Tom cat breaking through the dimensional wall
Chapter 119 Ignore the warning and continue to visit!
Chapter 119 Ignore the warning and continue to visit!
dark web?
Jerry shook his head frantically upon hearing this.
It really doesn't know anything about it.
Tom hesitated for a while, then shook his head.
It knows a little about the dark web, but it's all heard from the major up masters, and it doesn't know much about it.
What's more, this is still in the data world.
Who knows what the dark web in the data world looks like.
But one thing is certain, there is a high probability that it will not be a good thing.
Seeing the two little whites shaking their heads in unison in front of him, the thin tall masked man smiled with satisfaction: "The dark web is a good place. The entire data world is huge, and the metropolis of the surface network you are in is just an iceberg in the data world." Just a corner."
"Many things that can't be found on the surface, as long as you go to the dark web, no matter what it is, you can easily find it."
"Wow!"
Tom and Jerry are very suitable for the performance of the tall and thin masked man.
Holding the heart in both hands, the eyes are full of little shining stars.
"Okay, I'll give you a link, you can click on it, and you can go to the dark web."
The tall, thin masked man said, and sent out a long series of incomprehensible links, which floated in front of Tom and Jerry.
Meanwhile, the real world.
A hacker has a successful grin on his face.
This person is the tall thin masked man in the data world.
Originally, he just browsed the online disk every day to see if he could find some useful resources.
It turned out that there were traces left by two computer Xiaobai.
It was obvious that they were looking for something.
The hacker doesn't need to know what Tom and the others are looking for, anyway, he just needs to know that Tom and the others are looking for something.
As long as they know that this is confirmed, they can be tricked into clicking the link they sent.
Once you click on your own link, all the other party's data will be exposed under your own eyes, and it will be up to you whether to round or flatten it afterwards.
As a hacker with bad morals, his goal is of course to get some money from Tom.
Now many people surf the Internet with their real names, and have bound various mobile phone numbers and bank card numbers to various websites.
The hacker was confident he would be able to transfer the money he wanted from Tom's account.
As for the so-called dark web, hackers do know the address of the dark web.
Usually he will also accept some entrusted work there.
But he would not be so stupid as to actually send the so-called dark web link to strangers.
Hackers don't know if something will happen to Tom and Jerry.
But if the address of the dark web is spread at will, the hacker feels that something will happen soon, after all, he is not in Huaguo.
It is still very easy for someone to find him.
He didn't want to be drowned in the bottom of the sea for no reason.
In the data world, Tom Mu looked at the unknown link floating in front of him. Under the expectant eyes of the hacker, he raised his hand and pressed it.
The moment he pressed the unknown link, Tom felt a faint pulling force, as if he wanted to send it somewhere.
At the same time, a red warning window popped up in front of Tom.
[Your link is not a private link, attackers may steal your information (such as: password, communication content or credit card information)]
[Ignore the warning and continue to visit/exit]
This is the firewall at work.
Seeing the scene in front of him, Tom raised his head and looked at the tall and thin masked man in front of him with a probing look.
The thin and tall masked man obviously didn't expect to encounter such an embarrassing sight.
Fortunately, his skin is thick enough.
Quickly said: "Darknet, it's normal to have such a warning, isn't it? After all, there are many things in it that are not suitable for children to read."
As he spoke, it seemed that he was not afraid of Tom's hesitation. A bean-sized bead of sweat slid down the masked face of the tall and thin masked man, and he said in a tense tone: "You shouldn't be so timid. Don’t even dare to click on a link?”
"Just kidding, I'm super brave, okay?"
Tang Mu raised his chin and chose [Ignore the warning and continue to visit].
Today, I will be a lone brave man.
"Very well, that idiot took the bait."
Seeing that the opposite party really dared to randomly click on unfamiliar links, this hacker, who seemed to be quite average, suddenly burst into laughter.
The website has already given a warning.
If it were him, he would definitely not continue to visit.
But it's good to be silly, and now it's time to reap the fruits of your labor.
Real-world hackers are rubbing their hands in excitement, ready to cash in on everything Tom has online.
But after he knocked on the computer "crackling", he felt that something was not right.
He couldn't find any information Tom left on the Internet at all.
There is no social media account, no email address, and no mobile phone number or credit card bound.
It's blank, and it doesn't look like a person living in modern society at all.
"Doesn't this person never shop, entertain, or communicate with other people on social software?"
The hacker continued to dig deeper, confused.
How did he know that Tom had the same identity as Jerry in this mission world.
