Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 128

"If I don't mind, I'm going to work for a while!"

Sean curled his lips and said, "You picky ghost, you will lose a great future hacker as your mentor, I feel sorry for you!"

Sean returned to the original place and tinkered. Nick, who had finally got a little peace, could finally concentrate on his own affairs. However, Sean's tinging and beating sounds still came from time to time.

Not being too flirted with, Nick felt a blessing of 100,000 yuan. Back on the Internet, the war on the Internet had not yet been extinguished, and the power of the Slo Republic began to wander around the Internet, causing the detectors Nick and the others to squeak.

fd: "fuck, they attack the domain name server!"

Storm: "That's civilian equipment, it actually did this kind of thing!"

ag: "Boss, what should I do?"

David: "What can we do? We can't fight!"

Storm: "The acs group of gangsters are indifferent. They are really a bitch!"

David: "If this continues, the domain name service across the country will be invalid. No, there will be any action on ACS. They responded that they are attacking the domain name server of the SRoy Republic for tooth!"

fd: "That will only be a terrible thing for the people of both countries. No, they will definitely not be allowed to do this. Get ready and come with me!"

Nick began to lead everyone out and fight against the SRoy Republic. This was just a small force, relying entirely on technology to survive. Faced with such a huge opponent, if you are not careful, you will be doomed. In order to improve the efficiency of attacks, he began to calculate that according to the SRoy Republic's habit of cryptography, the SRoy Republic generally uses node encryption. Generally, encryption is divided into three forms. The first is head-to-tail encryption. Head-to-tail encryption refers to encrypting the data entering the network, and then decrypting it after the data is transmitted from the network. The network itself does not know that the data being transmitted is encrypted data. The advantage of this method is that each user on the network can encrypt keywords differently, and the network itself does not need to add any special encryption devices. The disadvantage is that each system must have an encryption device and corresponding software, or each system must complete the encryption work by itself. When the data transmission rate is calculated in units of megabits/second, the calculation amount of the encryption task is very large.

The second is node encryption. Node encryption is similar to link encryption. The difference is that when data is transmitted between nodes, it is not transmitted in a clear format, but is decrypted and re-encrypted with special encryption hardware. This kind of special hardware is usually rotated in a secure safe.

The third type is link encryption. Link encryption refers to encryption between network nodes, transmission between nodes, decryption after transmission to nodes, and different nodes use different passwords.

When you learn about the encryption method, your targetedness will be strengthened, just like using power on the blade and focusing your attack power. The power of the Slo Republic is like a sledgehammer, with a brutal force, and it will be smashed to pieces by the hammer.

Such a weak force also caused damage to the SRo Republic. It was like using a needle to slap them hard, and they would still hurt. The SRo Republic roared for a moment and began to turn around and bite Nick. The power led by Nick was like a mosquito flying around on the Internet, which was difficult to hit.

With a bang, Nick's heart was half cold. The data on the display screen was displayed wildly, and the red warning flashed everywhere. In the end, it was hit by the Slos Republic, and the losses were extremely heavy. Most of the display icons turned gray, and most people were cut off from contact. The automatic repair system was running slowly. At this critical moment, the old machine was so slow that it made people want to stomp their feet. Nick pounded the monitor irritably.

Sean raised his head and said with a smile: "I just lost the game. Look at Luther's fate. If you make a mistake, it's better to repair it yourself!"

Nick was so angry that he looked on the Internet. After finally fixing it, the icon was still gray. It seemed that most people had already lost the line.

David: "No, boss, how can we fight hard like this? How can we defeat the country's strength?"

fd: "Get out first, Storm, see you in our old place!"

Storm: "Old place? OK!"

FD and Storm both went offline and disappeared.

Nick turned off the computer casually, tidied up his things in a hurry, and then started running outside.

"Where are you going in such a hurry?" Sean asked in confusion.

"Pick up girls!" Nick's voice was already far outside the door.

Fighting against the scorching sun, Nick ran to the door of the laboratory building panting. Because it was not during class, the laboratory building was already very empty at this time, and Alan was already waiting at the door when he was driving.

Nick, sweating profusely, said in a pissy voice: "Hurry...go to the lab, we... need something powerful!"

"what are you up to?"

"It's too late, just walk and say!"

The two ran into the laboratory building. Alan got the key from the administrator's father. With Dr. Alan's prestige, he used the laboratory privately. This was definitely not a problem. After rushing into the laboratory, Nick didn't bother to work and started to connect the decipher machine, because the decipher machine had been assembled instantly.

"Is this really OK?" Allen doubted.

"I don't know, but this is the only thing that can be called a weapon on the Internet. Civil computers are just small knives at best." Nick was still busy while talking.

"Don't I know what it is? This thing is really so beneficial!"

"Of course, this is a treasure. It is a professional equipment for cyber warfare, which is dedicated to serving wars. It is like tanks and aircraft in real warfare, with sufficient lethality. I don't know if it is the dizzy purchase of everything at the University of Ferbert, or the government's messy equipment. In short, this is not civilian technology!"

"What kind of land is this for?"

"The decipher machine that deciphers node encryption, node encryption is no longer a simple digital encryption method, but a set of encryption that combines digital physics. Seeing this wood does not have it, this is the core, that is, the password is this set of wood, just like the lock of a safe. Of course, this is more complicated. It is generally designed by mathematicians using some calculation method. OK, find a network cable connected to the network in the experimental building!"

"Well, there is a network transmission laboratory not far from here, and there is fiber optic access there. I'll pull one over!" Allen rolled up his sleeves and prepared to do something big. He went out of the lab to find the administrator's father and asked for the key to the network transmission laboratory.
Chapter completed!
Prev Index    Favorite Next