Desperate Hacker
Chapter 299 Are you the speaker?
Chapter 299 Are you...peaker?
Zimbabwe is one of the poorest countries in the world.
The country is known for its hyperinflation.
The numbers on the banknotes are all scary.It can almost subvert your cognition.
However, such banknotes can buy almost nothing in such a country.
But this is a country with rich mineral resources.
So although they are poor, they can still find some good things.
For example, this country has the second-largest supercomputer in Africa.
Supercomputers are widely used in meteorology and scientific research.
But in a country like this, many people don’t even have enough to eat.
It must be very difficult to maintain such a behemoth.
So in most cases, this computer will be authorized for use in some foreign countries.
Even individual groups are acceptable if you have enough money.
……
This time in a hotel in Zimbabwe.
Someone is busy manipulating something with a laptop, and in front of his desk is a photo of the supercomputer in Zimbabwe that he is proud of.
At this time, he sat in front of the computer and stretched, then stood up and left.
Then someone sat in front of the seat again and turned on his computer.
"Say! Why do we have to go through so much trouble to do this after we hijacked so many Bitcoins?"
"Do you think you have a lot of money?"
"of course not!"
"That's it! There's one more thing, Peaker taught us!"
"what?"
"That is, you can use the financial market to make legal money. Can you explain clearly why you are in your 20s and your parents are farm workers, but you have Bitcoin worth hundreds of millions?"
After hearing his companion's words, the young man stopped complaining.
However, at this moment, the girl who had been lying in another room took off her blindfold and slowly walked out.
They rented a villa here.
To be honest, it is not uncommon for Europeans and Americans to come to this country for consumption and entertainment.
No matter how poor a country is, there are still rich people, and there are also curious people who want to come and experience the local customs.
Of course some people come with a purpose!
Their purpose here is simple, which is to run the transaction script they compiled on the supercomputer in Zimbabwe.
To be honest, this automatic trading model is quite complicated.
It requires both financial knowledge and strong computing power.
The most important thing is that there are not many people in the world who can develop a complete system.
Peaker is still the most dazzling hacker in the entire token circle, and the impression he brings to players is fatal!
So he has also become a lingering nightmare in the token circle!
This is why the Anonymous organization plans to use the speaker’s fame to frame this dazzling rising star, and at the same time raise some funds for their own organization!
They don't need the speaker's consent!
Because Anonymous is almost the most influential hacker organization in the world in all aspects!
No one knows who their leader is. Everyone knows each other online and has their own small circle in life.
The small circle in front of them is maintained by these people themselves.
Today's computer systems are becoming more and more complex, so much so that the era of one person working alone is almost over.
Anonymous, in particular, sometimes carries out multiple attacks at the same time, so of course they need to act in unison.
Duke, who had just gotten off work, sat in the kitchen and planned to make a cup of coffee for everyone.
However, at this moment, the girl who came down from upstairs came to him, then lowered her voice and whispered:
"Susan seems to be in contact with someone!" "What?"
"I hacked into her computer before, but she probably didn't notice me! I just found out that she was sending messages to someone, but all the messages were encrypted, even the messages on the keyboard!"
After hearing the news, Duke couldn't help but frowned!
Suddenly a bad premonition came to his mind.
Everyone was drowsy because of jet lag, but no one could really sleep on this exciting night.
Duke came back into the room with the coffee pot, and the boys who were lying on the beds, sofas, or cushions jumped to their feet.
Everyone shared coffee with paper cups.
Then everyone got busy again!
At this time, Angela, the only female hacker among them, was also sitting on the sofa holding her legs and holding her computer.
So far, the only person they suspect is Susan!
Susan used to be a member of the Apocalypse Group, but later he was expelled from the group for some well-known reasons.
From then on, this person could not even be found in the school.
Angela had met Susan before.
But she didn't know at the time that Susan was working for the CIA.
There was even a time when Angela even wanted to develop Susan!
But now I'm glad that she didn't do such a thing in the first place.
