Daily Updates!
Stay informed of NEWEST chapters of HacKer (updated) with notification directly sent to your email.
LOG IN
……
h recruits Peripheral Organization Member, inspection Server of use, indeed has used the Virtual Server plan, through the resources that [Interweave Net Miwang] provides, Shi Lei has constructed Virtual Server, but this Virtual Server, has used the Shi Lei unique technology, even if Hacker with Grade, if not spend the numerous time study, Unable to Judge comes out.
Shi Lei is observing Mysterious Hacker and Second field inspects the contest of Server, is similar to First Round inspects Server to be the same, the Second field inspects Server from the beginning, then falls into inescapable net that Mysterious Hacker has interwoven.
The Second field inspects Level that Server aims , was mainly World Second-rate Hacker, the Mysterious Hacker technology has gone far beyond this Grade. Therefore, processing that Mysterious Hacker accomplishes a task with ease the Second field is inspecting Server Defense System with counter-attacking System.
Shi Lei is only the observation of quiet the Mysterious Hacker invasion side type, opinion that has not meddled, even if the Second field inspects Server, almost does not have the strength of revolt, Shi Lei has not gotten rid personally.
Some mysterious Room, Mysterious Hacker both hands are bringing the glove, sharply not slow the rap on the keyboard, has not been enhancing raps the hand of keyboard fast.
This on behalf, Mysterious Hacker is confident, does not care about the Second field to inspect Server Defense System, does not care to counter-attack System, he has the absolute assurance to win!
„The defense intensity enhanced large section!” Mysterious Hacker copes with the Second field to inspect Server, while thought aloud is saying.
Regarding the Server defense intensity, each Hacker in the heart, has an own weight and measure. The h appraisal system of Shi Lei design, basically was synthesizes the boundary of mainstream populace is the reference.
Mysterious Hacker stopped rapping the keyboard suddenly, made the Second field inspect the Server counter-attack intentionally, as if he a little could not resist was the same. This is Mysterious Hacker is analyzing the Second field to inspect Server, the plan and intensity of counter-attack.
‚Before the First Server defense intensity and counter-attack intensity, almost slightly were lower than World Third-rate standard. Meanwhile. Inspects the Server computation speed to be also not much. If participates in the inspection Hacker, has achieved World Third-rate standard. And has reliable performance computer, breaks the First Server opportunity to be very big.’ Mysterious Hacker is pondering in in the heart secretly.
‚As for present this Server, the computation speed should increase ten times to continue, and Defense System does well, almost close World Second-rate standard, has looked like this h Organization, really some strengths, at least Assessment System does very well!’ Mysterious Hacker in heart. Not being able to say is the praise, was teasing.
After all, Mysterious Hacker almost disregarded the Second field to inspect Server, completely was the one-sided fight. If not Mysterious Hacker, not only need through the test, but must fetter the Second field to inspect Server not to transmit information to exit, and prevents to be discovered by h, perhaps the Second field inspected Server already to be broken through by him!
In the even though so many restriction(s) situations, this mysterious Hacker, showed the shocking strength as before. The fast explaining Second field inspects Server Defense System.
About ten minutes, the Second field inspects Server all Defense System to be broken through, all counter-attacks System to be restrained. Mysterious Hacker announced that the accomplish Second field inspects the test of Server.
Inspects the Server interior in the Second field, Mysterious Hacker links for one minute not to spend, had found the Third field to inspect Server concrete Link Address.
„Does sir, enhance the Third field to inspect the Server Safety defense strategy?” [Izual] is observing the invasion of Mysterious Hacker anytime and anywhere, consecutively two test by Mysterious Hacker is broken through easily, [Izual] according to conditioned reflex determine, put forward the proposal to Shi Lei.
But Shi Lei shook the head, the situation of Third field test is absolutely unchangeable!
If the Upgrade Third field inspects the Server Safety defense strategy, may by the Mysterious Hacker discovery flaw. After all. Third field test choice Peripheral Organization Member, is not true Elite. Has no need for the big fee being flustered.
Shi Lei planned that inspects the Server interior in the Fourth field, sets up strict Security Defense System. Attempts to resist with this mysterious Hacker.
announcement(s) that after all h sends out said very explicitly, once other accomplish le Legend Rank test, then has qualifications becomes h Official Member, but is not only only Peripheral Member.
So in the situation, the Fourth field inspects the Server Safety defense strategy strictly, is passable, will not arouse suspicion.
„[Izual]!” Shi Lei shouted one lightly, „isolates the Mysterious Hacker use the Second field to inspect Server, once the opposite party left the Second field to inspect Server, prepared comprehensively to analyze the Second field to inspect the Server situation!”
„Yes , sir!” [Izual] in LIP Lens-type Information Processor Bone-sense Transmission Earpiece, was responding to the Shi Lei's instruction.
The Second field inspects in Server, mysterious Hacker was similar to First Round inspects Server to be the same, has rebuilt the defense strategy, and has carried on modify of certain extent.
