After taking over a lot of sites for the port mafia, Kawakami Ling didn't wear Tomie's vest to go out to make troubles for several days. It was a rare thing that he went to the Conjuration High School for a few days in a safe and stable way, and spent every day with Knotaba Yuhito and the others After class, I have no intention of going out to consolidate the site at all.

This is something Tomie Kawakami should worry about and what does it have to do with Ryo Kawakami.

Chuan ShangLing had been so contented with the salted fish for several days, and only then began to prepare to set Bailan a trap.

In so many worlds, Bai Lan should be a very special existence, he can see other parallel worlds.

Unlike Rei Kawakami, Rei Kawakami was able to break the world barrier and see other worlds because there was a crack in the world he existed in, which allowed him to protrude from the crack to explore these worlds from the outside. Once the crack was closed, Ling Kawakami You will no longer be able to get information about other parallel worlds.

But Bai Lan is more special. He is more like using himself as an anchor to communicate with other worlds, and there is no need for a gap in the world they are in.

Bai Lan in all worlds will more or less awaken the ability to see parallel worlds, and these Bai Lan have different moral standards and behavior styles. To destroy the world, Kawakami Ling now has countless cases of Bailan destroying the world and creating each other in his mind.

Bai Lan is the same as the guy who doesn't know which world will explode. Kawakami Ling recalled for a long time but couldn't figure out what Bai Lan in this world was thinking. The past few days have been so salty that he almost forgot about Bailan.

At ten o'clock in the evening, Tokyo time, and three o'clock in the morning, Milan time, a post suddenly appeared on an anonymous forum with a sense of insider just looking at the title.

[Invaded a computer in an organization and found something strange]

The post was just posted, and few people took it seriously. The forum where the post was posted was notoriously mixed. There were everyone in the forum, and naturally there were many people like the poster who had nothing to do with hacking computers. people.

Anyone replying to the post slowly sank to the bottom, and after a while, the person who posted the post began to slowly type out explanations paragraph by paragraph.

He seems to be very confused about this matter but he is very shy about his details. Even in this kind of internal forum where all information will not be traced, he speaks with extra care, without mentioning any organization .

The poster said that at first it was just idle, hanging out in the background of a bunch of databases, and logged in to an account when it was boring to hit the database.

The account seemed to belong to a browsing authority account under some database, and it happened that he was bored, so he logged in to this account to browse the contents of the database.

At the beginning, everything was normal. The content that can be seen on this account is also some boring medical materials. Occasionally, there are some content with a storyline. It seems that most of them are made up. It is just a library to collect basic data.

It wasn't until he looked through all the materials that could be viewed under the authority of this account that he discovered a somewhat strange research project.

This strange research project can only see the continuous failure of the research results in the account. In the two years of project research, there has been no success once. In the description of the progress of the project, account permissions can only see the result report.In the two-year record, all the results were failures, but even so, the funds for the project are still adequately supplied, and there is no sign of reduction.

This is very strange. Generally speaking, according to common sense, the projects that the organization has been failing should have their funds cut even if they are not cut, but this project has failed so many experiments and still maintains such a high funding supply. It's hard not to arouse curiosity about its specific content.

The authority of the account is very low. It looks like a randomly generated member account on a computer that is only connected to the intranet. Anyone who can use this computer can log in to the account to obtain information. After the poster discovered this, he decisively invaded I logged into this computer, and found an account with higher authority step by step through the information I had logged in on the computer and the content I had browsed.

The confidentiality of the project seems to be extremely high. The poster hacked into four accounts in a row. The permissions of these accounts are higher than the other, but none of them can see the whole picture of the project.

So he started digging along the database, and finally saw the whole picture of the project, and also saw some strange content.

The content of the experiment is about some viruses with extremely high infection rate and death rate, and there are many contradictory experimental results in the layer-by-layer encrypted content.

The results of these experiments are neatly divided into two parts, one is the ideal and the other is the failure. Each experiment will produce an infinite number of such results. Among these results, the successful results are classified into the ideal result category, and the failed results are classified into the result failure. In the category, accounts with insufficient external permissions can only see failure results.

This is not something to be curious about, but the problem is that these experimental results are not one-to-one correspondence.

Since it is the final human experiment of a certain drug, the particularity of the experiment determines that it is completely impossible to group it. According to common sense, one patient can only get one result in one experiment.But the strange thing is that each of their experiments produced many different experimental results. In other words, an experiment that was destined to only get one result now has many different results, both good and bad. Data and time are exactly the same.

