Reborn Super Hacker
Chapter 215 John-
Text [The Matrix] Chapter 210 Five John-
"Commander, the supercomputer has been activated and can be used now!" Baim said. -
Sade nodded, "Well, everyone has worked hard. As long as the supercomputer invested by the European Union joins the battle to break through the level, with its computing speed of megabytes per second, we will not have a problem breaking a level in a minute." Sade is serious. talking. -
"Commander, do we need to restart these computers now?" Avril Lavigne asked. -
Sade shook his head after hearing this, "As long as the supercomputer is started, the nanochip inside it will drive the system, allowing 8 people to work at the same time. There is no need to be so troublesome." Sade explained. -
"But Commander, our data?" Yamamoto asked. -
Sade smiled, and replied: "Don't worry about this, our data is already stored in the hard disk of the supercomputer, don't worry about not having it!"-
Everyone breathed a sigh of relief when they heard this. -
- "Boss, now that we have disassembled all the Apollo viruses, should we find a way to trap them again, that organization will soon enter the next level!" Meka said.
Iverson didn't have much strength to entangle this matter at this time, and every time he sabotaged others, he almost couldn't escape himself. This kind of work is not what Iverson should learn. So after hearing Meka's question, he shook his head resolutely, "Meka, let's finish this level first, and then we can talk about it. Isn't there still 7% left, work hard!" Iverson said, suddenly Facing Gypsy, he continued: "Gypsy, please help Meka, don't keep complaining there!"
Gypsy glanced at Meka, then nodded towards Iverson.
After a while the hackerpig group has cracked level 25 and is now heading towards the level 26 website, and God is Stupid has now reached jaw-dropping proportions as he is now cracking the level 34 server , Such a speed has to make other organizations and hackers lament how poor their technology is. .
Meka monitored the internal program of the server on level 25, while observing the progress bar. "Boss, I always have an ominous premonition, but I can't tell what it is!" Meka said lightly.
After hearing Meka's words, Pace suddenly raised his head at this moment, looked at Meka, and there was a hint of admiration in his eyes!But Iverson was puzzled, "Meka, why do you say that. I don't think there is any major problem. Now that the hackerpig organization has left, only our organization is left. Besides, we have such a complete set of tools, how can it be possible?" Can't find the problem!" Iverson said with a smile.
However, before Iverson could finish speaking, a message was displayed on the server screen at level 25, "Start automatic restoration, automatically connect to www.***xx.com, already set! Returning! Please wait. .”
Meka was shocked when he saw it, "Why did the URL of level 15 pop up, how could this happen!" Meka shouted, and then he tapped the keyboard with both hands and entered a lot of codes , wanted to check the system message why such information appeared, but the system seemed to know what he was doing, and before he could check it clearly, they had re-entered the server of level 15!
Iverson stared dumbfounded at everything that happened suddenly, and it was all done in an instant. Iverson's first feeling was that they had been fooled again. How could this happen!He couldn't accept it.
However, when they entered the address of level 25 in the browser, the server suddenly popped up "wrong parameter"!This shows that they have now returned to the server of level 15.
Iverson hastily opened Apple's real-time ranking data. When he saw that his x organization's data showed that he was still at level 25, he wondered, why is this happening?Suddenly, he thought of a possibility, that is Kyle who helped him before, his one who decomposed the virus!That is, it can make the server where it is located become a virtual machine state that can be controlled remotely, just like a maze, endless loop!Iverson can't think too much, now he only thinks that Kyle betrayed them, and what he has to do now is to get rid of this Kyle first!
Iverson took out his mobile phone, made a call, and then showed an angry expression on his face! "Damn Kyle, you will regret it, I will never trust you again!"
When Meka heard this, he was taken aback for a moment, "Kyle wouldn't do such a thing, boss, you should ask first!" Meka said anxiously, after all, Kyle was also his old friend, and the two of them used to We often discuss and exchange technologies together, designate a website, and see who wins first will win. .
After hearing Meka's words, Iverson yelled: "Asshole, is it him or who, is there a second person in the world who can use 'decomposition virus'? All of us are now trapped in what seems to be level 15 Inside, and it keeps looping, it is exactly the same as the "decomposition virus" in the European Black League before. Kyle's virus only has his own source program, so we don't have to guess at all, he must have betrayed us! Damn it ..." After Iverson finished speaking, he picked up a cup on the table and threw it on the ground, the fragments of the cup splashed on the ground, and the sound made everyone jump.
