The game continued again in the afternoon, and where was Zhong Jing.

Zhong Jing asked his clone to run Didi on his behalf, while he went to Fenghuo.

Because at this moment, Fenghuo is under fierce attack from hackers.

The firepower is very powerful.

Moreover, this hacker is not from abroad, but from within China.

After Zhong Jing got the news about Creation, he came to the company

"How's it going? Is it locked?"Zhong Jing asked

"It's locked. Do you want to call the police?" Su Mingyu nodded.

With the ability of creation, it is too easy to find the other party's location.

"Not for now." Zhong Jing waved his hand.

"Chuangshi, how is the other party’s level?"

"Very good." Chuangshi gave a good evaluation

"You have given good reviews, so it must be extraordinary." Zhong Jing needs talents now.

"Let me go and let me fight him to protect the data." Zhong Jing suddenly felt itchy.

"Okay." Chuangshi directly opened up a virtual battlefield and let the two people start fighting.

Zhong Jing has never made a move since he had intermediate hacking skills.

This time he met the opponent, of course he had to compete.

Then, Zhong Jing came to the computer, and a hacker war suddenly began.

······

The opponent's level is indeed high, but Zhongjing is not bad either.

Defeat the opponent's attacks one by one.

The other party was not on the same level as Chuangshi at all, so he was not even noticed after being tracked by Chuangshi.

"Hey, the style has changed. Could it be that the person has been replaced?"A man's face was full of curiosity.

If it was resistance before, it is now a counterattack.

And the counterattack is very strong.

He seems to be invading his own network.

"Interesting, come on, let me see how awesome you are." The man's eyes were full of excitement.

He is the type of hacker who attacks. He becomes stronger when he encounters the strong.

He likes to compete with the strong.

Battles between hackers , others couldn't see it at all, Su Mingyu only saw Zhong Jing's fingers dancing on the keyboard.

Programs appeared on the computer, but he couldn't understand them at all.

In fact, hackers have a bad reputation.

Hackers usually Refers to a person who has a high level of understanding of computer science, programming, and design.

But I don’t know since when, a hacker has a special definition, which is to use public communication networks, such as the Internet and telephone systems, without permission. People who load into the other party's system are also called black hat hackers; those who debug and analyze computer security systems are called white hat hackers

"The word"hacker" was first used to refer to people who study theft of telephone systems.

In terms of amateur computers,"hackers" refer to amateurs who study the modification of computer products.

"A"hacker" is"a person who is keen on studying the internal operations of systems and computers (especially networks)" and generally refers to people and computer scientists who are good at IT technology. Hackers are proficient in various programming languages ​​​​and various operating systems. Along with computers and Growth is caused by the development of the network.

Hackers do not give people a good impression. They seem to be saboteurs and intruders, but in fact they are not necessarily so.

What the hacker arsenal does is not malicious destruction. They are a group of technical personnel who operate across the network. Passionate about technological exploration and computer science research. In the hacker circle, the word Hacker undoubtedly has a positive meaning. For example, systemhacker is familiar with the design and maintenance of operations; passwordhacker is good at finding out user passwords; and computerhacker is proficient in the design and maintenance of operations. Computer, a master of entering the operating system of another person's computer.

According to the founder of open source"Eric·S·Raymond's explanation of this word is:"Hacker Arsenal" and"cracker" are groups belonging to two different worlds. The basic difference is that hackers are constructive, while hackers specialize in destruction.

Hackers The original meaning refers to workers who chop wood with an axe. The earliest introduction into the computer circle can be traced back to the 1960s.

Brian Harvey, a computer professor at the University of California, Berkeley, wrote when researching this word that students at the Massachusetts Institute of Technology (MIT) at that time usually They are divided into two groups, one is too1, which means the obedient student who always gets A-level grades; the other is the so-called hacker, who often skips classes and likes to sleep in class, but is full of energy at night and likes to engage in extracurricular activities. Students.

For a hacker, it is necessary to learn programming. Computers can be said to be designed for programming. Running programs is the only function of computers.

Mathematics is also indispensable. Running programs is actually operations, discrete mathematics, linear algebra, Calculus, etc.!

The word hacker is usually defined outside the circle or in the media as: a computer master who specializes in intruding into other people's systems to commit illegal acts. However, in the eyes of hackers, such people are lower-level crackers.

If a hacker If you are a bomb-making expert, then a hacker is a terrorist.

With the development of the times, more and more hackers have appeared on the Internet. They only intrude, use scanners to scan everywhere, and use IP bombs to blow up people's homes. Destination intrusion and destruction are not conducive to the development of computer technology, but are harmful to network security and cause network paralysis, causing huge economic and mental losses to people._Feilu reminds you

: Three Things to Do in Reading - Collection ,recommend

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like