LNMTL
HK :: VOLUME #16
#1585: Rampant announcement(s)!
Comments 0
Report
English
Chinese
……
h is not charitable Organization h is Hacker Organization, has three World Summit Grade Hacker formidable Hacker Organization!
So formidable Hacker Organization, obviously impossible casual acceptance member, even if Peripheral Member, impossible easy acquired approval.
Four inspections of Shi Lei design test, but participates to test the Hacker ability and identity for determine, then screens some Hacker, the invitation joins h surrounding Organization.
„Overseas situation?” Shi Lei pays more attention to overseas situation actually, relatively speaking, the overseas Hacker circle, is easier to present Freedom, but formidable Hacker.
Domestic circle restriction(s) too much a point, the Hacker related knowledge, was the overall environment, restriction(s) excessively were many. In the situation, acting alone variant Hacker is very so difficult to achieve high-end Gradation.
Tao Wenxian looks to [Raphael], „[Raphael], you!”
Regarding Hacker of overseas area, [Raphael] understands some compared with Tao Wenxian, [Raphael] has not declined, but specifically described.
„The situation in overseas, is overall similar to Xia Nation. Especially the Hacker circles of some poor areas, those a little strength, the choice joins our tests, moreover in test procedure, performance own strength of doing utmost. As for the developed area, participates in the test Hacker less, and basically did not have to participate in Hacker Organization Hacker, conduct test.” [Raphael] was explaining the situation in overseas area.
Shi Lei had pondered in the mind gets up h these to recruit the test of Peripheral Organization Member, not only will be h will bring some competent helpers, will be h will also bring in some enemies of harboring ulterior motives.
Therefore, Shi Lei needs careful determine, actually should recruit any member. In order to avoid hits the snake instead to be nipped by snake inadequately.
„The result that [Izual], tests at present shows!” Shi Lei was telling the [say / way].
Now is in the test systems of 2 : 00 am h. Collected many information data.
„Yes , sir!” [Izual] was responding to Shi Lei. data of test result, will transmit to Shi Lei and [Raphael] and Tao Wenxian three people separately.
In the LIP Lens-type Information Processor Virtual transparence screen, Shi Lei is examining related information.
At present, inspects the Server Hacker quantity through First Round, has 2783 people \; Through the Second field inspects Server has 424 people \; As for inspects the Server population less through the Third field, has 39 people merely!
The Fourth field inspects the Server difficulty, mainly aims at World Exceed Class standard Hacker, the population of recently adopting are many. Has 30!
Has David Thomson of World Summit Grade strength on the contrary, because was given special attention by Shi Lei, thus has encountered [Izual]'s ‚deep affection’, until now is still inspecting Server to seize with the Fourth field to slaughtering.
information of [Izual] statistics, is not so simple data information, but more detailed classified information.
For example inspects in Server 2783 World Third-rate Grade Hacker through First Round, [Izual] has carried on the detailed crotch textural classification.
The First Grade classification has divided three types, ‚Known Identity’ and ‚Unknown Identity’ and ‚'Clue' of Identity’. Three the meanings of classifications are similar to wording opinion are the same, last ‚'Clue' of Identity’ classification, expressed that obtained some identity clues. But is unable finally to determine.
So-called ‚Known Identity’, did not know Reality identity, but gained Sockpuppet identity in network.
The Second Grade classification establishes in ‚Known Identity’ under category. Has been divided into ‚Part of an Organization’ and ‚Free and Independent’ and ‚Unable to Judge’ three categories.
Although [Izual] analyzed most Hacker Identity Information, but Shi Lei only classification will not choose h Peripheral Member in ‚Free and Independent’ merely, and ‚Unable to Judge’ in chooses some member in ‚Part of an Organization’.
This selector mode, can effectively avoid some unnecessary dispute.
‚Known Identity’ category each Hacker member, [Izual] displayed related detailed information, has included Internet Sockpuppet information, related Hacker event information, respective Organization information wait / etc., including some hearsay. Also had been displayed by [Izual].
Shi Lei does not have the time examination through First Round and Second field test, more than 2000 Hacker information. He examined to pass the Third field and Fourth field test directly, altogether 39 Hacker information.
These 39 Hacker. The major part is the Shi Lei's old acquaintance!
Hacker Union's ten Core Layer, all adopted the Third field inspection, as for Fourth field inspection, only then [Black Blade], [Black Demon], [Black Hand] and [Black Ghost] four people pass.
Other six Core Layer, especially alliance Ranked Second [Black Tiger], cannot through the Fourth field inspection. This makes [Black Tiger] think that quite loses face.
After all Ranked Sixth, Seventh, Eighth adopted the Fourth field inspection, Ranked Second [Black Tiger] had not passed, making [Black Tiger] feel the status crisis.
The [Black Tiger] attack and defense strength serious leaning branch, attack aspect, [Black Tiger] has even surpassed World Exceed Class \; But is defending aspect, [Black Tiger] has almost World Third-rate standard. [Black Tiger] can inspect Server through the Third field, in fact thanks to attack formidable. Otherwise, [Black Tiger] is unable to pass including Third field test!
Dark Night Dynasty five Core Layer, have surpassed Hacker Union in individual strength aspect, completely through Fourth field inspection. Surplus twenty four Hacker, completely are Hacker of overseas area,
And four Hacker caused Shi Lei's High Degree to attach great importance to!