First Round inspects in Server, Mysterious Hacker modify Safety strategy, as a result of Server by reset, but does not have any feedback result. This time, Mysterious Hacker had the related countermeasure.
‚The [Hope] Second field inspected Server after the conclusion use, directly by reset content! Snort, I do not believe that this h Organization, has that many independent Server, certainly is Virtual Server Construction inspection Server.’ The corners of the mouth of Mysterious Hacker, reveal wipe the sinister happy expression.
Mysterious Hacker in the Second field inspects in Server, the gravity head to confirmed of tail one time, the Safety defense strategy that he constructed, finally the satisfactory nod, left the Second field to inspect Server afterward, entered the Third field to inspect Server.
Facing the Third field inspects Server time, the attack that Mysterious Hacker has not worried, seemed inspected Server to block by the Third field was the same, both sides are refusing to budge.
But in fact, Mysterious Hacker is paying close attention to the Second field to inspect the Server situation!
After although he leaves the Second field inspected Server, then lost with the Second field inspected the connection of Server, but Mysterious Hacker is waiting , the method display function of his preinstall.
„Sir, Mysterious Hacker left the Second field to inspect Server, System has isolated the Second field to inspect Server, temporarily has not merged to join [Interweave Net Miwang].” [Izual] sends out the prompt.
Shi Lei nodded, „comprehensively analyzes the Second field to inspect the Server situation, analyzes the change of defense strategy with emphasis!”
The [Izual] implement order, started analysis, waited for a moment later, in the LIP Lens-type Information Processor Virtual transparence screen, demonstrates dense and numerous data information.
Shi Lei is examining these data information carefully, cannot help but has held breath cold air!
The Mysterious Hacker method is wise!
Shi Lei has to acknowledge that the Mysterious Hacker technology is very formidable, the opposite party almost reconstructed the Second field to inspect Server Defense System, and needed the implement code him, hid.
If merely is only this, Shi Lei will not feel surprisedly, makes Shi Lei feel that what truly is surprised, that Mysterious Hacker needs the implement code, integrated in the defense strategy completely, if the [Izual] simple conventional scanning, does not carry on the comprehensive scanning, definitely may neglect this issue.
After all, the Second field inspects the resources that Server has to be merely small, under the normal link, the [Izual] implement comprehensive scanning work, only simple reset Server, will then not collect the Server resources, returns to [Interweave Net Miwang].
Mysterious Hacker in the Second field inspects in Server, source code that implants, the First Item essential content, exactly as stated prevents the Server reset, and sends out the deceit feedback information.
Once fed back information to deceive [Izual], the Second field inspected Server then to be able complete lossless joining [Interweave Net Miwang], at this time, it was not the Second field inspects Server, but was Mysterious Hacker Zombie Server.
equivalent to Mysterious Hacker Zombie Server, has connected [Interweave Net Miwang], Mysterious Hacker then has to examine inw [Miwang] qualifications.
What is more mysterious, through [Izual]'s simulation deduction, when the Second field inspects Server, when by Mysterious Hacker Zombie identity, enters [Interweave Net Miwang], it once more will release to deceive information, integrates in entire [Interweave Net Miwang].
‚Originally this fellow determine came out, inspects Server to use the Virtual Server technology, unexpectedly wants to seep entire [Interweave Net Miwang], the ambition is not small!’ Shi Lei in the heart cold snort|hum, may have to acknowledge that the Mysterious Hacker technology is very strong.
Until this moment, Shi Lei basically can determine come out, this mysterious Hacker, impressively is World Summit Grade Hacker!
However, World Summit Grade Hacker, in the Worldwide range, is quite quite scarce character. Becoming World Summit Grade Hacker, not only needs the support of technical knowledge, but also needs the formidable talent ability.
Most Top Hacker, has not given related Technical Information, then can according to Technical Information, stepping Summit gradually. If so is really easy, Li Jian Nation Hacker already dominated the world, Xia Nation Hacker cocky opportunity?
‚This World Summit Grade is Hacker, actually who?’ Shi Lei in the heart has pondered, has the experience of another Life Journey, Shi Lei can pat the expression of chest, World Summit Grade Hacker within Worldwide range, he are somewhat many some understanding.
Even if DARPA Advanced Bureau old monster, Shi Lei also knows some situations! After all, the World Summit Grade Hacker circle, is so small, gains ground does not see to lower the head to see, wants not to know also difficultly.
Shi Lei is examining in the LIP Lens-type Information Processor Virtual transparence screen once more, about testing the Mysterious Hacker Second field inspects Server, data that comprehensively analyzes, Shi Lei had an answer faintly...
( to be continued )
ps: Everybody's is Spring Festival good?
Enter your email address that you used to register. We'll send you an email with detailed steps to reset your password.
By signing up, you agree to our Terms of Service and Privacy Policy.
Already a member? Log In
Stay informed of NEWEST chapters of HacKer (updated) with notification directly sent to your email.