After knowing the ins and outs of the matter, Lin Yu was also a little speechless

Didn't this little brat seek death by himself? He even dared to snipe the peripheral members of the Baqi group by himself, and even sniped twice.

The most important thing is that even if she snipe at others, she still knows not to find someone to take care of her, because she wants to be a lone traveler.

And for a lone traveler like her without any backing to provoke the arrogance of a hacker organization, any hacker organization can't bear it, and will definitely chase her madly.

It's fine if she's strong in technique, and others have nothing to do with her, they can only let her run away after provoking.

But the problem is, with her skills and escape speed, she dares to provoke a hacker organization.

I have to say that this kid's head is really iron.

However, it is normal for her to do such a hot-headed and reckless thing with her age and temperament.

After all, they are young and frivolous young people who don't know the heights of the sky and the earth. Compared with those adults who have experienced severe beatings in society, they naturally lack a sense of sophistication and stability, and they are frizzy no matter what they do.

Withdrawing his divergent thinking, Lin Yu glanced at Su Muxin, and said lightly: "Next time, learn to be smarter before provoking the Baqi group, remember to say hello to the members of the edge group or other hacker friends in advance, and let them respond You, so that this situation will not happen again."

In fact, Lin Yu has no objection to her participation in the green war among hackers.

Because he knows that there are only two ways for ordinary hackers to improve their level and technology.

The first one is to be like an ascetic, endure loneliness, and constantly study hacking techniques in 26 boring English letters.

The second is to experience the green war among hackers, and break through your own technical bottlenecks by constantly fighting with others.

Of course, there is actually an alternative method, that is, there are master hackers who teach one-on-one, and teach each other all their technical understanding and experience without reservation.

However, even this method does not guarantee 100% that the trainee can become a hacker as powerful as a master hacker.

Because everyone's talent is different, for example, some hackers are born with strong mental arithmetic ability.

This ability allows them to easily accomplish things that ordinary hackers cannot do.

It is precisely because of these reasons that there are only a few highly skilled hackers in the hacker world. Basically, the skills of most other hackers are relatively ordinary.

This is why in the green war among hackers, a large number of people does not work, and only powerful technology is king.

After listening to Lin Yu's words, Su Muxin couldn't help but look at him in astonishment.

She originally thought that Lin Yu would scold her if she got into trouble today, and might even reprimand him severely.

However, she never dreamed that Lin Yu not only didn't talk about her, but carefully told her to pay attention next time?

God!I must have heard wrong! ?

When did the uncle become so good?

Seeing Su Muxin's dazed look, Lin Yu raised his eyebrows, thinking that she didn't hear what he said at all.

But just when Lin Yu was about to speak again, a familiar siren sounded from his computer.

Seeing this, Lin Yu was a little surprised, and immediately turned his eyes to the screen.

With just a glance, Lin Yu found that someone on the other side connected to the system with each other, and then launched an attack on his firewall together.

According to their attack intensity, time interval, and changes in the number of data streams, the analysis tool connected to the firewall in the computer has preliminarily determined that there are about 20 people on the other side.

And their attack method is mixed attack, that is to say, not only DDOS attack, but also the attack mode of veteran hackers themselves.

These people should all be members of the Baqi group that Su Muxin mentioned, and, judging from the situation, they should all be external members.

Because if they are internal members, they are basically veteran hackers.

In terms of invading other people's servers, they generally use their own attack mode.

Because their attack mode is far stronger than DDOS, which keeps sending malicious data packets.

Of course, this only refers to some special aspects, not to say that DDOS attacks are not as good as the attack modes of veteran hackers.

It can only be said that each has its own advantages. Simply put, one uses quantity for fire coverage, and the other uses quality for nuclear attack.

Hmm, very vivid image.

Lin Yu glanced at the green data bar in a certain program on the screen, which was showing that the security level of the firewall was 99%.

In addition, another program shows that two veteran hackers have broken into the second line of defense,

The alarm sound just now was sent out because of these two intruders.

When Lin Yu was checking the situation of the firewall, Su Muxin who was on the side also came to her senses. She was so flustered that she didn't even have time to put on her shoes. She stepped on the sofa with bare feet and ran over quickly.

She also heard the siren just now, which means that the leader of the Yaqi team who was chasing her just now is attacking the uncle's firewall.

