Build a giant by yourself

425. Challenge

It can be explained that there is no use. If Huo really tells Ning Xueqing, she said that more.

Most importantly, Ning Xueqing did not question what she had this morning. In the end, Huo is lying. In fact, he didn't say this, or is Ning Xueqing deliberately?

The story of stealing the ax tells us that when you have doubts about something, no matter what others do, what you say, you will take the initiative to pull him into the relevant direction.

Therefore, Pan Sim does not think how big is the first possibility. She is more likely that Ning Xueqing is really knowing, but she deliberately said.

Either want to humiliate yourself, or just take the opportunity to let her know.

Thinking of this, the enema of Panzimi is not speechless.

It's been going to work for so many days, and the results who want to do have not made it, but they are sold first!

"Well, you are very powerful!" Pan Simi glanced at Huo, and he left.

Looking at her back, Huo is unless.

I didn't do anything wrong with myself, but I made mistakes first, how to do it like others.

Close the door, Huo did not go to the Jijia branch, but came to a Internet cafe.

The online unknown master collected all the emails of Huohuo's extraordinary biennium, and made the requirements for discussing.

This ratio, he has been waiting for more than ten years, I really don't know what kind of psychology can stick to it.

However, a person who can have such a capacity on the network must be sufficient. Without a persistent psychology, it is impossible to achieve the extreme in any area.

So some people say that the top people in the industry must be mentally ill, this sentence is still reasonable.

After Huo came to the Internet cafe, he opened the temporary mailbox and sent an email to the unknown master.

The title and content of the email are only two words, very simple, and it is very straightforward.

"Come!"

When the message is sent to the computer of unknown masters, the hair in front of the screen is messy, like a man like a chicken is immediately coming.

He looked at this email in his eyes, waiting for many years, the desire to be finally achieved, the one who once defeated him, finally gave him a chance to defeat!

Over the years, unknown masters often challenge all gods in all roads, but no one can defeat him.

Accurately, from the beginning of the computer, the only defeat is that Huo is waiting.

This is equal to the eyes of obsessive-compulsive-compulsive-compulsive-compulsive-compulsive disorder, with a perfect tablet, nail a skewed nail.

Don't pull out the nails, he will never be able to actually live a person.

In the five seconds of mail, a large number of online attacks come.

Huo is not given to the time of the unknown master, because he knows the power of this person, gives him a time, not to give himself time.

The most common way to attack the network is to create a massive spam to break the other party's network defense, and then try to open a channel from the back door of the system to capture the control of the computer.

The process is very familiar, but it is hard to do.

Because the unknown master's computer system is not a common type of ordinary person, but is very original DOS system.

This kind of system is just the time that the computer has just emerged, the main programming is convenient, but it is more troublesome. No matter what you want, you have to enter the command.

Ordinary people have a little bit of mice, but they have to put a few English words.

Each step has a different English order. If you want to control a computer, you have to remember this countless professional vocabulary.

So unable to be eliminated by ordinary people to make up the DOS system, now only those who are good at programming and hackers will continue to use.

The original DOS system is more intuitive than ordinary people, and the attacks of Huo can be said to be directly facing this unknown master.

When his own alarm software issues a harsh warning sound, the unknown master's finger has already gone on the keyboard on the keyboard.

A large amount of command sent out, self-programming counterattack software, and the road attacking came against the network.

Both are the hipster of this line, while launching an attack, look for the true IP address of the other party.

Huo's extraordinary first five seconds, holds a charm, but when you identify the true IP address, it is still more than one second.

He just found the IP address of the unnamed master, and he had begun to attack his system back door.

Internet cafes system, all pirated, so-called firewalls and anti-virus software for real hackers, almost completely ignore.

They are too familiar with this system, even if there will be a lot of patch every month, it is intended to make up for the rear door vulnerability, but the more complex the system, the easier the vulnerability will appear.

You attack me, I block the back door and then counterattack.

Now, it is more fast, breaking the speed of the back door, exceeding the speed of the other party.

Huo is exhausted, the finger is smashed on the keyboard, and the order of the person is dazzling.

Several young young turns next to it seems that I can't understand anything. They are curious and doubtful to see Huo, I don't understand what this person is doing.

Come online, don't play games, what is going to do in the crazy knock?

Just five minutes, the host used by Huo suddenly made a sudden sound, and then the host had an emergence of sparks and black smoke. Subsequently, all machines all the machines are turned off.

Looking at the screen that has been black, Huo is unfolded to open the keyboard in front of you, and shake his head slightly.

After years of time, he has been behind this line, no longer a few people who are almost invincible.

And unknown masters, but always progress in this line.

One is not moving, a progress has been progressing for more than ten years, and the gap between each other has been opened.

For five minutes, the unknown master is black, but it has not only successfully burned his hard drive because the oversight speed is burned, but the computer of the entire Internet cafe is black screen.

Those who were originally playing games, or chatting with people, talking about work, one is angry.

The network management runs over is sweating, and it is unclear what happened.

The power is good, the network is also good, how do you suddenly collectively shut down?

Huo yells from the network management, changed a new machine, and then reopened the computer.

The unknown masters did not completely do things, he has been verified, this is an IP address of a home Internet cafe, so only let the computer black screen once, it is proved to win. Otherwise, in his own business, let the hard disk of all computer cafe are burned, nor is it difficult.

These computers are connected in a router, even if they pick up the splitter, there is no difference.

They are connected to each other, black in a machine, is equal to the black whole Internet cafes.

After the computer is restarted, Huo has logged in to the mailbox, and a new mail has appeared.

After opening, he saw a line in the body: "You are too weak, let me be very disappointed."

Huo is almost imagined, sitting on the opposite of the computer, now there are more disappointment.

Waiting for more than ten years of challenges, but it wins so relaxed, the imagination has not appeared, let people have a kind of effort, but a punch in the air.

That feeling is very uncomfortable.

Huo is not unable to argue, his current strength, is indeed very different from the other party.

Not only is an understanding of the system, there is also an attack method, more than ten years, the other party has evolved to a generous level. And he, but because I haven't touched these things for too long, I still use the old means for more than ten years ago, how can it be an opponent?

At this time, the second email was sent, and it wrote: "Are you taking me, still a little progress? I can see that you are still using the sea tide tactics that year."

The so-called sea tide tactics is to refer to the number of netbish information to fill the other party's network, so that he has no way to identify which information is useful, which is useless. When you distinguish between the other party, you can touch the fish, take the opportunity to attack the latter vulnerability.

However, after more than ten years of development, sea tide tactics have long been replaced by more advanced technologies.

Although it is the same, there are too many methods that have evolved. If Huo is always a thing, it is enough to come back to return.