Overlord of the Demon Realm

Chapter 417: Roast chicken

The little beauty in front of the computer is a software sister.

"Try the newly purchased DDOS software, hehe hey, I'm going to abuse the rookie on the opposite side, and make him cry with tears!" The little girl wore a cat ear **** and a lollipop in her mouth, with anger General tone: "Last week, I actually matched a Chinese army (third rank), Mader, and the computer were all broken down by him, and I left a message mocking me..."

"Isn't it better technology? Why look down on people?"

The cat-eared sister thought of the scene last week, her chest fluctuated with rage, her little fist clenched tightly.

Because of the use of the software, they are like the plug-ins in the e-sports games, they are despised by people in the hacker circle, and even, they do not recognize them as a member of the hacker.

same,

In the competition, if the hackers defeat the opponent, but find out that they are a software brother/soft girl, they will immediately ridicule roulette, even if the opponent is a soft girl, they will not be merciless.

In this regard, they are somewhat similar to e-sports gamers. No matter who it is, as long as the plug-in is turned on, it will definitely spray it, not for other things, only for the bottom line and persistence of this industry.

When the hacker/e-sports industry no longer talks about personal technology, but depends on some tools, it will be completely destroyed.

The cat ear sister opened the DDOS software and glanced at it. The site displayed on the PK page was skillfully entering the IP address. Then, she smiled and said: "Hum, this tool is from the legendary god, I bought it for 3500 Fed currency, which doubled the amount of attacks compared to the previous tools. Even if you are a hacker in the middle of the army, you have to be in a hurry. Even, there may be a fish pond overturning... ..."

The quality of DDOS software is related to the broiler chickens opened by the producer. If there are enough broiler chickens, the quality is also good enough. The power of a DDOS software is not even lower than that of professional hackers.

Broilers, refers to the number of computers controlled by hackers. Computers that are usually implanted with viruses will be reduced to hackers' broilers. They use broilers to attack other places, which will cause the broilers to respond to insufficient resources. System freezes, non-stop buffering, and even crashes-computers with viruses are often like this.

The hacker is the general, and the broiler is the soldier under his command. As long as there are enough soldiers, even, it can make up for a certain technical gap.

The cat ear sister spent a lot of effort for the software. After bursts of soft and hard foam, she successfully obtained the permission to use it from the ‘great god’.

This Friday's "Afternoon Tea" is exactly her first battle. According to the previous points, she only needs to win another one (the last time she lost to the Chinese Army, because of the large difference between the two sides, the cat ear sister's With very few deductions), you can be promoted to the guard rank and enjoy new benefits!

Different ranks also have different benefits on the Osiris website, such as auxiliary functions when querying information: automatic search for keywords, narrowing the search scope, and even, querying undisclosed secret information... Hacker rank The higher, the more benefits you enjoy.

Otherwise, how can Osiris attract a large group of hackers? Even more, let them consider a pure intelligence website as the best place for online gatherings, a sacred place for hackers in the post-PC era!

After all, the birth of virtual devices gradually threatens the PC side (commonly known as computers), so that the human center of gravity gradually shifts to the world of magic. It is foreseeable that the future PC will gradually decline. The hackers who rely on it also have a feeling of homelessness. The hesitation and confusion cover them. Only on the website of Osiris can they find To a trace of presence.

Who would have thought that the PC-side hacker that used to be so popular would now become a ——

deadgame (game to fight to the end, here refers to the industry that is about to die)

Despite this, they still stick to this, and at three o'clock in the afternoon of every Friday, there is a battle where no smoke is seen. This is their belief and their persistence.

"IP address input is complete...OK!"

The cat ear girl smiled. Next, she only needs to start the software and let it attack the site continuously, forcing the other party to opt out and give up the site, which is her victory!

Anyway, the battlefield is a small website without any protection. The defense situation is also full of loopholes. A wave of DDOS can paralyze it. A simple and crude solution.

The battlefield set by Osiris is just a small website with the most initialization. The server resources it has are also very limited. It does not appear on search engines, nor will it be visited by outsiders.

"Shiver in despair, poor little rookie."

The cat ear sister gently clicked the mouse, and the next second, the DDOS software started its operation, and automatically launched a flood-like attack towards the site, and waves of spam also swarmed away.

Taking advantage of this gap, the cat-eared sister glanced at her, and the other party's avatar border was the same as her, and she was also a guardian.

"Huh, a bottom-grown chicken, it seems that this is stable." The cat-eared girl simply put up her long legs and leaned her back on the chair, sitting in an indecent sitting position, but no one saw it: "Shangfen! Top score!!!"

The same moment

Ye Kong has successfully sneaked into the background of the site through the springboard, and successfully deciphered its weak password (pointing to a very simple password), and obtained the administrator's authority.

According to the normal process, the battle between hackers is to invade the background of the website. The hacker who first grabs the management authority begins to deploy various methods to protect the website. As for the hacker behind, we must try our best to break through the heavy blockade of the opponent, **** the administrative authority of the website, and kick the opponent out.

In this process, if the two sides have equal strengths, their identities will be exchanged frequently. For a while, they will be intruders, and for a while they will become defenders.

If the strength of the two sides differs too much, the entire battle will be no suspense. Basically, a powerful hacker always occupies the website, and the weaker side can't get the management authority by trying its best.

Ye Kong hasn't been in combat with people for a long time. He has a bit of itchiness in his hand. He doesn't plan to shoot the other party at once. He just sets up a'simple' firewall and waits quietly for the other party to come to the door.

then.......

"Huh? So much spam? Flood attacks as soon as you come up, don't you try to decipher the firewall?"

Ye Kong looked at the data on the screen and couldn't help but startled.

The other party's actions are unreasonable. If the server is directly destroyed by the non-stop DDOS attack, no one will benefit. For example, two people made an appointment for private gambling, and one of them suddenly called the police. After the note came, the casino was directly sealed..... harming others!

Ye Kong thought for a moment, and clarified the problem by tapping his head: "I understand, it turned out to be a software sister....Since that's the case, I don't have to keep my hands."

So, Ye Kong's slender fingers touched the keyboard, and the next moment, he beat like a wild dance.

Boom Boom Boom!

..............

The same moment

In a sloppy male dormitory

An uncle who is nearly 30 years old, leaning back on his chair, is intensively attacking a site. His opponent is also a ‘legend’ (fifth stage), and there is no room for negligence.

When the codes on both sides were in full swing, suddenly, the uncle discovered that his broilers were not right, and they were dying one by one at a terrifying speed.

"what happened?!"

The uncle couldn't help being frightened.

................

Pink boudoir

"Hey, hey, half a minute has passed, you should be unable to hold on?"

The cat ear girl looked at the time on the screen, as if seeing the other party's hands squandered, and suddenly her heart was full of pride.

Dididi!

Her bracelet rang suddenly~www.NovelMTL.com~Huh? "

The cat ear sister found out that it was the caller, and it was the ‘legendary’ **** who hurriedly confirmed the call. As a result, at the other end of the call, only one sentence came—

"Cat Claw Rice, CNM!"

boom!

The call was hung up. At the same time, the cat ear sister's "client" software, a prompt popped up: your account is disqualified.

Snapped!

The software shut down automatically. The cat-eared girl froze for a few seconds, subconsciously focusing on the software, but got a sentence: "Sorry, your account does not have permission to use."

"......"

The cat ear sister was lost in confusion.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like