First is [Inuyasha], this is an animation character name, translates the Xia Nation language is ‚[Inuyasha]’. This Hacker real identity, Shi Lei has some understanding.
[Inuyasha] is Wo Sang Nation Hacker, but is not Wo Sang Nation Official Security Specialist, is not Wo Sang Nation Hacker World Organization Hacker, but is Bounty Hacker, Bounty Hacker of chase money.
Hearsay [Inuyasha] real identity is Xia Nation and Wo Sang Nation mixed-blood, although lives in Wo Sang Nation, but does not approve Wo Sang Nation, therefore the choice became Bounty Hacker.
These are not the key points. What key is, [Inuyasha] is powerful, has been the World Grade degree!
So formidable Hacker. If became h Peripheral Member, enormous promoted h strength!
Second by Shi Lei High Degree attention Hacker. Also is famous, even formerly and Mirror Science and Technology Group have a not happy contradiction.
This Hacker in Hacker World Sockpuppet named [Declared Dead]!
From the Sockpuppet name disclosed that terrifying flavor formidable Hacker, similarly has been the World Grade degree, even makes the breakthrough faintly to the Summit sign.
The [Declared Dead] strength, has surpassed [Inuyasha], has the possibility in a short time, becomes World Summit Grade Hacker!
Shi Lei did not mind but actually [Declared Dead] formerly and Mirror Science and Technology Group oppose, attempt to invade the Brave's World's matter. Bounty Hacker rule Shi Lei is quite clear. Receives money merely the management, has nothing to do other, without any personal gratitude and grudges.
However, [Inuyasha], is [Declared Dead], if merely becomes h Peripheral Member, Shi Lei not many statement requests. But if they want into h Official Member, must result in leaves Bounty Hacker Industry.
Two by Hacker of Shi Lei High Degree attention, impressively are also Bounty Hacker, separately is [Batman] and [Dark Lord]. These two Bounty Hacker are also ruthless character. Is Quasi World Grade Expert, has surpassed World Exceed Class standard, has remote of Half-step from World Grade merely!
Shi Lei sighed. It seems like along with the progress of era, computer hardware High Grade, the estimated performance is more and more getting more and more formidable, Bounty Hacker Industry is also getting more and more difficult to mix.
Otherwise, these will Bounty Hacker one after another huddle together to participate in the test of h?
The Bounty Hacker service, more and more is not indeed good to develop. Simple Task, bid lowly did not say that numerous low-and-middle Hacker rushed to process.
Task of high-end, posts a reward the amount is very indeed high. But that Task usually very difficult accomplish, even may go for wool and come back shorn. Bounty Hacker own High Grade Zombie, even is Supercomputer Zombie. Also builds to lose.
Meets such situation, Bounty Hacker also only then confessed bad luck!
‚Four Exceed Grade Bounty Hacker?’ Shi Lei ponders secretly that actually should how treat them. Admits these four people becomes Peripheral Organization Member, that is the absolute matter.
Even, Shi Lei can not need their real identity, then gives every month the 100,000 US Dollar bonus, is serving these fellows.
issue of Shi Lei true ponder is, actually must test these four fellows, makes their real identity, thus marks the h mark thoroughly.
Another side, David Thomson by [Izual] was made finally annoyed the wool, David Thomson has patted the keyboard fiercely, the angry loudness said: „Fuck! Deceit! Cheat! h this is deceiving all people, the Fourth field to inspect Server unable to pass!”
David Thomson indeed is unable to inspect Server through the Fourth field, even if he transferred 110 tflops Concentrated Distribution Computing Resources, is unable to break the Fourth field to inspect Server defense.
Before David Thomson was controlling 80 tflops Concentrated Distribution Computing Resources time, he felt, so long as increased little attack data flow computing resources again, then can completely break the Fourth field to inspect the blockade of Server.
Held this idea, David Thomson is increasing a computation speed to have 5 tflops Supercomputer. Although 5 tflops computing resources are not many, but defers to the speculation of David Thomson, 5 tflops computing resources enough affected the war.
While David Thomson prepares to welcome the victory result time, the Fourth field inspected Server Defense System unexpectedly temporary promoted the intensity.
This was Shi Lei is [Izual] has certainly carried on the authorization, told that [Izual] transferred many [Interweave Net Miwang] resources to carry on defense.
first time has this situation time, David Thomson also thinks one guessed the mistake, therefore invested a computation speed is 15 tflops Supercomputer.
Invested the 20 tflops computing resources situation continuously, making David Thomson think that finally can obtain successfully, but the Fourth field inspects Server defense to be as before impregnable.
And David Thomson has discovered explicitly, the Fourth field inspected Server computing resources promoted to 300 tflops. Angry David Thomson can only a reclosure computation speed be 10 tflops Supercomputer, carries on wrestles finally.
However, David Thomson discovered once again the Fourth field inspected Server, control computing resources promoted to 350 tflops, suppression stubbornly his attack.
David Thomson is unable to endure finally, in Li Jian Nation Hacker World major open to the public website, has sent out angry and rampant announcement(s)!
Hanya sebuah blog kecil yang bertujuan saling membantu sesama. Semoga dapat berjalan dengan lancar.
Saturday, January 6, 2018
1585: Rampant announcement(s)!
Subscribe to:
Post Comments (Atom)