Otherwise, it would simply be sending a sheep into the tiger's mouth.
But at this moment...
"Fuck! Why did my computer crash?"
"mine too!"
Du Ke heard everyone's words and quickly came over to check. There were five of them here. First, the first row was locked. No matter what button he pressed, it didn't work.
Then came the second, then the third, until even the computer that An came in was locked.
"What a joke!"
Although some people say this, no one will take this scene as a joke.
They are hackers, so of course they know what the scene in front of them means?
Duke suddenly woke up and quickly disconnected the network cable.
However, at this time, white dialog boxes began to pop up on the computer screen?
"Who are you!"
Log in the log constantly.The same log information scrolls across the screen.
At this time, Chen Qingfeng had found the culprit.
These people went to Africa and used the supercomputers there to create such a big thing.
But unfortunately, at the moment of the invasion, the anti-intellectual system in their computer discovered themselves.
So Chen Qingfeng simply locked their computers.
But these people are very experienced, and the camera is completely blocked with tape!
But Chen Qingfeng still has a way!
Sometimes you don’t have to use an image to identify a person, you can also use a voice!
Duke looked at everyone with lingering fear at this time!
Everyone knew who had hacked in at that moment!
"is it him?"
"Who else but him?"
"What does he want to do?"
Duke thought for a while, then he reconnected the network cable to his computer.
Chen Qingfeng, who was far away at the other end, thought he would just give him a lesson, but he didn't expect that the other party actually reconnected to the network.
So he let go of the locked keyboard on the other party's computer!
"Are you...peaker?"
(End of this chapter)
Zimbabwe is one of the poorest countries in the world.
The country is known for its hyperinflation.
The numbers on the banknotes are all scary.It can almost subvert your cognition.
However, such banknotes can buy almost nothing in such a country.
But this is a country with rich mineral resources.
So although they are poor, they can still find some good things.
For example, this country has the second-largest supercomputer in Africa.
Supercomputers are widely used in meteorology and scientific research.
But in a country like this, many people don’t even have enough to eat.
It must be very difficult to maintain such a behemoth.
So in most cases, this computer will be authorized for use in some foreign countries.
Even individual groups are acceptable if you have enough money.
……
This time in a hotel in Zimbabwe.
Someone is busy manipulating something with a laptop, and in front of his desk is a photo of the supercomputer in Zimbabwe that he is proud of.
At this time, he sat in front of the computer and stretched, then stood up and left.
Then someone sat in front of the seat again and turned on his computer.
"Say! Why do we have to go through so much trouble to do this after we hijacked so many Bitcoins?"
"Do you think you have a lot of money?"
"of course not!"
"That's it! There's one more thing, Peaker taught us!"
"what?"
"That is, you can use the financial market to make legal money. Can you explain clearly why you are in your 20s and your parents are farm workers, but you have Bitcoin worth hundreds of millions?"
After hearing his companion's words, the young man stopped complaining.
However, at this moment, the girl who had been lying in another room took off her blindfold and slowly walked out.
They rented a villa here.
To be honest, it is not uncommon for Europeans and Americans to come to this country for consumption and entertainment.
No matter how poor a country is, there are still rich people, and there are also curious people who want to come and experience the local customs.
Of course some people come with a purpose!
Their purpose here is simple, which is to run the transaction script they compiled on the supercomputer in Zimbabwe.
To be honest, this automatic trading model is quite complicated.
It requires both financial knowledge and strong computing power.
The most important thing is that there are not many people in the world who can develop a complete system.
Peaker is still the most dazzling hacker in the entire token circle, and the impression he brings to players is fatal!
So he has also become a lingering nightmare in the token circle!
This is why the Anonymous organization plans to use the speaker’s fame to frame this dazzling rising star, and at the same time raise some funds for their own organization!
They don't need the speaker's consent!
Because Anonymous is almost the most influential hacker organization in the world in all aspects!
No one knows who their leader is. Everyone knows each other online and has their own small circle in life.
The small circle in front of them is maintained by these people themselves.
