Chapter 24

504 15 3
                                    

Chapter 24. 024 Send me the verification code

    After completing the order to invade Aike, Shen Yi gained a lot of computer knowledge from Zero, and his familiarity with computers has reached the level of a normal college student - the kind who has obtained a second-level computer certificate.

    Although she can feel that the 'plot' in the dark has not yet reached the time of occurrence, but she understands the operating mechanism of computers and the Internet, even if she does not obtain more advanced hacking skills, Shen Yi is quite satisfied.

    Most importantly, a change in mindset.

    Now, she can use the Internet every day to get acquainted with this strange world that makes her feel very new.

    A lot of information that ordinary people can't find, for today's Shen Yi, it only takes a little time and a little tool to find it, instead of facing Baoshan and unable to find the way at the beginning.

    However, Shen Yi's leisure time did not last long. The original Zero was only famous, but because of this successful invasion of Aike, she became famous in the hacker forums of the dark web. You must know that the Internet like Aike Large companies, even if they are not classified departments, are well known in the industry for their security systems.     More importantly, neither the security experts of Aike Company nor fellow hackers have analyzed what technical means the previously unknown 'Zero' used to successfully invade.     Therefore, a large number of various orders soon found Shen Yi.     Of course, among them, there are more people venting their dissatisfaction with game companies...     However, although Zero is a hacker, he is also a thief. He does not accept any tasks for money. The nature of her, the circle also knows about this situation, so she was able to find her clients in the past, at least for some reasonable reasons.     After the fame this time, most of the orders were malicious and destructive, with obvious purposes. These orders were directly filtered out by Shen Yi. She had a hunch that if she did, it would fail to 'play' , lost access to hacking skills.











    After screening most of them, there are still some similar intrusion orders left, and Shen Yi does not plan to take them again. Her last commission was not to exploit the loopholes in the network, but the loopholes in human nature. The audience is equivalent to deceiving the whole world.

    But if it is repeated several times, the risk of failure of the action will increase. If the previous method is dismantled, I don't know if it will cause the collapse of the human design.

    Moreover, in order to obtain more advanced hacking skills, what Shen Yi needs is to continue accepting more difficult tasks.

    Of course, Shen Yi does not have no advantages at all. She has basic computer knowledge, and now she is very familiar with Zero's computer. Before Zero, she made a lot of worm software and deciphering tools. Now these tools are very convenient for Shen Yi. Direct use, no need to remake.

    After carefully sifting through a bunch of commissions sent over, Shen Yi chose a few projects that seemed suitable.

    These projects were all more difficult than the last one, but after doing some background checks, Shen Yi found that none of them met the 'zero' standard.

    Finally, while browsing the bounty forum, a top challenge caught Shen Yi's attention: the task of 'breaking through the core firewall of Tron Information Corporation'

    is not a bounty, but a challenge.

    Throughout the dark web, it is listed as a challenge because no one has ever succeeded.

I rely on acting to become a full-scale boss (MTL)Where stories live. Discover now