HK1586 Arrogant Announcement!
.
It's not a charity organization, it's a hacker organization, a powerful hacker organization with three of the world's top hackers!
It is obviously impossible for such a powerful hacker organization to accept members casually, and even peripheral members cannot easily gain recognition.
The four assessment tests designed by Shi Lei were just to judge the abilities and identities of the hackers participating in the test, and then to select some hackers and invite peripheral organizations to join.
"What about the situation abroad?" Shi Lei was actually more concerned about the situation abroad. Relatively speaking, free and powerful hackers were more likely to appear in foreign hacker circles.
There are too many restrictions in the domestic circle, whether it is hacker-related knowledge or the overall environment, there are too many restrictions. Under such circumstances, it is difficult for lone ranger hackers to reach high-end levels.
Tao Wenxian looked at Raphael, "Raphael, tell me!"
Raphael knew more about hackers in overseas areas than Tao Wenxian. Raphael did not refuse, but explained in detail.
"The situation overseas is generally similar to that of Xia Country. Especially the hacker circles in some poor areas, who have some strength, have chosen to join our tests, and during the test process, they have tried their best to show their strength. As for developed areas "There are fewer hackers participating in the test, and there are basically no hackers who have participated in the hacker organization for testing." Rafael explained the situation in overseas areas.
Shi Lei thought about it in his mind. This test to recruit members of peripheral organizations would not only bring some powerful helpers, but also attract some enemies with ulterior motives.
Therefore, Shi Lei needs to carefully judge which members should be recruited. To avoid being bitten by the snake instead of trying to kill it.
"Yizur, show the results of the current test!" Shi Lei ordered.
It is already two o'clock in the morning, and a lot of information has been collected in the test system.
"Yes, Sir!" Yi Zuer responded to Shi Lei and gave the test result data. They were sent to Shi Lei, Raphael and Tao Wenxian respectively.
On the virtual transparent screen of the LIP lens-type information processor, Shi Lei checked the relevant information.
Currently, the number of hackers who passed the first server assessment is 2,783; the number of hackers who passed the second server assessment is only 424; as for the number of hackers who passed the third server assessment, there are even fewer, only 39 people!
The difficulty of the fourth test on the server is mainly aimed at the world's top-level hackers, and many people have passed it so far. There are 30 of them!
On the contrary, Thomson David, who has the world's top level of strength, received special attention from Shi Lei and thus received the "love" of Yizuer. He is still fighting against the fourth assessment server until now.
The information collected by Yizuer is not such simple data information. But more detailed classification information.
For example, among the 2,783 world-class third-rate hackers who passed the first server assessment, Yizuer conducted a detailed classification of tree branch structures.
The first-level classification is divided into three types, ‘known identity’, ‘unknown identity’, and ‘clue identity’. The meaning of the three categories is as literal as the last one is the ‘Clue Identity’ category. It said it had obtained some clues to its identity, but could not conclusively establish it.
So-called ‘known identities’. It's not that you know your real identity, but you get your identity on the Internet.
The secondary classification is established under the category of ‘known identity’ and is divided into three categories: ‘owning organization’, ‘free and independent’, and ‘unable to judge’.
Although Yizuer analyzed most of the hacker identity information, Shi Lei would not just select peripheral members in the 'free and independent' category. Some members will also be selected between 'owning the organization' and 'unable to judge'.
This selection method can effectively avoid unnecessary disputes.
For each hacker member in the 'Known Identity' category, Yizuer lists relevant detailed information, including Internet vest information, related hacking incident information, organizational information, etc., including some gossip, and Listed by Yizuer.
Shi Lei didn't have time to check the information of more than 2,000 hackers who passed the first and second tests. He directly checked the information of a total of 39 hackers who passed the third and fourth tests.
Most of these thirty-nine hackers are old acquaintances of Shi Lei!
The ten core members of the Hacker Alliance all passed the third assessment. As for the fourth assessment, only four people, Black Knife, Black Demon, Black Hand and Black Ghost, passed.
The remaining six core members, especially the Black Tigers who ranked second in the league, also failed to pass the fourth assessment. This made Black Tiger feel quite embarrassed.
After all, those ranked sixth, seventh, and eighth all passed the fourth assessment. Black Tiger, ranked second, failed, which made Black Tiger feel a crisis of status.
The Black Tiger's offensive and defensive strength is seriously biased. In terms of attack, the Black Tiger even surpasses the world's top players; but in terms of defense, the Black Tiger is almost only the third-rate player in the world. Black Tiger was able to pass the third server assessment, in fact, it was thanks to its powerful attack. Otherwise, Black Tiger wouldn't even be able to pass the third test!
The five core members of the Dark Night Dynasty surpassed the Hacker Alliance in terms of personal strength, and all passed the fourth assessment. The remaining twenty-four hackers are all hackers from overseas.
