Super Black Technology

Chapter 32: Data storm

多 How big is a letter? 1Byte.

多 How big is a word? About 10 bytes.

How big is a paragraph? May be hundreds of bytes.

大 How big is an article? Hundreds or even tens of millions of bytes.

How loud is a sound? A few MB or even hundreds of MB (1MB equals 1024KB, 1KB equals 1024 bytes).

大 How big is a video? If the resolution is high, you may need to use GB to calculate (1GB equals 1024MB).

So, how big are all the letters, all the words, all the words, all the contracts of the documents and all the sounds and images of half the world?

Nothing to measure!

Even the top computer group in the world can't hold such a huge amount of information.

The whirlpool pattern spins rapidly, shattering all the information brought by the mysterious light waves into fragments, and turning it into the most primitive single byte. Is a letter, a number, or 0 and 1 (the most basic language of a computer) ...

Instantly, the vortex has been rotated to the extreme.

警告 "Warning! Ike indigenous people, the attack is about to begin, please make a backup of important information. The countdown starts!"

"5!"

"4!"

"3!"

"2!"

"1!"

"Stellar Data Stream Launch!"

"Boom!"

At this instant, Ike seemed to hear a huge sound.

At this instant, Ike seemed to see a terrifying black hole giant. After absorbing the energy of a universe, it opened its mouth for extinction.

The endless stream of data is gushing from the mouth ...

Opposite Ike, Professor Toures's computer was the first to bear it.

In a thousandth of a millisecond, Professor Toures's specially-made hard disk was instantly drowned by a huge data stream.

"Snapped!"

The screen of the computer was dark for a moment, and a scorching light of smoke was emitted from the host computer. Professor Toures' computer was declared dead first.

"What's going on? What happened?"

After 图 wiped out Professor Tulse's computer, an endless stream of data began to flow to the Cyber ​​Security Supervision Department along the "competition" dedicated line.

It wants revenge, it wants revenge frantically!

Network Security Supervision Department Building.

Network engineers are sitting in a daze in front of their computers. Now who has the mood to continue testing with that little guy? Didn't see the entire Ombudsman building, and were they filled with **** federal special police from top to bottom?

Review, review ass! Can we still be spies?

喂 "Hello, man, how much did you write down that code before?" An engineer asked in a low voice to his colleagues.

"Note down 600 lines, how about you?"

"I wrote down 700 lines, the last 700 lines, how about you?"

"I'm 600 lines of positive numbers!"

The two were overjoyed and gave each other a sympathetic look, indicating that after the review, everyone would exchange.

"What do you two say? Don't talk casually!" The special policeman shouted and interrupted the communication between the two.

The two of them scolded, grabbed the mouse and scrambled on their computer. It seemed that this could vent their inner anger.

Suddenly, the mouse doesn't move!

"what happened?"

"No, it's a data flow attack!"

Yes, it is indeed a data flow attack, but it is not a data flow in the ordinary sense, but--

Half a world!

There are more people than people, right? More than broilers, right? come on!

The endless chaotic data is like a sea of ​​oceans, setting off huge waves. Everything that stands in front of it is all ants.

The hard disk is full, the host is paralyzed, and all computers are killed instantly from the top to the bottom of the building.

Basement.

The three large computer groups deployed by the United States Department of Supervision sounded a sharp alarm sound, but this is for birds.

The data stream turned instantly, ferociously pouring into the basement.

"Boom!"

The alarm went out, and the three large computer groups were instantly trapped by the crazy data stream, and then they were completely laid back.

Uh ...

最 The top network engineer in the United States, plus the hundreds of top hackers that the US government recruits in the world, plus the best hardware equipment, everything is equal to zero.

After the slaughter of the U.S. Cybersecurity Oversight Department, the data flow began along another line. That was a military line, and the end of the line was--

U.S. Department of Defense! Pentagon!

Since the Pentagon was completed in 1943, it has been the symbol of America's strongest military force, and it is also where the United States has dominated the world for almost a century of hegemony.

It has never been hit, and it has never been captured.

But today, it has encountered an unprecedented offensive.

多 How fast is the radio wave? If the speed of light!

How fast is light? 300,000 kilometers per second!

An endless stream of data reaches the Pentagon in an instant.

All of a sudden, all computers, mobile phones, memory, and all devices that can store data, all reached the limit of capacity.

Even in the basement, which was tens of meters above the ground, the supercomputer did not escape this doom. Of course, as the military's most proud work, it lasted 0.5 seconds at a super speed of 18 trillion times per second.

congratulations!

Military hall.

All soldiers are crying, including the commander-in-chief of the three forces, including the white man of the strategy committee.

Why is this happening? Why is this happening?

Our military just wants to learn advanced technology. Why did our Ministry of National Defense fall in the end?

The white man wanted to call Morton, but at this time, everyone's mobile phone could not be turned on. Because the memory inside the phone is full of junk data, it can't be full anymore ~ ​​www.readwn.com ~ What should I do? How to do?

Uh ...

Seattle Villa.

Aike is eating watermelon with Maria again. Because the computer was burned down by Toures' computer, he won the "test".

Of course, it's useless even if Professor Toures brings in a new computer, because at this moment, even the United States Department of Defense is already lying.

Alas, did things really end like this?

Stellar data stream attack is really only at such a low level? Ike asked the light ball in his soul.

I answered him with the metal electronic sound of Clos disdain, with only seven words:

"It's just starting now!"

what? Killing the Cyber ​​Security Surveillance Department in seconds, and the attack on the US Department of Defense has just begun?

Uh ...

Washington State, US Department of Defense.

After the revenge was over, the endless stream of data suddenly lost its goal, and it didn't know where to go.

At this moment, suddenly!

A strange wind blew up inexplicably, in the basement, in the military hall, in the corridor ...

All soldiers are unaware of its existence, because it is invisible to the naked eye.

Gradually, gradually, the wind became stronger and stronger ...

Taking the central green area of ​​the Pentagon as the center, the wind began to grow rapidly, with a diameter of ten meters, a hundred meters, kilometers ...

After a short while, a strong hurricane with a diameter of 10,000 meters finally took shape ...

It uses electromagnetic as a medium and carries endless and chaotic data. Its name is--

Data Storm ~ www.readwn.com ~ Welcome the book readers to read, the latest, fastest and hottest serial works are all in ~ www.readwn.com ~ Mobile users please read.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like