light, short, scattered

Chapter 8 "No Speaker" Chapter [-]

Chapter 8 "No Speaker" Part [-]

The little girl applied for Stanford University at the age of 15 but failed.

At the age of 16, he applied for Stanford University and succeeded.

Reported in the news as a child genius.

Of course, I studied computer science, but I’m talking about computers here.

It's an old vintage computer that no one uses anymore.

When the news spread throughout the university, everyone felt sorry.

A little girl was invited for an interview.

When people ask little girls why they don’t learn supercomputers, but ancient computers.

The little girl just smiled and didn't answer.

Two years later, Genesis No. 60 three hacker competitions.

The topic is the same as before, attacking the Pentagon of the Department of Defense.

A hacker with the ID of Machine Gunner firmly won the first place with an attack volume slightly three times higher than No. 2.

And this data also completely broke the record ten years ago.

You must know that even the best supercomputers today may not have such speed even when their performance is fully turned on.

When hackers and computer enthusiasts discuss this hacker with the ID name Machine Gunner after dinner.

No.2 of the game reported No.1.

The reason for reporting is abnormal data.

The opponent must be a team of multiple computers competing.

And not just one person.

When the jury found the location of the Marine through digital IP.

It was determined that only one device was connected, and the location was actually Stanford University.

The news quickly spread throughout the campus, and teachers tried their best to find the hacker whose ID was Machine Gunner.

But everyone soon discovered that this digital ID might be a fake ID, because the best supercomputer at Stanford University showed that it was not turned on at all during the game.

Supercomputing professors have restored supercomputing data time and time again, and the results obtained are that the supercomputer had no data and never turned on.

This incident is known as the rumor spread on campus.

Until next year's 64th Hacker Competition.

The hacker whose ID is Mariner once again won the first place, and he was [-] points faster than last year.

From a numerical perspective, this is simply impossible.

Unless the hacker with the ID of Machine Gunner has used equipment that is better than the supercomputer of the same era.

Of course, the organizer was careful this time and had already recorded the exact location in real time.

It's actually a museum at Stanford University.

The results were valid again, but the data from the competition was leaked.

When everyone formed a team to find out with great interest, they found that there was nothing in the museum.

Laptops don't have this kind of computing power, and there isn't a supercomputer in the museum.

A hacker enthusiast set his sights on computers and was mercilessly despised.

How can something like this, which is more than a hundred times slower than a supercomputer, be useful?

But in the old computer display area at the Stanford Museum, I found that old computers were stacked together in piles.

People turn on these computers.

I was surprised to find that these computers had been bundled together into one body and were calculating with complex codes.The concrete body composed of zeros and ones simulates a supercomputer in the internal Internet.

This completely subverted the world's understanding of computers and networks.

But who made this thing, no one knows.

There are only three students enrolled in the archaeological computer course.

The most ironic thing is that computer courses are no longer professional courses, but literature and art courses.

After the teacher teaches how to turn on and off the computer, the rest is a self-study course.

Because these things are already antiques and works of art.

. . . . . .

Technology Immigration Company.

The little girl looked at the information in her hand and smiled.

This is a classified Pentagon document.

It was more than a year ago that the little girl got this document.

The content of the file is exactly a planet that no one cares about, has been mined, and once had an A-level energy evaluation.

The IP address of this planet is almost exactly the same as the IP address of a chat account on a chat software on the little girl’s mobile phone.

"Are you sure you want to become a new resident?" the hostess asked in surprise.

"Yes." The little girl replied with a smile.

"Although there is the latest planet discovered that can provide survival, with today's rocket speed, it will take at least 20 years to get there. You can try to launch your own eggs there and match them to give birth to new ones. Child. You don’t have to waste the whole 20 years by yourself." Miss etiquette said.

"Did I give you not enough money?" the little girl asked questioningly.

"No, no, no, that's enough. It's just a waste of life. I hope to bring you the most optimized plan." Miss etiquette has not finished speaking.

The little girl grabbed the form and signed her name.

Space immigration is a project that has just emerged recently. It is to launch your own eggs or sperm through cryogenic rockets to another habitable planet, where they can be combined to give birth to new humans.

And the little girl chose to launch herself.

The little girl waited for an extra year for the arrival of this project, because this plan was proposed and established anonymously by the little girl.

The little girl got into the launch capsule and was ejected into space.

Of course, the destination is a new Earth rated S. It will take 20 years to reach the Earth with the fastest rocket.

The little girl in the sleeping cabin woke up early with a smile, holding the coordinates of the A-level energy planet in her hand.

"It takes ten years to get there, and exactly 20 years to get back and forth." The little girl said silently.

A month later, the interstellar travel company discovered that all the money in the account was fake currency and could not be traded.

Even the little girl's name is fake.

On the form, the careless etiquette lady discovered that the name written on it was a crooked one: Machine Gunner.

The company wanted to cut off the rocket's program and conduct a forced return.

However, it was discovered that this month, the rocket programs and trajectories seen by technicians were all videos and simulation programs that had been recorded after being attacked by hackers.

The real rocket had already lost control and yawed severely.

Fly to another place with enough fuel.

The company doesn't know how the little girl woke up from her sleep capsule, and no one knows why she diverted a rocket destined for the newest colony planet to an unknown planet.

The little girl fell into sleep again, waiting for the day to meet her uncle.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like