them a joke in the hacker world?
Joe: I am indeed a transcendent. As for what you said later, I don't know.
γ2: It's only natural that you didn't pay attention, you're just a loser.
Joe: It has nothing to do with being a loser.
Black: How are you doing over there?
Tuesday: There is no big problem on my side, and I am supporting Swagger.
Swagger: Who wants your support! !
Joe: I seem to have met the second in command.
Black: Second in command?What about the name?
Joe: Gamma 2.
Swagger: I seem to be hallucinating, that letter is Y.
Tuesday: It is indeed γ.
Black: If you are more concerned about organizations in the hacker world, you should know this organization.
Joe: He's chatting with me... Shall I keep wreaking havoc?So far no tricks.
Black: The full name of this organization is code-named γ, and all members just add numbers after γ.The smaller the number, the stronger the hacking skills. γ2 should really be the second in command in the organization.To be honest, I think the code names of those people in the code name γ are really similar to those of the Digital Army.
Joe: I know Digital Corps, one of the top 10 hacker organizations.It is said that it is also famous on the FBI list.
Tuesday: The code name γ is the 15th in the ranking of the FBI's internal hacking organization. Although it is not publicized, it is definitely not worse than the digital army.
Joe: Isn't the FBI's No. 15 dismantler?
Tuesday: ?When did this happen?
Joe: I just took a look at it.
Tuesday: As I recall, the terminal password of the FBI should be fingerprint verification now...
Joe: I went around out of habit again.
Tuesday: Remember to take me around the next time you go around.I also like to go inside the FBI once in a while.
Swagger: ...add me, I'm interested too.
Joe: Next time if I remember and I'm free.
γ2: Are you still there?
5 minute later.
γ2: Already gone?
3 minute later.
γ2: I know you haven't left yet, so you don't need to lurk.Your intrusion ability is unquestionable, it has been confirmed by Monster, but I don't think you have the ability to continue to intrude into my computer when I find you.
Another 3 minutes later.
Gamma 2: ...! ! !
He Ran looked at the last two sentences speechlessly, so he said, when he didn't reply just now, he was making all kinds of guesses and self-denial?Some hackers in this day and age are really hard to understand...
Do you want to answer?He Ran felt that he was obviously here to invade someone's house to avenge the theft of the previous city hall data, so why is it like a technical exchange now?
Joe: Tuesday, do you know their official website?
Tuesday: Hmm. Http: //... usaJoe: I see, I'll go to their official website to 'shop around'.
Solve the number of people:
He Ran 3
Xiao Yatze 4
Qi Zhanhang 3
Taoist 5
monk 2
ghost hand 2
mob 4
Tuesday3
Swagger3
He Ran's grouping is determined by some feedback information after the virus program is activated, and the information includes some hacker keywords, hacker software, hacker programs, and some hacker operations.According to the information obtained, He Ran numbered the other party and assigned them to different people. Among the remaining unnumbered ones, 2 were top hackers, and the rest were also first-class hackers.
"Why, these few on my side seem to be of good level. I have also picked out some hackers before, and their level is obviously not at the same level." Qi Zhanhang said suddenly.
"Well, two of these people are top-level hackers, and most of the rest of the hackers are also on the edge of top-level hackers. If I'm not wrong, this is already a very high-tech hacker organization." He Ran replied.
He Ran's actions were finally discovered 5 minutes after the start. After all, although He Ran could hide the existence of his own computer and most of his own actions, he couldn't hide the actions of other people. Difficult to hide.
The opponent quickly counterattacked.
Black: Joe, my opponent knows two names well...
Joe: Huh?your acquaintance?Or an acquaintance of your brother?
Black: No, I mean, these are big names in hacking.
Tuesday: Yes, I also met a famous hacker here.
Swagger: Why don't I know anyone on my side?
Joe: Your level... well, it's screened.
Monk: Can you not chat first, whoever solves the opponent first, then come to help.
Thug: Ha, monk, you are not doing well.