Once the uncle's firewall is breached, their real IP addresses will still be exposed. This is just the difference between being faster and slower.

Soon, Su Muxin came to Lin Yu's side. She quickly put her head closer and looked at the computer screen nervously.

However, when she saw the densely packed, nearly twenty reduced program windows on the screen, she couldn't help being stunned for a moment, and then subconsciously sweared: "I'm stupid! Uncle, why did you open so many tools!"

"With so many tool windows, how can you be so busy organizing a counterattack? If the firewall is breached, we will die!"

At the end of the sentence, Su Muxin's tone became even more anxious.

She didn't expect that it was already such a critical moment, and the uncle didn't focus on the main tools such as attack and defense, but turned on all the tools on the computer.

You must know that doing this kind of thing at this time is no different from courting death!

Hearing this, Lin Yu just glanced at this little brat who couldn't hold his breath at all, then calmly picked up the teacup from the table, and said slowly: "You didn't realize that they are all running independently. Don't you need any orders from me?"

Hearing this, Su Muxin also reacted. She looked at the various tool windows running on the screen, and then at Lin Yu who was drinking water without any operations. She was a little dazed for a while.

At this moment, she only felt that her understanding of hacking tools seemed to have collapsed in an instant.

We must know that the reason why a tool is a tool is that it needs the user to use it, so that it can perform its due function.

Just like a person holding a pistol, when facing the enemy, when to load the bullet, when to load it, and when to fire it requires a person to give instructions.

But now, Lin Yu's tools can run automatically, just like an intelligent pistol. They don't need people to control them at all. They can make the best choice according to the enemy's situation.

This is the first time Su Muxin has seen such a powerful tool.

After a while, Su Muxin came back to her senses, as if thinking of something, she looked at Lin Yu with glowing eyes, and said with a smile: "Uncle, I..."

"Why, want to learn?"

Before Su Muxin could finish speaking, Lin Yu smiled lightly and said what she wanted to say later.

"Yeah! I want to learn!"

Su Muxin nodded hurriedly, staring at Lin Yu with fiery eyes.

This kind of tool technology that can run autonomously is something that every hacker wants to learn, so how could she not want to.

Seeing her impatient appearance, Lin Yu hesitated for a moment, and then said slowly: "At present, this self-running program can only be used on the firewall, because after all, it still has shortcomings in attack, and it is impossible to do it Being flexible and changeable like a human being is the only shortcoming.”

With that said, Lin Yu was also a little emotional.

The relevant programs and codes contained in this tool technology are all completed after the [Super Brain] is turned on to reach a computer technology close to the god level, so it is flawed.

If Lin Yu's computer technology reaches the god level, then he can completely perfect this tool technology.

Not only did Su Muxin not feel disappointed by what Lin Yu said, but she was even happier.

Because what she is least good at is defense, this brand-new tool technology is a perfect match for an attacking hacker like her!

However, Su Muxin seemed to think of something, and asked quickly: "By the way, uncle, is your firewall composed of autonomous programs powerful? It shouldn't be a half-finished product."

Hearing this, Lin Yu just smiled, and then manipulated the computer to display a certain program on the screen separately.

In the program, the two can clearly see that the four data streams are fighting each other.

It's not so much a battle, it's better to say it's a unilateral crush.

Because two of the data streams have an overwhelming advantage, one attack data stream is formed into different attack modes, and the other two data streams are continuously bombarded.

The other two data streams were attacked without any counter-hand strength, and they could barely defend against the opponent's menacing attack. They looked precarious, like a ship that would be capsized at any time in a stormy sea.

"Uncle, I know that these two data streams are hackers of the Yaqi group, but what are the other two data streams?"

Su Muxin pointed to the two data streams code-named "1" and "2" in the program, and asked curiously.

"This is the auxiliary machine. I have connected them with the tools on my computer. Once an intruder is found, they will automatically run until the intruder is destroyed." Lin Yu explained briefly

Su Muxin: "!?!"

These two data streams turned out to be auxiliary machines? !

It was agreed that it can only be used for defense on the firewall, how could it become an attack all at once!

Most importantly, if she reads correctly, the attack strength of these two sub-machines can crush veteran hackers! ?

This kind of technology is too powerful! !

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like