Chapter 493: You fight me!
-
Urban Romance
- Lonely Constant
- 1307 characters
- 2021-02-03 05:45:37
[The text of Chapter 1]
Section 494 Chapter 493 You live and die!
Just as the National Intelligence Agency of the Southern Dynasty is divided into three domestic, international, and northern intelligence offices, the core of the Qingwatai website is the same, but all the information is filtered and purified before it is posted here. Of course, the password for access is only known to the president. .
However, Qingwatai ’s website defense is very distinctive. If the Pentagon that Su Ke had invaded before was a three-story package, then Qingwatai can be described by pleats, three inside and three outside.
Su Ke was a little excited. After all, he could fight with so many masters, but he was lost, but he was assigned to a task that he could cope with, like a firefighter. Where there was trouble, he would add it immediately.
However, Su Ke, who has been fully rewarded with advanced (advanced) hacking skills, is really empty of blood and has nowhere to report. In the discussion group, ICE has made detailed arrangements for the next division of labor.
There are a total of six people, divided into three groups. One is a sharp knife, cuts the defense, and advances directly. The other is destruction, creating loopholes to trap the host. The remaining group is Su Ke and a person with the code 43. They are only responsible for rescue. Disaster relief.
Supporting the chin, using only one hand to control the keyboard, and staring at the screen, these people are really good. In exchange for themselves who have not received advanced rewards, they are really not opponents. Even their offensive thinking is very advanced, but Well now! Ha ha! In such a short time, Su Ke has even seen a few vulnerabilities that were ignored by these peers, but were fatal to the website.
However, I am embarrassed to mess with it. If I mess with the ICE plan, I am a sinner, but it is interesting to say that the defense of the website in the Southern Dynasty is really bottomless. In such a short time, Su Ke can count it. Invaded the fourth defensive wall.
Although the other party has begun a counterattack, trying to cut off the network information flow of ICE and others, but he is not as good as others, and he has lost ground, so that Su Ke is really doing nothing.
In the lobby of the Nan'an network security office, Park Zhengxing quickly tapped his finger on the keyboard. A layer of sweat had appeared on his forehead, and he moved directly into the eye socket along the brow bone. The sour feeling made him very uncomfortable, but he couldn't spare time. Smeared with sweat, the small lunch box did not know when he had been knocked to the ground, and delicious kimchi was scattered.
The hard disk was overloaded, and there was a sour voice. Suddenly the screen suddenly turned black, and there was no response at all. Park Zhengxing punched on the keyboard, and he stood up the next moment and ran to Another computer continued to fight.
This is the fifth computer that has been compromised. One third of the computers in the office lobby cannot be turned on. The class manager on duty is looking anxiously at the bad scene now, because he is only an administrative officer. These technologies are only half-knowledgeable and totally helpless.
Seeing that Park Zhengxing's computer was also hacked, he could no longer control his emotions and shouted at the secretary behind him: "Come on! Please come to George!"
George Howard, the leading hacking expert in the United States, has successfully invaded the air defense command system, directly threatening the national security of the United States, and then deciphered the central computer password of the FBI, and even worked on major websites to specifically rob various programs and data.
According to FBI estimates, George Howard has exceeded $ 600 million, which is why the Bureau of Investigation has deployed it closely and finally arrested him at the cost of two years, while waiting for him is up to 50 Years of imprisonment.
However, the cyber warrior plan created by the United States rescued George, and he was absorbed into the plan along with other hackers. These people worked for the National Security Bureau and are the most secretive cyber force.
This time George was sent to the Southern Dynasty. He was in charge of a recent small-scale joint military exercise and was responsible for the monitoring and evaluation of cyber warfare between the two countries. However, as a master of the network, he was naturally invited to the Cyber Security Division of the Information Institute to guide his work. .
In the same office building, there are high-end apartment rooms specially applied for George. One is a small office in the United States, and the other is to enter the lobby for monitoring at any time.
At this time, George Howard was wearing an apron, humming an unknown minor key, and a large piece of tender steak on the pan was exuding a strong aroma.
To be honest, George was really helpless about coming to South Korea this time. As a Westerner, he really couldn't see the taste of these people holding some pickled turnips and cabbages, and he even had a deep contempt in his heart.
Humans should eat meat, watching the steaks gradually take shape, and a large amount of saliva has been secreted involuntarily in the mouth. At this time, a sharp ringing of the phone rang.
George, who wanted to wait until the table was delicious before answering the phone, frowned tightly as the phone rang, "Hey! If you're fine, you're dead!"
"Mr. George, my name is Jin Yitai, the on-duty supervisor of the Network Security Division. We are now under attack by a group of hackers. The situation is very critical. Please help me!" The voice on the other side of the phone sounded eager and the pronunciation was bad. English always expresses his meaning.
"Hacker? Oh! Wait a minute, I'll go downstairs!" If you can let George take his attention away from delicious food, the only possibility is the Internet, and when you hear a strong opponent appear, where else? Taking care of the steak, he picked up his special computer and ran out.
The hard disk was overloaded and stopped with a click. The computer screen went dark and another computer was destroyed. This was the seventh computer.
George didn't look at the anomaly over there. He quickly connected to the Internet and opened his own specially-made program toolkit. A smile came out of his mouth: "It looks like the opponent is good!"
------
Yanjing, the dark room was full of flashing fluorescence from the computer screen, ICE had a serious face, but he was very excited in his eyes. Seeing that he would get the final authority, he could get the list of potential personnel. At this time, he encountered a strong counterattack.
"Fuck!" Suddenly ICE jumped out of anger, quickly pressed the shutdown button, unplugged all the network cables from the computer, her complexion turned blue, and she turned to look at the man who had been standing behind her: "Boss ! "
The man with a Chinese character face didn't speak. Just now he had been standing behind ICE, and he knew at a glance the strength he encountered. Even if he went into battle, he probably could not get any benefit, but the man almost touched the path of the broiler. Yanjing, and ICE's decision to unplug the network cable is completely correct.
"Oh! One solution!" George Howard, the blue eyes smiled very charmingly, although he had just touched the path of three broilers across Asia and Europe, but the other person responded in time and cut off the contact directly. .
But fortunately, one left, and the other five left! You can play slowly! Thinking of this, George put his target on another hacker who rushed ahead.