Meka shook his head helplessly, sat down, and continued his task. The most important thing right now is to break this damned endless loop!
In an ordinary small bungalow in New York, country m, John opened his laptop at this time. This laptop was the last legacy left to him by his dead mother, and now he was living in his uncle's house.John has never disclosed to outsiders that he has a special feeling for computers. As soon as he sees a computer, he can immediately guess how old it is and how long it has been running, as if the computer was his first. The two lives are the same, today is his 17th birthday, just now his uncle bought him a small cake, and he returned to the room after eating. .
Looking at the flickering screen on the computer, John knew that this notebook had been with him for 3 years. John never made money online. He always imitated some well-known hackers to challenge others. It has been lurking in it for as long as 3 months, and he quit because he didn't want to play.John opened the Apple website now, and there is a large missing Apple logo on the homepage. Below is the ranking data. No. 1 is still Huaxia's "God is an idiot", and it is currently at level 37!When John saw this name, he couldn't help but feel excited, thinking that "God is a fool" is so powerful, John felt a rush of heat in his mind, and he was very excited at this time, suddenly, the words popped up in his mind now. A very special thought that goes beyond this "God is stupid", John put the computer on the bed. .
John dialed out the network cable connected from his uncle's room, because the network speed was not satisfactory, and the network speed is also a big key to the need to crack the server loaded with the Rayson system. After John dialed out, put the The laptop moved to a place less than one meter away from the window, and then sat down. What is John going to do now? I saw that he opened a program called "backtrackj" on the desktop. "Backtrackj" was packaged by John himself. The modification is a very famous hacker attack platform in the circle. To put it bluntly, it is a packaged linux operating system, which is the legendary software "backtrack" that can steal other people's networks! !This "backtrack" has a large number of built-in network security detection tools and hacker cracking software.It is famous for being able to crack wireless networks conveniently, and the built-in spoonwep is a very powerful tool for graphically cracking wep wireless network passwords!And John’s modified version is called “backtrackj”, which means unique, and its level surpasses the original version. As we all know, the “backtrack” tool can only crack the network encrypted by Wep, while John’s modified “backtrackj” can crack all encryption Network data, and the system John is using now is the system he encapsulated himself, and he named it "linuxj".
John opened "backtrackj" and immediately ran spoonwep. John has also revised this software and skipped many troublesome steps. Country m is the largest country in the world, and the network information technology is extremely developed. Wireless networks can be said to be everywhere. The entire country m, and what John wants to steal at this time is the network of a listed company not far away.Time passed by every minute and every second, and this dilapidated notebook was running at a high speed. John smiled at this time, because the company's password had appeared at this time. Although it was 128-bit encryption, it was less than 1 In minutes, John's tool captures packets, detects the same character string in many packets, and analyzes its passwords!
John quickly entered the connection password and connected to the network. Although he can directly bypass the other party's encryption restrictions, it may leave a tail. As a computer-obsessed teenager, John will not leave any clues for others !
With a network speed of 54m, John smiled helplessly, because he saw all the online computers of this company. If he needed, he could turn all these people into his control clients. Of course, the top-secret information of this company, John It can also be seen at a glance.
And what John has to do now is to immediately enter the hacker competition organized by Apple, because he has another goal, that is, "God is a fool"!Can this young man compete with Huang Fei? Let us wait and see!
ps: Xiaozhi broke the news. Xiaozhi is very bad. Now his notebooks at home are stealing other people’s internet speed, and he also uses the "backtrack" mentioned above. It is the third version, and now there is a fourth version. !But Xiaozhi's technology can only crack wep encryption, ha ha!The internet speed is not bad!Generally, it takes 3 minutes to crack one!
