He sighed relentlessly. 【26nbsp;】He never wanted to accept such an ugly girl as his apprentice.The ghoul in front of her is a closed disciple chosen by Master Shenlong himself.

I really don't know why Master Shenlong has his eyes on her.People are also so ugly, and their understanding of computers is only at the initial stage, and they are still far from being a real hacker. I don't know how long it will take to train.No matter how you look at it, it's not as good as another girl who was selected to study hacking at the same time, right?They are codenamed Phoenix.

It's just that this code name is much stronger than the name of the ghoul in front of me!

Chu Yifan pursed her lips, and when she saw the Wuqing in front of her telling her that her master didn't know who it was, she already smiled calmly and didn't continue to ask.

"I hope you can learn hacking knowledge seriously, and don't embarrass your master. This is a tutorial I gave you. You learn slowly, and in this tutorial, there is a folder hidden, which contains some hackers that others can't crack. Programs. If you can crack all these programs, you are truly qualified to meet your master."

As soon as the fonts on the computer screen were typed, Chu Yifan saw that there was a tutorial named folder on his desktop inexplicably and instantly.

"Ghoul, you have to buy a personal computer yourself. Maybe not just one, but at least five. One is a portable laptop, and the other four are ordinary computers. Remember not to be afraid of spending money. It must be of good quality. Anyway, you still have 5 yuan on hand..."

Chu Yifan looked at Wuqing speechlessly.He didn't know how to find out about him, even how much money was in her account.Pursing her lips, if she knew it earlier, she would directly use the card Liu Ming gave to pay instead of transferring the money to her own account.

Touched his chin.This ruthlessness made her buy such a thing, probably to let her assemble a computer that is most suitable for her, right?Whether it is some files or tools in the computer, it is indeed very convenient for her to have a hacker computer of her own.

And generally, the computers assembled by oneself, or made by research and processing, must have much better performance than the ones usually bought.

,,

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like