Both are natives of the data world.
As an aborigine, it is naturally impossible to have those things that only netizens in the real world need.
Hackers, apparently natives of the data world for the first time, are scratching their heads.
Tom also encountered a little problem here.
Originally, it thought that after confirming the continued access, it and Jerry would be sent to the dark web.
No matter how bad it is, just like Delaman, spawn a vehicle for them to ride.
As a result, nothing happened.
A few minutes passed, and they were still standing there.
"stuck?"
Tom turned to look at Jerry beside him.
Jerry shrugged, not knowing what the situation was.
It should be stuck...
Tom could still feel the tug from that link.
Since there is no response when pressing confirm, if no one answers, just go there by yourself.
living comfortably without anybody's help.
Thinking so, Tom followed the faint pulling force and pulled open a big hole in the network storage warehouse!
This gap is full of green codes flowing quickly.
Telling Jerry to wait where he was, Tom Mu, a daring man of Yigao, jumped in directly!
How does it know.
That link isn't useless, it's just useless for them.
At this point the poor little hacker is still struggling with this.
"Crackling" in his hands kept tapping on the keyboard.
A sudden change appeared on the computer screen in front of him.
I saw a hole suddenly cracked on his computer desktop, and countless source codes composed of [0] and [1] flowed through it.
In the next second, a familiar cartoon cat image jumped out of it and landed on the desktop taskbar at the bottom of his screen.
"Tom?!"
The hacker was a little surprised.
I am trying to blackmail other people's information on my own side, so I won't say if I didn't succeed.There was even a cartoon Tom cat on my desktop!
"Am I hacked?"
The hacker who doesn't know the aborigines of the data world at all, the first thing he can think of is that he is mistaken, and the person on the other side is not some idiot who doesn't understand computers.
That is a computer hacker who is smarter than himself!
(End of this chapter)
dark web?
Jerry shook his head frantically upon hearing this.
It really doesn't know anything about it.
Tom hesitated for a while, then shook his head.
It knows a little about the dark web, but it's all heard from the major up masters, and it doesn't know much about it.
What's more, this is still in the data world.
Who knows what the dark web in the data world looks like.
But one thing is certain, there is a high probability that it will not be a good thing.
Seeing the two little whites shaking their heads in unison in front of him, the thin tall masked man smiled with satisfaction: "The dark web is a good place. The entire data world is huge, and the metropolis of the surface network you are in is just an iceberg in the data world." Just a corner."
"Many things that can't be found on the surface, as long as you go to the dark web, no matter what it is, you can easily find it."
"Wow!"
Tom and Jerry are very suitable for the performance of the tall and thin masked man.
Holding the heart in both hands, the eyes are full of little shining stars.
"Okay, I'll give you a link, you can click on it, and you can go to the dark web."
The tall, thin masked man said, and sent out a long series of incomprehensible links, which floated in front of Tom and Jerry.
Meanwhile, the real world.
A hacker has a successful grin on his face.
This person is the tall thin masked man in the data world.
Originally, he just browsed the online disk every day to see if he could find some useful resources.
It turned out that there were traces left by two computer Xiaobai.
It was obvious that they were looking for something.
The hacker doesn't need to know what Tom and the others are looking for, anyway, he just needs to know that Tom and the others are looking for something.
As long as they know that this is confirmed, they can be tricked into clicking the link they sent.
Once you click on your own link, all the other party's data will be exposed under your own eyes, and it will be up to you whether to round or flatten it afterwards.
As a hacker with bad morals, his goal is of course to get some money from Tom.
Now many people surf the Internet with their real names, and have bound various mobile phone numbers and bank card numbers to various websites.
The hacker was confident he would be able to transfer the money he wanted from Tom's account.
As for the so-called dark web, hackers do know the address of the dark web.
Usually he will also accept some entrusted work there.
But he would not be so stupid as to actually send the so-called dark web link to strangers.
Hackers don't know if something will happen to Tom and Jerry.
But if the address of the dark web is spread at will, the hacker feels that something will happen soon, after all, he is not in Huaguo.
It is still very easy for someone to find him.
He didn't want to be drowned in the bottom of the sea for no reason.
In the data world, Tom Mu looked at the unknown link floating in front of him. Under the expectant eyes of the hacker, he raised his hand and pressed it.
The moment he pressed the unknown link, Tom felt a faint pulling force, as if he wanted to send it somewhere.
At the same time, a red warning window popped up in front of Tom.
