Urban Master of All Powers

Chapter 32 XO's Subversion: Capture of the Concubine

"Did something happen?" Constantine asked.

"Well, nothing."

Victoria herself didn't know how to answer. Can't she say that I chatted with you in the chat room some time ago? If this is the case, Constantine will probably go crazy with anger. The ID of the strongest king of hackers in Europe has been stolen quietly. It is a shame to tell it.

But it was indeed Constantine himself that day, otherwise the terminal encrypted chat room would not have reacted like a dead person when it was invaded. Victoria was very confused. Could it be that even if the invading hackers broke through the triple defense, they would still be able to stay silent? So how much energy and what means should be used? Are there still such hackers in the world?

Victoria suddenly shivered. Isn't it because of that person that the legendary queen appears now?

Chen Ling pressed the excitement in his heart, and he opened the webpage.

There is nothing left of the site but a q of spades poker card.

Chen Ling looked through the website, staring carefully at the Q of Spades, sensitively feeling that something was wrong.

After thinking about it, Chen Ling entered into data manipulation.

"Translate the information of this card for me!"

The screen changed, and the pictures of spade q were enlarged and turned into countless numbers. All the numbers danced in a dazzling manner, and then a piece of data appeared. The above information was very simple and only had one line of URL.

Chen Ling immediately understood that this website was just a smoke bomb.

The real challenge is hidden on the q of spades. If you want to accept the challenge from the queen, you must first analyze the code of the q of spades. This spade q program is quite ingeniously designed, even the data manipulation took a lot of time to get the result, let alone cracking it with other hackers, it is still a difficult problem whether they can see the secret.

If you can see this hidden information, you can undoubtedly be selected as a top hacker.

The first greeting from the queens made Chen Ling feel different from other hackers, and it was really a matter of opinion.

Chen Ling could be sure that it was indeed the legendary queens.

After entering the designated webpage, a powerful stream of ddos ​​junk data invaded Chen Ling's computer.

Aiboman mine page? ?

Chen Ling secretly called me Ri.

The Aiboman Landmine webpage was originally created by Aiboman, a network security expert in the United States. To put it simply, the connotation is to pack junk data information, suddenly launch a ddos ​​attack when prompted by a certain program, and then destroy the other party’s server in an instant .

Of course, making mine web pages is not that simple. First of all, data packaging and program compatibility are issues. Secondly, how to design each link of the program, if not careful, it may be reversed by hackers. In the early days of the birth of the bomb webpage, countless hackers were recruited, and even the top hackers died under the horse, so it was called a landmine.

And the mine webpage made by the Queen herself is even more powerful than the one designed by Abman himself. In addition to the huge data information, its garbage data can be infinitely reproduced and regenerated, which means that the original one-time bomb was changed by the Queen to unlimited use. , Of course, the price is that the website can only be a blank sheet of paper. In addition, she has perfected the defects that some mine pages are exploited.

Really worthy of being an idol-level hacker.

Chen Ling sighed in admiration.

But it is a pity that there is no way to perfect a fatal weakness of the Aiboman bomb website, which is the hardware configuration. Even if the queens are unlucky, the configuration of Chen Ling's holographic computer can make supercomputers feel inferior. After the initial ddos ​​attack, the computer just entered a state of stagnation, which gave Chen Ling the best chance.

"Clear these junk data and scan for vulnerabilities."

The computer executes immediately.

The chaotic encryption of the webpage was cracked without any effort, and then the armored firewall of the server.

Chen Ling could order the firewall to ignore his existence, but this would be too shocking, especially since the queens might be watching every move from the computer.

Queens are not comparable to fifth-generation computers, and Chen Ling is not confident that Queens can't see the clues. So Chen Ling followed the hacking methods he could understand step by step.

Breaking through the firewall, Chen Ling still chose the old way, attacking with a rogue. Not to mention that the powerful matrix firewall of the fifth-generation computer can be broken through.

After breaking through the firewall, Chen Ling was still not at ease. The second firewall appeared. Unlike the first firewall that only filtered all junk data, the second firewall had the ability to resist intrusion.

Chen Ling smiled and ordered.

"Scan this firewall for backdoors!"

No program is perfect, not even Queen's Design. After analyzing the firewall, Chen Ling couldn't help admiring the queens' wild imagination that day.

The entire firewall is designed into seven layers, and each layer is different. What makes people feel chilling is that there is also a very clever program designed in this seven-segment firewall.

This program is well hidden, and it can only be regarded as small grains in the data flow, but it records the entire process of hacking and then conducts silent analysis and tracking.

That is to say, the seven-segment firewall is just a cover-up to understand the enemy. When a hacker can break through the seven-segment firewall, the queens have already obtained all the hacker's attack data, style, method and weakness on the computer side.

At that time, even if they entered the server, they could only be instantly killed by the queen.

This woman's thinking is very strong, comparable to that witch.

Chen Ling couldn't help laughing.

It's just that the queens will not count Qi Ling's ability to bypass the firewall directly through the back door. Even the queen would not have thought that someone could find out the information of the firewall in an instant and analyze the loopholes. Such a hacker is enough to subvert other people's perception Awareness of hackers.

It's a pity that xo is doing this.

So when Chen Ling successfully entered the server, the queen who was sitting on the sidelines was also taken aback. This sudden change stopped her thinking for a few seconds, and Chen Ling seized the opportunity immediately after being so slow, and instantly established the highest authority.

"xoko!!"

All data flow stopped at this moment, and Chen Ling felt that the queens had stopped attacking him. Chen Ling didn't kick her out of the server either, because it was unnecessary. Outsiders saw it as a battle, but in Chen Ling's view, it was more like a very insidious transaction.

Chen Ling was thinking about how to talk to the queen ten years ago, when he suddenly saw the administrator account and couldn't help but froze.

princess!

Not a queen? ? ?

Chen Ling fainted.

Just when Chen Ling was hesitating, the other party sent a question.

"xo, I have admired your name for a long time! It's amazing that you found a loophole in the firewall dedicated to the military in such a short period of time. I want to admire you too."

"Queen, you are my idol." Chen Ling said, "It's a great honor to meet you." He didn't ask why the name "princess" was chosen, but thought carefully about the rumor that the Red Kingdom and the White House had reached a secret ten years ago. The protocol appears to be genuine, and perhaps that's why the name was used.

Then think about it, queens are also titles given by later generations because of the q of spades, and no one knows their real names.

Wait, Chen Ling looked familiar with that name...

princess?

Princess!

Won't……

- - -

Made it up, don't take it seriously.

After the third watch, ask for a ticket.

.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like