"Commander, the supercomputer has been activated and can be used now!" Baim said. -
Sade nodded, "Well, everyone has worked hard. As long as the supercomputer invested by the European Union joins the battle to break through the level, with its computing speed of megabytes per second, we will not have a problem breaking a level in a minute." Sade is serious. talking. -
"Commander, do we need to restart these computers now?" Avril Lavigne asked. -
Sade shook his head after hearing this, "As long as the supercomputer is started, the nanochip inside it will drive the system, allowing 8 people to work at the same time. There is no need to be so troublesome." Sade explained. -
"But Commander, our data?" Yamamoto asked. -
Sade smiled, and replied: "Don't worry about this, our data is already stored in the hard disk of the supercomputer, don't worry about not having it!"-
Everyone breathed a sigh of relief when they heard this. -
- "Boss, now that we have disassembled all the Apollo viruses, should we find a way to trap them again, that organization will soon enter the next level!" Meka said.
Iverson didn't have much strength to entangle this matter at this time, and every time he sabotaged others, he almost couldn't escape himself. This kind of work is not what Iverson should learn. So after hearing Meka's question, he shook his head resolutely, "Meka, let's finish this level first, and then we can talk about it. Isn't there still 7% left, work hard!" Iverson said, suddenly Facing Gypsy, he continued: "Gypsy, please help Meka, don't keep complaining there!"
Gypsy glanced at Meka, then nodded towards Iverson.
After a while the hackerpig group has cracked level 25 and is now heading towards the level 26 website, and God is Stupid has now reached jaw-dropping proportions as he is now cracking the level 34 server , Such a speed has to make other organizations and hackers lament how poor their technology is. .
Meka monitored the internal program of the server on level 25, while observing the progress bar. "Boss, I always have an ominous premonition, but I can't tell what it is!" Meka said lightly.
After hearing Meka's words, Pace suddenly raised his head at this moment, looked at Meka, and there was a hint of admiration in his eyes!But Iverson was puzzled, "Meka, why do you say that. I don't think there is any major problem. Now that the hackerpig organization has left, only our organization is left. Besides, we have such a complete set of tools, how can it be possible?" Can't find the problem!" Iverson said with a smile.
However, before Iverson could finish speaking, a message was displayed on the server screen at level 25, "Start automatic restoration, automatically connect to www.***xx.com, already set! Returning! Please wait. .”
Meka was shocked when he saw it, "Why did the URL of level 15 pop up, how could this happen!" Meka shouted, and then he tapped the keyboard with both hands and entered a lot of codes , wanted to check the system message why such information appeared, but the system seemed to know what he was doing, and before he could check it clearly, they had re-entered the server of level 15!
Iverson stared dumbfounded at everything that happened suddenly, and it was all done in an instant. Iverson's first feeling was that they had been fooled again. How could this happen!He couldn't accept it.
However, when they entered the address of level 25 in the browser, the server suddenly popped up "wrong parameter"!This shows that they have now returned to the server of level 15.
Iverson hastily opened Apple's real-time ranking data. When he saw that his x organization's data showed that he was still at level 25, he wondered, why is this happening?Suddenly, he thought of a possibility, that is Kyle who helped him before, his one who decomposed the virus!That is, it can make the server where it is located become a virtual machine state that can be controlled remotely, just like a maze, endless loop!Iverson can't think too much, now he only thinks that Kyle betrayed them, and what he has to do now is to get rid of this Kyle first!
Iverson took out his mobile phone, made a call, and then showed an angry expression on his face! "Damn Kyle, you will regret it, I will never trust you again!"
When Meka heard this, he was taken aback for a moment, "Kyle wouldn't do such a thing, boss, you should ask first!" Meka said anxiously, after all, Kyle was also his old friend, and the two of them used to We often discuss and exchange technologies together, designate a website, and see who wins first will win. .
After hearing Meka's words, Iverson yelled: "Asshole, is it him or who, is there a second person in the world who can use 'decomposition virus'? All of us are now trapped in what seems to be level 15 Inside, and it keeps looping, it is exactly the same as the "decomposition virus" in the European Black League before. Kyle's virus only has his own source program, so we don't have to guess at all, he must have betrayed us! Damn it ..." After Iverson finished speaking, he picked up a cup on the table and threw it on the ground, the fragments of the cup splashed on the ground, and the sound made everyone jump.
Meka shook his head helplessly, sat down, and continued his task. The most important thing right now is to break this damned endless loop!
In an ordinary small bungalow in New York, country m, John opened his laptop at this time. This laptop was the last legacy left to him by his dead mother, and now he was living in his uncle's house.John has never disclosed to outsiders that he has a special feeling for computers. As soon as he sees a computer, he can immediately guess how old it is and how long it has been running, as if the computer was his first. The two lives are the same, today is his 17th birthday, just now his uncle bought him a small cake, and he returned to the room after eating. .
