Desperate Hacker
Chapter 193 Get out of my territory
Chapter 193 Get out of my territory
My companions were all having fun outside.
Susan, on the other hand, stayed alone in the room quietly.
A Broadway opera is playing on the smart speaker in the room.
Susan likes to listen to more opera while writing code and doing data analysis.
Because the beautiful sound of opera can calm her heart and focus her thinking on logical imagination to the maximum extent.
For big data analysis, R language or Matlab is usually used.
Then some fixed algorithms must be used.
Susan used to prefer Matlab when she was in college, but later after she taught herself R language, she moved to the open source platform.
First, she needs to extract the most valuable medical data from Yufeng Intelligent Company.
After this data is imported, cleaned, converted, and analyzed, it will become a good product!
Medical data has always been the most sought-after product on the data commercial black market.
Susan skillfully uses command exchange to process data on the console.
The huge data sample quickly became particularly obedient under her skillful hands.
After a slightly lengthy data import time, Susan began to perform data summary work, and then cleaned the data to filter out some missing values, outliers and duplicate values.
The next step is to clean the data so that the data becomes a more regular format.
Then there is the data conversion.
These are all standard operations, and Susan prefers to use a script to do it all.
However, due to the computing power of her computer, this process was somewhat lengthy.
Fortunately, Susan was just trying her hand at it. She only extracted a portion of the data and tried to sort it out.If the effect is good, she will use the script she has written now to continue processing subsequent data.
After a cup of black tea was brewed, Susan returned to the computer.
The prompt command under the command line shows that she has completed the basic processing of the data.
Then she slid the mouse and started to view some of the content output in the process.
Susan slid the scroll wheel slowly, but just as she turned the scroll wheel downward, she suddenly felt that the content on the screen was a little out of sync.
Susan picked up the mouse doubtfully.
Then tried again.
Suddenly a creepy feeling arose spontaneously.
She stared at the camera, but her screen began to scroll back uncontrollably.
Susan was shocked when she saw this.
Soon, a dialog box popped up on the screen.
"Is this how you process data?"
The cursor flashed under the dialog box, and Susan was shocked.But at this time curiosity defeated fear.
She looked at her camera, which was covered with tape, and it was obvious that the other party couldn't see her face.
"who are you?"
"Aren't you making trouble in my name?"
"You are……"
"You look like you have a good figure, and the pink sweater suits you very well!"
Susan looked at the camera in horror. She didn't believe that a person could see her face through the tape.
"Stop moving, I can't see your face, but the hotel you are staying in seems to have a camera installed, and now I can see your body!"
"What did you say?"
"You have been captured by me. I have kept a copy of all the data on your computer. To be honest, this is the first time I have seen someone use R language to process a large amount of data. What you just did is very useful to me. Finally, I said In one sentence, get out of my territory..."
Suddenly, the speaker that was originally playing melodious singing suddenly made a sharp sound, and then the TV in the room suddenly turned on.
Then various pop-ups and messages keep popping up.
Susan was so frightened by this scene that she even forgot to unplug the network cable from her computer.
However, at this moment, her screen suddenly went black, and then connected to the TV and computer, a message appeared at the same time.
"Get out of my place!"
Susan opened the door in horror, and then kept knocking on her companions' rooms.
Someone was responsible for the attack last night and did not go to Lan Kwai Fong to celebrate today.
Soon Susan was knocking on other people's doors like crazy in the corridor of the hotel.
Then someone kept opening the door.
"Why are you so crazy?" "That person... who?"
"That person is coming in!"
"Who are you talking about?"
"peaker...the real peaker..."
"What did you say?"
Susan's companion looked at her in disbelief, and then the two of them rushed into the temporary server room.
As a result, after entering, almost all the screens were flashing.
"Get out of my place!"
The two of them hurriedly unplugged the network cables from the server and switch.
But even so, nothing can be stopped.
They failed completely in this operation.
When Susan realized that the other party had connected to her computer, she knew that everything was over.
The Apocalypse team is too arrogant.
Those people are still drunk in Lan Kwai Fong, but the scene is already out of control.
Who knows what everyone has stored in their computers, and who knows how much data the other party has taken away?
Ten minutes later, these people who were still happy in Lan Kwai Fong received calls one after another.
Then he was half sober from the wine in an instant!
"Brothers, wake up, wake up! Something happened over there!"
Some people were drunk and unconscious, while others remained sober.
However, these Hong Kong girls held their arms and refused to let them leave.