Today's computer systems are becoming more and more complex, so much so that the era of one person working alone is almost over.
Anonymous, in particular, sometimes carries out multiple attacks at the same time, so of course they need to act in unison.
Duke, who had just gotten off work, sat in the kitchen and planned to make a cup of coffee for everyone.
However, at this moment, the girl who came down from upstairs came to him, then lowered her voice and whispered:
"Susan seems to be in contact with someone!" "What?"
"I hacked into her computer before, but she probably didn't notice me! I just found out that she was sending messages to someone, but all the messages were encrypted, even the messages on the keyboard!"
After hearing the news, Duke couldn't help but frowned!
Suddenly a bad premonition came to his mind.
Everyone was drowsy because of jet lag, but no one could really sleep on this exciting night.
Duke came back into the room with the coffee pot, and the boys who were lying on the beds, sofas, or cushions jumped to their feet.
Everyone shared coffee with paper cups.
Then everyone got busy again!
At this time, Angela, the only female hacker among them, was also sitting on the sofa holding her legs and holding her computer.
So far, the only person they suspect is Susan!
Susan used to be a member of the Apocalypse Group, but later he was expelled from the group for some well-known reasons.
From then on, this person could not even be found in the school.
Angela had met Susan before.
But she didn't know at the time that Susan was working for the CIA.
There was even a time when Angela even wanted to develop Susan!
But now I'm glad that she didn't do such a thing in the first place.
Otherwise, it would simply be sending a sheep into the tiger's mouth.
But at this moment...
"Fuck! Why did my computer crash?"
"mine too!"
Du Ke heard everyone's words and quickly came over to check. There were five of them here. First, the first row was locked. No matter what button he pressed, it didn't work.
Then came the second, then the third, until even the computer that An came in was locked.
"What a joke!"
Although some people say this, no one will take this scene as a joke.
They are hackers, so of course they know what the scene in front of them means?
Duke suddenly woke up and quickly disconnected the network cable.
However, at this time, white dialog boxes began to pop up on the computer screen?
"Who are you!"
Log in the log constantly.The same log information scrolls across the screen.
At this time, Chen Qingfeng had found the culprit.
These people went to Africa and used the supercomputers there to create such a big thing.
But unfortunately, at the moment of the invasion, the anti-intellectual system in their computer discovered themselves.
So Chen Qingfeng simply locked their computers.
But these people are very experienced, and the camera is completely blocked with tape!
But Chen Qingfeng still has a way!
Sometimes you don’t have to use an image to identify a person, you can also use a voice!
Duke looked at everyone with lingering fear at this time!
Everyone knew who had hacked in at that moment!
"is it him?"
"Who else but him?"
"What does he want to do?"
Duke thought for a while, then he reconnected the network cable to his computer.
Chen Qingfeng, who was far away at the other end, thought he would just give him a lesson, but he didn't expect that the other party actually reconnected to the network.
So he let go of the locked keyboard on the other party's computer!
"Are you...peaker?"
(End of this chapter)
You'll Also Like
-
Starry Sky Railway: Start by looking for a marriage partner for the rich pharmacist
Chapter 241 5 hours ago -
Star Iron Genshin Impact: Mihoyo Live
Chapter 299 5 hours ago -
Hong Kong Variety Show: I can travel through the magical world
Chapter 180 5 hours ago -
Naruto: I am Kokushibo, the invincible six-eye
Chapter 76 5 hours ago -
On the night of genocide, I awakened the eternal Izanagi
Chapter 210 5 hours ago -
Elf: I draw a lottery for a divine beast at the beginning, and I am invincible!
Chapter 429 5 hours ago -
Prince of Tennis: Fusion Kaido, Thunder Gossip Polk
Chapter 136 5 hours ago -
American comics: Extracting the immortality of cancer cells at the beginning
Chapter 154 5 hours ago -
What? The ladies in my dreams are real.
Chapter 452 5 hours ago -
Reborn to get the male god system, but transformed into a girl
Chapter 117 5 hours ago