48 Hours a Day

Chapter 392

You can search for “I have 100 hours a day” at imiaobige.com in 48 degrees to find the latest chapter!

Many people equate geeks with hackers, but there are certain differences between the two.

The word geek comes from the American slang geek. It originally refers to people who have an avid interest in one or several specific fields and have invested a lot of time in research. They are mostly used in the computer field. At the beginning, they have a certain derogatory color in the pc revolution. Early-Stage is also a derogatory term for hackers.

But now, especially after the rise of a number of Silicon Valley gangsters such as Jobs and Gates, the word geek has also been given a new meaning, and it has begun to be more labeled as free, creative and broken.

Yes, geeks are such a group of people. They are adventurers on the Internet, hardware enthusiasts, hackers, communication hobbys, technology houses, programmers, engineers …

“Simply put, you can be anyone, as long as it conforms to our spirit, you can join the 01 guerrillas,” Phillip said. “Of course, the vast majority of people who join are still related to computers, although we always hope to have Join the female child of the cheerleader or dancer. “

“………”

“We have our own secret forum with self-made instant messaging software. We usually discuss some technical issues on it. You can also put your own problems on it and the others to answer them, or simply show off your skills. The people are very good. “

“Is Edward also one of you?” Zhang Heng asked.

“No, Edward. He … not ours.” Mawei said malely.

Zhang Heng raised his eyebrows.

“Probably a year ago, Edward hacked into our forum, the website we built together.” Valdo still looked surprised when he mentioned this matter.

“Is it difficult?”

“Uh, it’s not too difficult, it’s a little simpler than the black defense system.” Philip said, “The most important thing is that he still did it quietly, if not afterwards he left Information to us, we have absolutely no idea that he has been here. “

“what’s the message?”

“In the beginning, it was just a hello-like thing, you know, the hackers said it was low-key, but in fact, many of them are a group of people who are eager to pay attention, especially the more difficult goals and bad Where I go in, I always ca n’t help but leave something. For example, I knew there was a guy who slipped into the human resources system of the telecommunications giant SFR and sent SFR more to each employee who was working overtime that night. Little red flower. “

“what.”

“That guy is the same too. He left a Pac-Man pixel map, but it ’s very small. In the lower right corner of the homepage, it ca n’t be seen without careful attention. In short, it ’s our first encounter with Edward. , And then we reworked the firewall and encryption system, but the guy finally successfully invaded. “

“Are you angry?”

Ma Weinan pushed his glasses, “angry? No, no, this is like a fun game for us, we enjoy the feeling of playing against that guy, so we have re-launched the forum again, but you can probably guess By the time, he defeated us again … but in the process we were all very happy, and from that time on, we started to have further communication.

“We always thought that the opposite side was a group like us, but the facts made us startled. The guy said he was called Edward and there was only one person. He said that he was hired by a very difficult to deal with agency. He was making a very cool and can Subversion of World’s project, once successful, will change the way of life for everyone, but the content and address must be kept confidential.

“We at first actually didn’t take this matter too seriously, because you know, hackers, no one doesn’t like bragging, they will always brag to you how powerful they are in the past, but in fact the vast majority of people even They did n’t boast about half of them. Edward was very difficult to deal with. I also admit this. No, it ’s not an exaggeration to say that he is the most powerful guy I ’ve ever seen, but it ’s a bit too exaggerated to subvert World and so on. But no matter what, we can be considered a new friend. “

“In the following time, Edward will come to our forum from time to time, bragging with us, and occasionally revealing some recent events, but basically it is just what short skirt the administrator is wearing today, how about lunch, he is a The guy with a strong contract spirit never discusses specific work. Until a month ago, we suddenly got news from him that he did n’t know if he was doing the right thing. “

Philip said, “I asked him what happened, was it a bit of stress at work recently, but he didn’t reply, and after another week, he suddenly contacted me and said that he escaped and he had something important in his hand, I asked him what it was, and he sent me a document, and from that document I saw that things might really be a little bit bad. “

“What’s wrong?”

Philip looked around and lowered his voice. “This is a project called CTOS. They plan to build a powerful central control system that connects all public facilities in the city to the network, like installing a brain for the city. In the same way, from the huge amount of data, clearly understood naked eye cannot find hidden rules, so that it can overcome the problem that in the past, because decision-makers with limited information can only do local optimal strategies and cannot find the global optimal solution. Allocate public resources to avoid waste.

“Let ’s make an analogy by connecting the signal lights of all intersections to the network. You can re-plan and calculate the optimal time allocation of each signal light to save travel time. At the same time, if there is an accident on the road, the city brain will also directly report the alarm to the hospital , Let the ambulance arrive in the shortest time. “

“Sounds good.”

“Yes, Edward felt the same way at first, but then he discovered that there are other purposes hidden behind CTOS. Once this system is established, not only those public facilities, it will also actively collect data information of all citizens, your phone text messages, Medical records, medical insurance numbers, criminal records, favorite websites, chat partners, browsing records, chat content, and every credit card consumption will be controlled by it. “

“This is a disaster.” Mawei said.

“Yes, this means that from now on we will be under the surveillance of others. We no longer have any privacy, and even the room is full of cameras.” Valdo also became very serious. “You don’t know when they will mobilize your PC or mobile phone, or even your drone.”

“And if it goes on like this, things may get worse. This is only the 1st stage. At the 2nd stage, CTOS will automatically analyze and mark everyone ’s dangerous tendencies. Of course, it is a good thing to stop crime in advance. But we do n’t know in what way and algorithm it uses to calculate everyone ’s dangerous tendencies. Without restrictions, each of us may be labeled as a dangerous person. “

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like