Looking at the flickering screen on the computer, John knew that this notebook had been with him for 3 years. John never made money online. He always imitated some well-known hackers to challenge others. It has been lurking in it for as long as 3 months, and he quit because he didn't want to play.John opened the Apple website now, and there is a large missing Apple logo on the homepage. Below is the ranking data. No. 1 is still Huaxia's "God is an idiot", and it is currently at level 37!When John saw this name, he couldn't help but feel excited, thinking that "God is a fool" is so powerful, John felt a rush of heat in his mind, and he was very excited at this time, suddenly, the words popped up in his mind now. A very special thought that goes beyond this "God is stupid", John put the computer on the bed. .
John dialed out the network cable connected from his uncle's room, because the network speed was not satisfactory, and the network speed is also a big key to the need to crack the server loaded with the Rayson system. After John dialed out, put the The laptop moved to a place less than one meter away from the window, and then sat down. What is John going to do now? I saw that he opened a program called "backtrackj" on the desktop. "Backtrackj" was packaged by John himself. The modification is a very famous hacker attack platform in the circle. To put it bluntly, it is a packaged linux operating system, which is the legendary software "backtrack" that can steal other people's networks! !This "backtrack" has a large number of built-in network security detection tools and hacker cracking software.It is famous for being able to crack wireless networks conveniently, and the built-in spoonwep is a very powerful tool for graphically cracking wep wireless network passwords!And John’s modified version is called “backtrackj”, which means unique, and its level surpasses the original version. As we all know, the “backtrack” tool can only crack the network encrypted by Wep, while John’s modified “backtrackj” can crack all encryption Network data, and the system John is using now is the system he encapsulated himself, and he named it "linuxj".
John opened "backtrackj" and immediately ran spoonwep. John has also revised this software and skipped many troublesome steps. Country m is the largest country in the world, and the network information technology is extremely developed. Wireless networks can be said to be everywhere. The entire country m, and what John wants to steal at this time is the network of a listed company not far away.Time passed by every minute and every second, and this dilapidated notebook was running at a high speed. John smiled at this time, because the company's password had appeared at this time. Although it was 128-bit encryption, it was less than 1 In minutes, John's tool captures packets, detects the same character string in many packets, and analyzes its passwords!
John quickly entered the connection password and connected to the network. Although he can directly bypass the other party's encryption restrictions, it may leave a tail. As a computer-obsessed teenager, John will not leave any clues for others !
With a network speed of 54m, John smiled helplessly, because he saw all the online computers of this company. If he needed, he could turn all these people into his control clients. Of course, the top-secret information of this company, John It can also be seen at a glance.
And what John has to do now is to immediately enter the hacker competition organized by Apple, because he has another goal, that is, "God is a fool"!Can this young man compete with Huang Fei? Let us wait and see!
ps: Xiaozhi broke the news. Xiaozhi is very bad. Now his notebooks at home are stealing other people’s internet speed, and he also uses the "backtrack" mentioned above. It is the third version, and now there is a fourth version. !But Xiaozhi's technology can only crack wep encryption, ha ha!The internet speed is not bad!Generally, it takes 3 minutes to crack one!
You'll Also Like
-
The Fate of Eternal Life
Chapter 58 12 hours ago -
Douluo: Yu Hao is reborn, this Tang San is different
Chapter 91 12 hours ago -
Man covers the sky and conquers all worlds
Chapter 135 12 hours ago -
The prehistoric infrastructure maniac
Chapter 149 12 hours ago -
Devouring the Stars: Blood Sea Demon Lord
Chapter 129 12 hours ago -
Entertainment: Who still wants to fall in love when there are cheats?
Chapter 121 12 hours ago -
One person: Refining weapons? I told you to believe in science!
Chapter 116 12 hours ago -
People are devouring, and they are late bloomers.
Chapter 95 12 hours ago -
Douluo Jueshi: Martial Soul Brain Waves, Telekinesis
Chapter 114 12 hours ago -
The evil female's soft waist makes the interstellar boss unable to sleep at night
Chapter 196 12 hours ago