The Technology Tree of Xueba
Chapter 61 Krypton Programmer
Four days have passed since the hacker war, and the memory of netizens is comparable to that of goldfish, and the network tension it brought has disappeared.
The live video released by Kuaishou anchor [Yizhihua] three days ago detonated the programmer circle.
In the live video, the host [Yizhihua] opened the holographic bracelet, and there were dozens of programs with unknown functions on it.
Now it is rumored that the hackers on the Hacker Supreme List are powerful, and Waguo has no shame in saying that those people on the Hacker Supreme List released by Xinghuo Technology are innocent.
In order to vent my anger on Xinghuo Technology, I will now hack into the computer of the top hacker list, Shenhe Erlang.
[One Flower] The live broadcast barrage shows netizens laughing at him.
You can pull it off, can you program? You post jokes every day to pretend to be a girl. We old fans don't know how much you earn, and it's only 4,000 yuan a month. You really have the ability to make fun of this little money. We are happy.
If you can really challenge the Hacker Supreme List, don't challenge the 250th place Shenhe Erlang, if you have the ability to challenge the 5th place, even if you challenge a guy who ranks last, you will not be able to show your ability.
You bastard, pretend to be a slut for me, tease me, Lele, I will reward you if I am happy today, what kind of wolf with a tail are you pretending to be, no one knows what you are capable of, so don't play dead.
[One Flower]: The next moment is when I will perform on stage, and I will shock your jaws.
He opened a software named positioning, and entered Shenhe Erlang's location on it. This information has already been revealed by Xinghuo Technology.
Software prompt: [The location has been locked, and the target electronic device has been found. 】
He opened the software in turn to search for vulnerabilities, intrusion, data disguise, and virus production.
[Yizhihua] said excitedly: I wrote these programs, and their abilities represent my abilities. Everyone wait for the results with me.
Netizens complained directly.
666, this is completely a fool's operation, I can do it myself.
You still want to cheat for a reward with this kind of operation, I thought you were really capable.
Software is operated like a fool, and if you can beat the 250th place in the Hacker Supreme List, you can believe who is stupid. Don't use bean buns as dry food. There are hundreds of thousands of hackers in the world, and the 250th place is also very skilled.
[A Flower] Smiling mysteriously, he clicked on the Protoss Bracelet software store.
Purchase level 3 artificial intelligence for 60 minutes.
Software prompt: [Successfully deducted 10,000 yuan, the 60-minute countdown of level 3 artificial intelligence starts]
The software data of Xingling Bracelet flashed some words that ordinary people could not understand.
Professional programmers can understand that these are professional network intrusion vocabulary, and this intrusion is a classic network intrusion model tutorial.
The software quickly ran automatically for 58 minutes, and the holographic image displayed the desktop of Shenhe Erlang's laptop, on which Your technical real dish was written in Chinese characters.
The Kuaishou anchor is just for entertainment, opportunistic to become an Internet celebrity, but this video has attracted the attention of the programmer circle.
The program used by the anchor is not available in the market at all, and he wrote it himself.
But the anchor is a software coded by artificial intelligence through the logical intelligent module of the Chinese programming language software, using a fool-like writing method.
This means that an ordinary person, as long as he has an excellent programming idea, can buy Spark Technology's artificial intelligence service and write excellent software.
Technology is not as important as programming thinking, and the technical value of programmers is greatly reduced overnight.
In order to distinguish, the orthodox programmer circle dubbed those who write software through logical intelligent modules as krypton programmers.
A netizen [Devil is in the World] released the source code of the software he wrote in the Spark Technology open source community.
The name of the software is Whispering, which belongs to the blockchain forum and does not retain any private information of the log-in, including IP addresses and MAC device codes.
The software does not have a server, and all post data is split into thousands of small data, which are distributed and stored on the login device.
Everyone can save any information on their own devices, and the posts in the public area will be automatically destroyed after only one week of existence.
Whispering sticky announcements.
【The devil is in the world】: Friends, welcome to Whispering.
We are a serious forum here, not the dark web. I have set up an artificial intelligence housekeeper, and posts about illegal transactions, dating, gambling, etc. will be deleted directly.
You must not relax yourself here, we whisper software will not collect any information from you, but the software uses the development platform provided by Xinghuo Technology.
Xinghuo Technology must have the technical strength to capture your true identity. Once you get angry and complain, the public security department will directly send a letter to Xinghuo Technology to assist in the investigation, and you will definitely not be able to escape.
Don't challenge the best silly eagle news of 2019, I don't want to see your news on TV.
【Tou Tiewa】: I really like the atmosphere here, and I finally found a website where the speeches are not harmonious.