Some even want to go back to the hotel with them.
But soon, these guys remembered their responsibilities.
The Apocalypse Project is related to their college tuition fees and whether they can be recommended by the school and enter first-class companies after graduation.
So they cannot fail.
But now they screwed up...
……
Chen Qingfeng finally started to clean up the mess, but this time someone dared to challenge his authority, and he wanted to give these people a good blow.
So he spent most of the day connecting to the server and didn't take action immediately.
He even watched with interest as one of the guys impersonating him controlled the computer to analyze the stolen data.
To be honest, Chen Qingfeng's knowledge system came from his university days.
But over the years, he has had little time to concentrate on technology and research.
Some aspects indeed belong to the old knowledge system.
So he watched with interest as the girl manipulated a brand new tool to process huge amounts of data.
Chen Qingfeng was very engrossed in watching it, and he was even a little reluctant to take action.
It wasn't until the girl accidentally interrupted his train of thought and made him move the mouse involuntarily to look at the previous content that Chen Qingfeng realized that the other party had noticed his presence.
It's impossible not to take action now.
Chen Qingfeng looked at the servers he had set up in the cold storage and the hard disk storage full of information, and he was immediately satisfied.
He did not obtain this data directly from the victim, but played a trick on the victim.
Now he needs someone to deal with the aftermath.
"Chang'an!"
"Old Chen, how are you doing?"
"The harvest is not small, can you contact Xiao Jian?"
"How to say?"
"I'll give you a voice-changing software, and you tell him that you belong to an organization called Speaker, and now there are some things that need him to announce!"
"What's going on? We didn't mention this plan before?"
"There is a genius who recorded everyone's names and information on the computer. Now I know who these people are. They are a hacker organization called the Apocalypse Group!"
"Good job!"
(End of this chapter)
My companions were all having fun outside.
Susan, on the other hand, stayed alone in the room quietly.
A Broadway opera is playing on the smart speaker in the room.
Susan likes to listen to more opera while writing code and doing data analysis.
Because the beautiful sound of opera can calm her heart and focus her thinking on logical imagination to the maximum extent.
For big data analysis, R language or Matlab is usually used.
Then some fixed algorithms must be used.
Susan used to prefer Matlab when she was in college, but later after she taught herself R language, she moved to the open source platform.
First, she needs to extract the most valuable medical data from Yufeng Intelligent Company.
After this data is imported, cleaned, converted, and analyzed, it will become a good product!
Medical data has always been the most sought-after product on the data commercial black market.
Susan skillfully uses command exchange to process data on the console.
The huge data sample quickly became particularly obedient under her skillful hands.
After a slightly lengthy data import time, Susan began to perform data summary work, and then cleaned the data to filter out some missing values, outliers and duplicate values.
The next step is to clean the data so that the data becomes a more regular format.
Then there is the data conversion.
These are all standard operations, and Susan prefers to use a script to do it all.
However, due to the computing power of her computer, this process was somewhat lengthy.
Fortunately, Susan was just trying her hand at it. She only extracted a portion of the data and tried to sort it out.If the effect is good, she will use the script she has written now to continue processing subsequent data.
After a cup of black tea was brewed, Susan returned to the computer.
The prompt command under the command line shows that she has completed the basic processing of the data.
Then she slid the mouse and started to view some of the content output in the process.
Susan slid the scroll wheel slowly, but just as she turned the scroll wheel downward, she suddenly felt that the content on the screen was a little out of sync.
Susan picked up the mouse doubtfully.
Then tried again.
Suddenly a creepy feeling arose spontaneously.
She stared at the camera, but her screen began to scroll back uncontrollably.
Susan was shocked when she saw this.
Soon, a dialog box popped up on the screen.
"Is this how you process data?"
The cursor flashed under the dialog box, and Susan was shocked.But at this time curiosity defeated fear.
She looked at her camera, which was covered with tape, and it was obvious that the other party couldn't see her face.
"who are you?"
"Aren't you making trouble in my name?"
"You are……"
"You look like you have a good figure, and the pink sweater suits you very well!"
Susan looked at the camera in horror. She didn't believe that a person could see her face through the tape.
"Stop moving, I can't see your face, but the hotel you are staying in seems to have a camera installed, and now I can see your body!"
"What did you say?"
"You have been captured by me. I have kept a copy of all the data on your computer. To be honest, this is the first time I have seen someone use R language to process a large amount of data. What you just did is very useful to me. Finally, I said In one sentence, get out of my territory..."