Monk: My forte is defense, not invasion... Do you understand?
Thug: I don't understand, anyway, I know you can't handle your opponent.
He Ran himself directly used some computer system loopholes that no one had discovered yet to intrude, and most of the members of the Honker Alliance taught by He Ran also used this technology.However, it is said that there are system loopholes that no one has discovered in the contemporary era. However, many loopholes are just discovered by the people who did not announce them and are not known to most people. The magic weapon.
The two system vulnerabilities that He Ran used at the beginning should have been discovered by the other party, and they have already been patched, and the third system vulnerability was finally successfully invaded.Like He Ran, many members of the Honker Alliance have also experienced some setbacks. Even hackers like Monk, who mainly attack defense, have been experimenting with some system loopholes they know.Although the monk finally invaded the other party's computer, the other party's reaction speed exceeded the monk's imagination, and the monk fell into a stalemate for a while.Fortunately, the monk's cautious nature only invaded one computer, and the other four computers have not been moved, otherwise it would not be a deadlock.
Taoist: Boss Joe, I've done it here! !
Ghost Hand: Isn't it?This is luck again?
He Ran was a little dumbfounded at this time, Taoist priest's hacking skills can't be considered bad, but he is only relatively average in all aspects of hacker subdivision.The few people He Ran assigned to him were all near-first-class hackers, because he knew the luck of the Taoist priest, and one of them was a quasi-first-class hacker. Even so, He Ran never thought that the Taoist priest would solve his problem so quickly. those few people.
Joe: How...how did you solve it?
Taoist: When I just wanted to invade, I found that the computer of the strongest guy was being hacked, and I followed the intruder in. After entering, the other party immediately began to collect some financial evidence, and then Finally, the words "FBI is outside the door, please open the door" appeared on the screen.Then... well, it should be the real FBI, and his computer seems to have been confiscated directly.
Joe: What about the other 4 people?You got it too?
Taoist: Two of them were in contact with the guy who was captured by the FBI, so I don't have to do anything.For the other two, it seems that one happened to be hit by some kind of virus, and the information was leaked, so I went directly through the back door built by the virus to solve it. The other one was competing with others in technology, and I helped his opponent.Then I got it all done.
Monk: …
Thug: After today is over here, I'm going to try hacking into Taoist's computer.
Ghost Hand: Don't do this kind of thing that will put you in "prison disaster"...you know.
Tuesday: Joe, this guy...was your maze internet quiz, did he take it?
Joe: ...uh
Black: Is he the Taoist priest who almost got full marks?
Joe: Exactly...
When He Ran answered this way, he felt a lot of pressure.
Swagger: Is this the guy who pushed me over the head?What kind of shit luck is this? !
Taoist: I am born with divine luck!I am a Taoist priest, so of course God will favor me, a talent who is becoming rarer and scarcer in modern society.
Joe: ...Are you also a Taoist priest in real life?
Ghost Hand: I remember he said it when he first came in to introduce, I thought it was a joke.
Tuesday: Is a Taoist priest a profession?
Swagger: Megalomaniac, you don’t know this, Taoist priests are those bald heads who become monks in country Z.
Spike: ...
Monk: …
Ghost Hand: ...
thug:……
Joe: Cough, Swagger, you are talking about monks, Taoist priests are not bald.
As soon as He Ran said this, the chat room fell silent.
At the same time, in Country Y, Gary next to Lynn blushed and tried his best to turn the head of Lynn who was looking at him with teasing eyes back to the right position.
After the chat room quieted down, He Ran they began to concentrate on intrusion work again.
Within 2 minutes, the monk and the ghost hand dropped the line.Judging from this situation, it should be that these two guys were counter-invaded, and at this time, the total number of He Ran's enemies has dropped to 19. (Please refer to the author's words for the specific number of people to solve)
Joe: Taoist priest, go and deal with the rest of the ghost hands first.
Taoist: OK, I see.
At this time, He Ran also entered the first bitter battle since his rebirth.
