Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 32 Data Storm

How big is a letter? 1Byte(byte).

How big is a word? About 10 bytes.

How big is a passage? It may be hundreds of bytes.

How big is an article? Hundreds or even tens of millions of bytes.

How loud is a piece of sound? How many MB or even hundreds of MB (1MB equals 1024KB, 1KB equals 1024 bytes).

How big is a video segment? If the resolution is high, it may need to be calculated in GB (1GB equals 1024MB).

So, how big do all the letters, all words, all the words, all the documents and contracts in half the world, plus all the sounds and images?

Unmeasurable!

Even the top computer teams in the world today cannot hold such a huge amount of information.

The vortex pattern rotates rapidly, stirring all the information brought by the mysterious light wave into pieces and turning it into the most primitive single bytes. They are letters, numbers, or maybe 0 and 1 (the most basic language of computers)...

In an instant, the vortex has rotated to the extreme.

"Warning! Ike Native, the attack is about to begin. Please make a backup of important information. Countdown starts!"

“5!”

“4!”

“3!”

“2!”

“1!”

"Steer data streams are emitted!"

"boom!"

At this moment, Ike seemed to hear a huge loud sound.

At this moment, Ike seemed to see a terrifying black hole beast. After absorbing the energy of a universe, it opened its bloody mouth to destroy the world.

Endless streams of data gushed out of their bloody mouths...

Opposite Ike, Professor Tours' computer was the first to be affected.

Within one thousandth of a millisecond, Professor Tours's specially made hard drive was instantly flooded by a huge data stream.

"Bang!"

The computer screen suddenly darkened, and a wisp of burnt smoke emerged from the host. Professor Tours's computer was first announced to be killed.

"What's going on? What happened?"

After destroying Professor Touls' computer, endless data flow began to flow along the "competition" dedicated line to the Cyber ​​Security Supervision Department.

It wants to revenge, it wants to revenge wildly!

Cybersecurity Supervision Department Building.

The network engineers were sitting in front of their respective computers in a daze. Who is still in the mood to continue testing with that little guy? Didn’t you see that the entire Supervision Department building was already covered with damn Federal SWAT police from top to bottom?

Review, review it just shit! Can we still be spies?

"Hey, man, how much did you write down the previous code?" an engineer asked in a low voice to his colleague.

"I have recorded 600 lines, what about you?"

"I wrote down 700 lines, which is the countdown 700 lines. What about you?"

"I'm a positive number of 600 rows!"

The two were overjoyed and gave each other a knowing look, saying that after the review is over, everyone will have an exchange.

"What are you two saying? Don't talk casually!" The special police shouted loudly and interrupted the communication between them.

The two of them cursed inwardly, grabbed the mouse and moved randomly on their computers, as if doing so could vent their inner anger.

Suddenly, the mouse stopped moving!

"What's going on?"

"Not good, it's a data flow attack!"

Yes, it is indeed a data flow attack, but it is not a data flow in the usual sense, but—

Half a world!

There are more people than people, right? There are more than broiler, right? Come on!

The endless chaotic data is like a vast ocean, causing huge waves. All the existences that stand in front of it are ants.

The hard drive was filled, the host was paralyzed, and the entire Supervisory Department building was killed from top to bottom.

basement.

The three main computer groups deployed by the U.S. Department of Supervision sounded sharp alarms, but this was a bird.

The data flow instantly turned and rushed toward the basement fiercely.

"boom!"

The alarm sound went out, and the three large computer groups were instantly trapped by crazy data flows, and then they were completely trapped.

...

The top network engineers in the United States, coupled with the hundreds of top hackers recruited by the US government around the world, and the best hardware equipment, everything is equal to zero.

After the US Cybersecurity Supervision Department was destroyed, the data flow began to move along another line. It was a military line, and the end of the line was-

US Department of Defense! Pentagon!

Since the Pentagon was built in 1943, it has been the symbol of the strongest force of the United States and the hegemony that the United States has dominated the world for nearly a century.

It has never been hit, nor has it been captured.

But today, it encountered an unprecedented offensive.

How fast is the speed of the radio wave? Wait for the speed of light!

How fast is the light? 300,000 kilometers per second!

The endless stream of data arrives in an instant at the Pentagon.

Suddenly, all computers, mobile phones, memory, and all devices that can store data have reached the limit of storage.

Even the basement dozens of meters above the ground, the supercomputer did not escape this bad luck. Of course, as the military's most proud work, it lasted for 0.5 seconds at a super speed of 18,000 billion times per second.

Greeting congratulations!

Military Hall.

All the soldiers were almost crying, including the commander-in-chief of the Navy, Army and Air Force, and the white man from the Strategic Committee.

Why is this happening? Why is this happening?

Our military just wants to learn advanced technology, why did even our Ministry of National Defense fall into the end?

The white man wanted to call Malton, but at this time everyone's phone could not be turned on. Because the memory inside the phone was filled with garbage data, so full that it could not be filled anymore.

What to do? What to do?

...

Seattle Villa.

Ike was eating watermelon with the beautiful Maria again. Because Tours' computer burned the host, he won the "competition".

Of course, even Professor Touls moved another new computer, it would be useless, because at this moment, even the US Department of Defense was already in vain.

But is it really over like this?

The stellar data flow attack is really only at such a low level? Ike asked the light ball in his soul.

The answer to him was the metal electronic sound that Klos despised, with only seven words:

"It's just beginning now!"

What? The attack that killed the Cybersecurity Supervision Department in seconds and fell into the US Department of Defense has just begun?

...

Washington State, U.S. Department of Defense.

After the revenge is over, endless data churn loses its target and it doesn't know where to go.

At this moment, suddenly!

A strange wind blew up inexplicably, blowing in the basement, in the military hall, and in the corridor...

No soldier noticed its existence because it was invisible to the naked eye.

Gradually, gradually, the wind became stronger and stronger...

With the central green area of ​​the Pentagon as the center, the wind began to grow rapidly, with a diameter of ten meters, hundreds of meters, and kilometers...

In an instant, a strong hurricane with a diameter of 10,000 meters finally took shape...

It uses electromagnetic as the medium and carries endless chaotic data. Its name is-
Chapter completed!
Prev Index    Favorite Next