Suddenly, the speaker that was originally playing melodious singing suddenly made a sharp sound, and then the TV in the room suddenly turned on.
Then various pop-ups and messages keep popping up.
Susan was so frightened by this scene that she even forgot to unplug the network cable from her computer.
However, at this moment, her screen suddenly went black, and then connected to the TV and computer, a message appeared at the same time.
"Get out of my place!"
Susan opened the door in horror, and then kept knocking on her companions' rooms.
Someone was responsible for the attack last night and did not go to Lan Kwai Fong to celebrate today.
Soon Susan was knocking on other people's doors like crazy in the corridor of the hotel.
Then someone kept opening the door.
"Why are you so crazy?" "That person... who?"
"That person is coming in!"
"Who are you talking about?"
"peaker...the real peaker..."
"What did you say?"
Susan's companion looked at her in disbelief, and then the two of them rushed into the temporary server room.
As a result, after entering, almost all the screens were flashing.
"Get out of my place!"
The two of them hurriedly unplugged the network cables from the server and switch.
But even so, nothing can be stopped.
They failed completely in this operation.
When Susan realized that the other party had connected to her computer, she knew that everything was over.
The Apocalypse team is too arrogant.
Those people are still drunk in Lan Kwai Fong, but the scene is already out of control.
Who knows what everyone has stored in their computers, and who knows how much data the other party has taken away?
Ten minutes later, these people who were still happy in Lan Kwai Fong received calls one after another.
Then he was half sober from the wine in an instant!
"Brothers, wake up, wake up! Something happened over there!"
Some people were drunk and unconscious, while others remained sober.
However, these Hong Kong girls held their arms and refused to let them leave.
Some even want to go back to the hotel with them.
But soon, these guys remembered their responsibilities.
The Apocalypse Project is related to their college tuition fees and whether they can be recommended by the school and enter first-class companies after graduation.
So they cannot fail.
But now they screwed up...
……
Chen Qingfeng finally started to clean up the mess, but this time someone dared to challenge his authority, and he wanted to give these people a good blow.
So he spent most of the day connecting to the server and didn't take action immediately.
He even watched with interest as one of the guys impersonating him controlled the computer to analyze the stolen data.
To be honest, Chen Qingfeng's knowledge system came from his university days.
But over the years, he has had little time to concentrate on technology and research.
Some aspects indeed belong to the old knowledge system.
So he watched with interest as the girl manipulated a brand new tool to process huge amounts of data.
Chen Qingfeng was very engrossed in watching it, and he was even a little reluctant to take action.
It wasn't until the girl accidentally interrupted his train of thought and made him move the mouse involuntarily to look at the previous content that Chen Qingfeng realized that the other party had noticed his presence.
It's impossible not to take action now.
Chen Qingfeng looked at the servers he had set up in the cold storage and the hard disk storage full of information, and he was immediately satisfied.
He did not obtain this data directly from the victim, but played a trick on the victim.
Now he needs someone to deal with the aftermath.
"Chang'an!"
"Old Chen, how are you doing?"
"The harvest is not small, can you contact Xiao Jian?"
"How to say?"
"I'll give you a voice-changing software, and you tell him that you belong to an organization called Speaker, and now there are some things that need him to announce!"
"What's going on? We didn't mention this plan before?"
"There is a genius who recorded everyone's names and information on the computer. Now I know who these people are. They are a hacker organization called the Apocalypse Group!"
"Good job!"
(End of this chapter)
You'll Also Like
-
Starry Sky Railway: Start by looking for a marriage partner for the rich pharmacist
Chapter 241 5 hours ago -
Star Iron Genshin Impact: Mihoyo Live
Chapter 299 5 hours ago -
Hong Kong Variety Show: I can travel through the magical world
Chapter 180 5 hours ago -
Naruto: I am Kokushibo, the invincible six-eye
Chapter 76 5 hours ago -
On the night of genocide, I awakened the eternal Izanagi
Chapter 210 5 hours ago -
Elf: I draw a lottery for a divine beast at the beginning, and I am invincible!
Chapter 429 5 hours ago -
Prince of Tennis: Fusion Kaido, Thunder Gossip Polk
Chapter 136 5 hours ago -
American comics: Extracting the immortality of cancer cells at the beginning
Chapter 154 5 hours ago -
What? The ladies in my dreams are real.
Chapter 452 5 hours ago -
Reborn to get the male god system, but transformed into a girl
Chapter 117 5 hours ago