What's even more confusing is that the results of these experiments are exactly the same in terms of the time and location of data recording, but the only difference is the experimental track that participated in the experiment.

The names of these experimenters are the same, but they are marked with different numbers after different results.

The numbers marked after the names of the drug test volunteers for each result are the same. Although the poster was confused at first, he thought it was the serial number indicating the order of the experiment.

Immediately he discovered something amiss. For example, in the last experiment, the patient corresponding to the experimenter with serial number 10 had obviously passed away, but in the next experiment, there was no such patient except the experimental group with serial number 10. , the existence of this person can still be seen in other experimental results with other serial numbers.

The serial number group in this record is like a record of experimental results in a parallel world. As time goes by, the data that was completely consistent at the beginning has been deviated from experiment to experiment, and the data in all experimental groups with different serial numbers gradually become different. When the experiment progressed to the later stage, it was no longer possible to see that these people with the same name and different serial numbers were actually the same person by looking at various parameters except for the name.

At this point in the post, many people have entered the originally deserted post. Many people began to suspect that the poster was making up a story. In addition to saying that he hacked the computer, he also mentioned illegal human experiments. Coupled with the messy psychedelic content behind it, some people even think that the person who posted the post was just taking drugs and doing nothing to post.

The mysterious poster remained unmoved when they questioned them, until he saw this line of questioning, and then replied in an extremely calm tone: [There is nothing to question, there are everyone in this forum, and I would also like to post this post. It's just asking for the answer alone in the middle of the night when I can't figure it out. Since no one has replied now, it means that others don't know either.As for the authenticity of the content, wait, I will post a proof. 】

The questioner also stayed in front of the computer all the time. After seeing the poster's reply, he quickly replied: [Hackers break the law. If you are not afraid of being caught, post it. 】

After a few minutes, the poster's reply slowly appeared in the column of the latest reply: [No one can catch me:)]

As soon as this provocative sentence came out, it instantly caught everyone's appetite, but at this point, the poster did not send any more updates.

After more than ten minutes, when everyone was arguing, the poster suddenly posted a picture, and the post was quickly locked and deleted.

The time it took for the picture to go out was even just a few seconds faster than the time it took for the post to be deleted.

Almost no one saw the photo, and all the forum users waiting in front of the computer for the mysterious hacker to post were blown up.

The reason why this forum is a mixed bag is because it does not have any administrators at all. There are no express rules inside the forum, only unspoken rules that are tacit among users and never mentioned on the table. This is an outside area of ​​the law. As long as You have the confidence to post anything you can think of without being approached.

It is precisely because of this that this rapidly deleted post instantly shocked everyone.

Countless posts about this matter began to pour out in the forum crazily, and almost everyone was asking what was in the photo. Among the titles asking about the content of the photo, there was one claiming to be the same as the person who posted it just now. In the post sent by a user who has had a crush on each other, he said that he saw the beginning of the picture about halfway through loading, which is really incredible, as if these results recorded the data of the same experiment in countless parallel spaces.

It is difficult to describe the specific content clearly in the title. He just left a last message, and this post was quickly locked and deleted.

Now almost all the posts on the homepage of the forum are discussing this matter, but the original hacker and the poster never appeared again.

The users in the forum are almost all over the world. Until around one o'clock in the morning in Tokyo, the excitement in the forum has not subsided, and people continue to open new posts to discuss this matter.

In a newly posted post just after two o'clock in the morning, an anonymous user posted a message: [I just woke up, was there any big news here last night? 】

The users who watched the whole incident began to popularize this farce for him.

At 02:30 in the morning, Ryo Kawakami, who had been staying in front of the computer without sleeping, received a message.

This message hung brightly in the middle of the computer screen, and was thoughtfully translated into Japanese.

【Brother, are you okay? 】

Bai Lan hacked into his computer through the residual data stream in the forum database.

The fish is hooked.

The author has something to say: I am not a computer student. I don’t understand how to hack other people’s computers. I just wrote it in random. With my superficial knowledge of computers... maybe someone can do it. Orz if someone learns this If the little angel finds a bug, let's pretend he didn't see it, just pretend that Bai Lan is awesome (.

----------

感谢上一章的订阅评论投喂!好久不见我又回归了只比九点早半个小时码完字的日子orz头顶空空如也一滴也没有了的存稿箱求评论!感谢在2021-05-0320:52:51~2021-05-0420:31:56期间为我投出霸王票或灌溉营养液的小天使哦~

Thanks to the little angel of irrigation nutrient solution: 1 bottle of pigeon repair;

Thank you very much for your support, I will continue to work hard!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like