Four of the hackers attracted Shi Lei's great attention!
The first one is InuYasha, which is the name of an anime character, translated into Chinese as ‘InuYasha’. Shi Lei had some knowledge of the hacker's true identity.
InuYasha is a hacker from Wosang Country, but he is not an official security expert of Wosang Country, nor is he a hacker from the hacker community organization of Wosang Country. Instead, he is a bounty hacker, a bounty hacker who pursues money.
It is rumored that InuYasha's true identity is a hybrid of the Xia Kingdom and the Wosang Kingdom. Although he lives in the Wosang Kingdom, he does not identify with the Wosang Kingdom, so he chose to become a bounty hacker.
None of this is the point. The important thing is that InuYasha is very powerful and has reached a world-class level!
If such a powerful hacker becomes a peripheral member, his power will be greatly enhanced!
The second hacker that Shi Lei paid close attention to was also very famous. There was even an unpleasant conflict with Mirui Technology Group.
This hacker’s nickname in the hacker world is called the Teller!
A powerful hacker whose name reveals a terrifying flavor has also reached a world-class level, and there are even faint signs of breaking through to the top.
The strength of the deceased exceeds that of InuYasha, and he may become the world's top hacker in a short period of time!
Shi Lei didn't mind telling the deceased that he had been against the Mirui Technology Group and tried to invade the world of braves. Shi Lei knew the rules of bounty hacking very well. It's just about collecting money to do things, nothing else, no personal grudges.
However, neither InuYasha nor the deceased. If he was just a peripheral member, Shi Lei wouldn't make too many demands. But if they want to become official members, they must leave the bounty hacker industry.
There are also two hackers who are highly concerned by Shi Lei, and they are also bounty hackers. They are Batman and the Dark Lord respectively. These two bounty hackers are also ruthless characters, and both are quasi-world-class masters. It has exceeded the world's super-class level and is only half a step away from world-class!
Shi Lei sighed. It seemed that as the times progressed, computer hardware became more and more advanced. Computing power is becoming more and more powerful, and the industry of bounty hackers is becoming more and more difficult to enter.
Otherwise, why would these bounty hackers gather together to participate in the test one after another?
The business of bounty hackers is indeed becoming increasingly difficult to develop. Not only the bid for a simple task is low, but there are also many mid- to low-end hackers rushing to handle it.
For high-end tasks, the bounty amount is indeed very high, but such tasks are usually difficult to complete, and it may even be possible to steal the chicken and lose the rice, and the bounty hacker's own advanced broiler, or even a supercomputer broiler, will be lost.
In such a situation, bounty hackers can only consider themselves unlucky!
‘Four super bounty hackers? ’ Shi Lei secretly thought about how he should treat them. It is an absolute matter to accept these four people as members of the peripheral organization.
Shi Lei can even give these guys a monthly bonus of 100,000 US dollars without needing to reveal their true identities.
What Shi Lei is really thinking about is whether to test these four guys and find out their true identities so as to completely mark them.
On the other side, Thomson David was finally annoyed by Yi Zuer. Thomson David slammed the keyboard and shouted angrily: "Fake! Cheating! Cheating! This is deceiving everyone, Chapter 1 The server cannot pass the four assessments at all!”
Thomson David was indeed unable to pass the fourth assessment server. Even if he had used 110tflops of intensive distributed computing resources, he could not break the defense of the fourth assessment server.
When Thomson David controlled 80tflops of intensive distributed computing resources, he felt that as long as he added a little more computing resources to attack the data flow, he could completely break the blockade of the fourth assessment server.
With this idea in mind, Thomson David added a supercomputer with a computing speed of only 5tflops. Although 5tflops computing resources are not many, according to Thomson David's speculation, 5tflops computing resources are enough to affect the battle situation.
Just as Thomson David was preparing to welcome the victory, the defense system of the fourth assessment server temporarily increased its intensity.
This was of course Shi Lei's authorization for Yizuer, instructing Yizuer to use more IWN secret network resources for defense.
The first time this happened, Thomson David thought his guess was wrong, so he invested in a supercomputer with a computing speed of 15tflops.
After continuously investing 20tflops of computing resources, Thomson David thought that he could finally succeed, but the defense of the fourth assessment server was still impregnable.
And Thomson David clearly discovered that the computing resources of the fourth assessment server had increased to 300tflops. The angry Thomson David could only connect to a supercomputer with a computing speed of 10tflops again for a last ditch effort.
However, Thomson David once again found the fourth assessment server, and the computing resources controlled increased to 350tflops, firmly suppressing his attack.
Thomson David finally couldn't bear it anymore and issued an angry and arrogant announcement on all the major public websites in the hacker community of the United Kingdom!
.(To be continued ~^~)
PS: Still 3500+ conscience!