He got into a tough fight because of his own persistence. Except for some mature software and programs written in zero language, the other intrusion methods are all in C language, and they are all hacking methods that will become popular not long ago. It can be regarded as He Ran's another test of gold for himself.However, the opponent is not weak, and is very proficient in technical things. In the process of tug-of-war with the opponent, He Ran even had a feeling of whether he would lose like this.
Of course, such an idea was born under the condition that Heran did not use most of the technologies beyond this era.
γ2: Who are you?Why are you attacking me?
Joe: I am a transcendent from country Z, hired by some people to deal with you.
γ2: Transcendent?You're the guy who beat Monsters and made them a joke in the hacker world?
Joe: I am indeed a transcendent. As for what you said later, I don't know.
γ2: It's only natural that you didn't pay attention, you're just a loser.
Joe: It has nothing to do with being a loser.
Black: How are you doing over there?
Tuesday: There is no big problem on my side, and I am supporting Swagger.
Swagger: Who wants your support! !
Joe: I seem to have met the second in command.
Black: Second in command?What about the name?
Joe: Gamma 2.
Swagger: I seem to be hallucinating, that letter is Y.
Tuesday: It is indeed γ.
Black: If you are more concerned about organizations in the hacker world, you should know this organization.
Joe: He's chatting with me... Shall I keep wreaking havoc?So far no tricks.
Black: The full name of this organization is code-named γ, and all members just add numbers after γ.The smaller the number, the stronger the hacking skills. γ2 should really be the second in command in the organization.To be honest, I think the code names of those people in the code name γ are really similar to those of the Digital Army.
Joe: I know Digital Corps, one of the top 10 hacker organizations.It is said that it is also famous on the FBI list.
Tuesday: The code name γ is the 15th in the ranking of the FBI's internal hacking organization. Although it is not publicized, it is definitely not worse than the digital army.
Joe: Isn't the FBI's No. 15 dismantler?
Tuesday: ?When did this happen?
Joe: I just took a look at it.
Tuesday: As I recall, the terminal password of the FBI should be fingerprint verification now...
Joe: I went around out of habit again.
Tuesday: Remember to take me around the next time you go around.I also like to go inside the FBI once in a while.
Swagger: ...add me, I'm interested too.
Joe: Next time if I remember and I'm free.
γ2: Are you still there?
5 minute later.
γ2: Already gone?
3 minute later.
γ2: I know you haven't left yet, so you don't need to lurk.Your intrusion ability is unquestionable, it has been confirmed by Monster, but I don't think you have the ability to continue to intrude into my computer when I find you.
Another 3 minutes later.
Gamma 2: ...! ! !
He Ran looked at the last two sentences speechlessly, so he said, when he didn't reply just now, he was making all kinds of guesses and self-denial?Some hackers in this day and age are really hard to understand...
Do you want to answer?He Ran felt that he was obviously here to invade someone's house to avenge the theft of the previous city hall data, so why is it like a technical exchange now?
Joe: Tuesday, do you know their official website?
Tuesday: Hmm. Http: //... usaJoe: I see, I'll go to their official website to 'shop around'.
You'll Also Like
-
Douluo's first sword
Chapter 530 19 hours ago -
Promote the theory of threat to Konoha, why Kirigakure brings Hide!
Chapter 241 19 hours ago -
Pirate: I can draw all things in the dimension
Chapter 358 19 hours ago -
Douluo: Tang San was born as a demon and fell into the trap of Qian Renxue
Chapter 258 19 hours ago -
Douluo: Wuhun is the Star Casting Dragon King
Chapter 164 19 hours ago -
American comics: Launching a dimensional war at the beginning
Chapter 335 19 hours ago -
I am in the Liver Treasure Box in the World of Beast Control
Chapter 208 20 hours ago -
Start a mysterious island
Chapter 901 20 hours ago -
I am cultivating immortality in the world of immortality
Chapter 282 20 hours ago -
I have a magic dice of destiny
Chapter 854 20 hours ago