Chapter 33: Hacker World

Style: Gaming Author: Nothingness Walker BeimingWords: 2155Update Time: 24/01/11 22:44:30
Therefore, for the winner of the "Qianlong Award", Tamron's porting agreement is to help developers port the game from a relatively simple PC game platform to an AR game platform at an extremely favorable price, and today Dai Wenquan will be in Sign relevant agreements within the company.

According to the agreement signed with Tenglong Company, Dai Wenguan can directly receive tens of thousands of bonuses and agency fees from Tenglong Company based on the winning results.

After the transplantation, developers will account for 30% of the game's profits. During this period, all transplantation, sales, and maintenance work can be produced by Tamron for free, which means that you can continue to make money while lying in bed.

This kind of conditions is quite favorable for newbie teams in this era, so many people are trying their best to win the "Qianlong Award".

Signing the agreement is purely voluntary. Not all game developers will accept this agreement. In the ten-year history of the "Qianlong Ascension Game Design Competition", there are still two winners who refused to transplant, thinking that their works were enough for the game and Tamron did not. Show your sincerity, and the remaining winners will be transplanted normally.

Dai Wenguan did not become the third rejecter. Although in the past, when he read online articles, he often saw the protagonist believing that the company saw the potential of its game product, so he refused the perfunctory offer and asked for more. In the past, Dai Wenguan could be said to have yearned for it. I think I should do the same.

But when he really had to face this choice, Dai Wenguan found that he had given up. He felt that as long as he could get the money quickly, it didn't matter even if he suffered a little loss.

The agreement between the two parties was officially signed on July 19. After Tamron confirmed the transplant, it opened a subsidiary forum for "Three Kingdoms" on its official website.

This is also Tamron's practice over the years. After the year in which the Qianlong Awards are held, the first game released must be a game that wins the "Qianlong Awards".

In previous years, when the game was ported from the PC platform to the AR platform, a very important task was to fix bugs. After all, it was a work developed by a new team within 3 years. It is normal to have many imperfect mechanisms and errors.

It's just that this year's "Three Kingdoms"... everyone knows that it is already a very complete game, so I'm afraid this won't take up too much time.

Based on this consideration, Tamron announced that the next game would be "Three Kingdoms", and the games that were originally scheduled to be released will be scheduled later.

This proposal did not encounter much opposition within the company. After all, the term "Qianlong Award" has proved the strength of "Three Kingdoms".

You must know that the last game to achieve this kind of achievement in the "Qianlong Award" was "Conquer Paradise" ("Sunrise Invasion") decades ago. While it pioneered a new model, it also brought great success to Tamron. Come to huge profits and fame.

Therefore, "Three Kingdoms" is now attracting much attention, and many people hope that it can become the second "Conquer Paradise" and inject a boost into Tamron, which has been languishing in recent years.

After the agreement with Tenglong was officially signed, Dai Wenguan's heavy heart finally settled, so he could now do things he didn't dare to do before.

Among the things he did not dare to do before, the one that worries him the most is the online violence he has suffered recently. This kind of behavior can be traced back to the victim's family. Now the main position has been transferred to the Internet, and various emails are sent to insult him. .

Although Dai Wenquan fought back at the "Qianlong Awards" and his heart still beats wildly when he thinks about it to this day, many people don't know whether it was a paid troll or selective blindness, and they always believed that it was the script director.

So what else is there to say? It’s okay if he doesn’t have the strength. Dai Wenguan, who has a super-future intelligent program in his hands, naturally wants to teach those people a lesson in kind.

So every day when I was eating and drinking alone, I would randomly pick a lucky person from these spam emails. It doesn't matter who sent it, just let Tai Chi track it and blast his homepage, and the video would be sent back for Devon to enjoy.

Sometimes people come to Dai Wenguan and don't have time to see it, but they don't stop doing this. They ask Tai Chi to explode one day and feedback the results to themselves.

Zhong Shanze performed this task very responsibly, firstly to carry out his own "throwing stones to ask for directions" plan, and secondly to exercise his abilities.

Whether it is offensive or defensive, hacking is helpful to Zhong Shanze's technological progress.

For example, a common technique used by hackers to harass homepages is Trojan horses. The image of a "Trojan horse" in the virtual world is a moth with a Trojan head.

When they attack, they will crawl on the wall. When the door of the wall opens to allow information to come in, they will take the opportunity to pierce their long sharp beaks, and their saliva will turn into small moths, stealing the information inside and feeding it back to the mother.

As for the defense, the deletion function is used. In the virtual world, Zhong Shanze transformed it into an exquisite pagoda. He often held it in his hand to cosplay the Pagoda King. When he saw a moth, he would directly delete it and smash it, and then there would be no worries.

One thing must be made clear in the virtual space. Basically, you should not rely on dodging to fight the enemy, because the virtual world is mostly a representation of the data world, and the speed of electronic signals is the speed of light. You are often hit before you can react, so The key to limiting data speed is the hand speed of real-world hackers typing code.

Therefore, you must be careful when going out to fight. Once you leave the safe area, you must transform into a virtual armor in your body. What corresponds to the data world is the virtual IP. Its function is that when being attacked, the armor will be attacked first, giving Zhong Shanze enough time to react. , after all, you have to know what many viruses look like...very disgusting.

The virtual world is so big that even if you rely on the power of a fierce ghost, you don't know how long it will take you to travel, so Zhong Shanze always uses the virtual world method here.

Everything you walk through will leave traces. The trajectory of those who attack Dai Wenquan's CR transformed room will be transformed into a faint green thread in the virtual world. As long as you have enough patience to follow the thread, you will definitely find it after bypassing countless broilers. Original launcher.

Zhong Shanze has two ways to deal with the initial target being found.

If the attacker is just a troll or a simple troll, the attack method is to flood the CR with massive amounts of abusive spam until the other party's CR collapses.

But if the other party is a hacker and tries to invade, anti-tracking Zhong Shanze will use the Locust virus to attack. This virus has a three-in-one function. The nibbling means deleting files, the venom means the impact of spam information, and the reproduction means continuous replication. itself.

Hackers only accounted for a small number of the targets of Dai Wenguan's early criticism, but as time went by, the number increased, and only a few were hired to attack, mostly out of curiosity.

Those hackers were hired because their employers believed that Dai Wenguan's Jedi counterattack was not a revelation. The truth must be hidden in his CR, or there may be clues.

But this is not the case for subsequent hackers. You must know that currently few hackers can benefit from "Dai Wenguan"'s attack, so they use this place as a training room. Even Zhong Shanze directs and acts by himself, allowing his own hacker vests to join in. During an attack.