[Your link is not a private link, attackers may steal your information (such as: password, communication content or credit card information)]
[Ignore the warning and continue to visit/exit]
This is the firewall at work.
Seeing the scene in front of him, Tom raised his head and looked at the tall and thin masked man in front of him with a probing look.
The thin and tall masked man obviously didn't expect to encounter such an embarrassing sight.
Fortunately, his skin is thick enough.
Quickly said: "Darknet, it's normal to have such a warning, isn't it? After all, there are many things in it that are not suitable for children to read."
As he spoke, it seemed that he was not afraid of Tom's hesitation. A bean-sized bead of sweat slid down the masked face of the tall and thin masked man, and he said in a tense tone: "You shouldn't be so timid. Don’t even dare to click on a link?”
"Just kidding, I'm super brave, okay?"
Tang Mu raised his chin and chose [Ignore the warning and continue to visit].
Today, I will be a lone brave man.
"Very well, that idiot took the bait."
Seeing that the opposite party really dared to randomly click on unfamiliar links, this hacker, who seemed to be quite average, suddenly burst into laughter.
The website has already given a warning.
If it were him, he would definitely not continue to visit.
But it's good to be silly, and now it's time to reap the fruits of your labor.
Real-world hackers are rubbing their hands in excitement, ready to cash in on everything Tom has online.
But after he knocked on the computer "crackling", he felt that something was not right.
He couldn't find any information Tom left on the Internet at all.
There is no social media account, no email address, and no mobile phone number or credit card bound.
It's blank, and it doesn't look like a person living in modern society at all.
"Doesn't this person never shop, entertain, or communicate with other people on social software?"
The hacker continued to dig deeper, confused.
How did he know that Tom had the same identity as Jerry in this mission world.
Both are natives of the data world.
As an aborigine, it is naturally impossible to have those things that only netizens in the real world need.
Hackers, apparently natives of the data world for the first time, are scratching their heads.
Tom also encountered a little problem here.
Originally, it thought that after confirming the continued access, it and Jerry would be sent to the dark web.
No matter how bad it is, just like Delaman, spawn a vehicle for them to ride.
As a result, nothing happened.
A few minutes passed, and they were still standing there.
"stuck?"
Tom turned to look at Jerry beside him.
Jerry shrugged, not knowing what the situation was.
It should be stuck...
Tom could still feel the tug from that link.
Since there is no response when pressing confirm, if no one answers, just go there by yourself.
living comfortably without anybody's help.
Thinking so, Tom followed the faint pulling force and pulled open a big hole in the network storage warehouse!
This gap is full of green codes flowing quickly.
Telling Jerry to wait where he was, Tom Mu, a daring man of Yigao, jumped in directly!
How does it know.
That link isn't useless, it's just useless for them.
At this point the poor little hacker is still struggling with this.
"Crackling" in his hands kept tapping on the keyboard.
A sudden change appeared on the computer screen in front of him.
I saw a hole suddenly cracked on his computer desktop, and countless source codes composed of [0] and [1] flowed through it.
In the next second, a familiar cartoon cat image jumped out of it and landed on the desktop taskbar at the bottom of his screen.
"Tom?!"
The hacker was a little surprised.
I am trying to blackmail other people's information on my own side, so I won't say if I didn't succeed.There was even a cartoon Tom cat on my desktop!
"Am I hacked?"
The hacker who doesn't know the aborigines of the data world at all, the first thing he can think of is that he is mistaken, and the person on the other side is not some idiot who doesn't understand computers.
That is a computer hacker who is smarter than himself!
(End of this chapter)
You'll Also Like
-
The original god's plan to defeat the gods is revealed, starting with the God of Fire saving th
Chapter 117 5 hours ago -
The end of the world: My refuge becomes a land of women
Chapter 430 5 hours ago -
Return to Immortality: One point investment, a billion times critical hit!
Chapter 120 5 hours ago -
Steel, Guns, and the Industrial Party that Traveled to Another World
Chapter 764 1 days ago -
The Journey Against Time, I am the King of Scrolls in a Hundred Times Space
Chapter 141 1 days ago -
Start by getting the cornucopia
Chapter 112 1 days ago -
Fantasy: One hundred billion clones are on AFK, I am invincible
Chapter 385 1 days ago -
American comics: I can extract animation abilities
Chapter 162 1 days ago -
Swallowed Star: Wish Fulfillment System.
Chapter 925 1 days ago -
Cultivation begins with separation
Chapter 274 1 days ago