[Happy Angel]: In the past, whether it was on the post bar or on Weibo, as long as it was sensitive information, it would be controlled by the trolls or deleted for a fee.
The information we see is all the information we want to see after being screened by the capital, and we finally find a home-like feeling here.
[30 million sacrifices to heroes at a distance] Publish a news video in the Whispering software.
Filmed on TV Tokyo at 14:09:36 on August 7th, Tokyo time.
A fire broke out at the Yasukuni Shrine, the most sacred place in the hearts of Japanese Communists, and the building enshrining the Class-A war criminals of World War II was burned by the fire.
[30 million sacrifices to heroes in the distance] I will explain it to everyone below the video.
I'm a cynic, I usually have no skills, I'm doing my own job in obscurity, and I'm alone except for some money.
My great-grandfather and his family were wiped out by the devils, and only my grandfather was left out of more than 200 clansmen. The devils and I had a deep hatred.
Krypton gold programmers gave me inspiration, as long as I krypton gold, I can krypton out the program I want, which is great for me.
With only a few million pocket money, I can realize my wish, even if it fails.
I let the artificial intelligence write a program and tried to hack into the Japanese Tokyo Telecom network, the gas company network, and the electric power network. The process was very easy, and I successfully controlled these networks.
Thanks to the degree of automation of the Japanese country, the direct control of the electronic valve of natural gas allows natural gas to leak on a large scale. The smell of natural gas will definitely arouse people's vigilance.
I control the telecommunications network and intercept all data sent from equipment around the Yasukuni Shrine.
Call the natural gas company, the software will automatically intercept it, and tell them with an analog voice that the leakage is very small, and they will come to repair it soon without any problems.
The software automatically intercepts the alarm call and asks for details through the intelligent voice, resulting in signs that the alarm has been received.
Automatically tamper with text messages and network return data, making everything that happens around the Yasukuni Shrine invisible on the Internet.
In the end, as long as you control the power system to generate a small spark, a huge firework will bloom. You can see how beautiful the scene in the news is.
[Tu Wan is Weixiong]: Worship! Even if you give me a few million, I can't design this kind of software programming ideas.
A boss is a boss in any field. The IQ gap between people is bigger than the IQ gap between humans and pigs. I am convinced.
[Mayfly shaking the tree]: Worship the boss, we are the krypton gold programmers, and you are the krypton gold network engineer.
Originally, I wanted to show off my feat. Compared with you, the gap is too big. This is a matter of different layouts.
I hacked into the Bank of Japan through the weak electric signal of the wires. I dare not touch the money there, for fear of revealing my identity.
However, the Fukushima accident in Japan in 11 years left more than 100,000 people homeless, and now 9 years later, there are still 50,000 to 60,000 people who have not been resettled.
I found out in my conscience that the more than 200 billion yen used by the Ministry of Foreign Affairs to cultivate Weibo, Bilibili and other platform trolls was sent to the disaster victims in Japan in the name of post-disaster relief funds.
The emergence of krypton gold programmers has turned the entire network upside down. It is more destructive than hackers. Hackers are a little in awe of technology through step-by-step learning, and they also know some untouchable bottom lines.
Krypton gold programmers believe that money can do whatever they want, and their hearts will swell after acquiring technology.
Smart people will not go too far if they try foreign knives.
Some greedy people actually committed crimes in China. They tampered with bank passwords, tampered with game company data, and stole other people's private information.
In the end, the Ministry of Industry and Information Technology and the Ministry of Public Security set up a special investigation team and issued an official letter for Spark Technology to cooperate. None of these people have escaped legal sanctions.
The emergence of krypton gold programmers has also changed the ecological environment of the entire network, and the Internet has entered a more efficient era of innovation.
Thanks to Book Friends 150719183048241 and My little brother is Hua Tsai for their rewards.
You'll Also Like
-
Trickster Hunter
Chapter 363 2 hours ago -
The giant corporations that started in Night City
Chapter 385 4 hours ago -
The apocalypse is weird: I am the number one containment object, what's wrong with being a litt
Chapter 612 4 hours ago -
Time and space transaction: Exchange food for the elf princess at the beginning
Chapter 503 4 hours ago -
I, the villain, trained the loser into a dark boss
Chapter 374 7 hours ago -
Multifunctional Sword Cultivation Starts from Taxi
Chapter 23 7 hours ago -
The commander-in-chief is handsome and charming
Chapter 409 14 hours ago -
Elf: I became the king, the system is online
Chapter 162 14 hours ago -
One Piece: The Straw Hat Pirates' Max-Level Swordsman
Chapter 462 14 hours ago -
Pokémon: Thunder Shatters the Darkness
Chapter 445 14 hours ago