Chapter 73 The ending this time, I will determine the script!!

As the most developed country in the world, the United States has advanced scientific and technological development, and is leading the world in the field of computers and the Internet.

Naturally, it also attaches great importance to network information security.

Especially with regard to state secrets, there is a department in the White House dedicated to information security.

In this department, called the Cyber Security Bureau, many computer geniuses in the United States and even abroad are engaged in Internet security defense in the United States.

When there is nothing to do in normal times, steal other state secrets by the way. Yes, it’s just that shameless.

Near noon, eighteen-year-old Korod was in his seat, bored playing games.

As a genius who broke through the White House defense official website at the age of twelve, then was approached by agents, and finally recruited An into the security service, Koroder worked easily every day. Because of him, no one has been able to break through the White House in the United States for six years, and few people have come to make trouble for a long time.

Naturally, it seems a little boring all day long.

But today, just as he was about to leave work for lunch, a yellow exclamation mark popped up in the lower left corner of Koroder’s computer, and his eyes suddenly lit up.

“It’s been more than a year, and finally someone has come to attack the White House again.”

Excited, Korod decisively turned off the game, and his hands crackled on the keyboard.

Suddenly, on his computer, pages began to pop up and close continuously.

A minute later, Korod had a smile on his face and stopped.

Because the rookie who attacked the website just now actually used ordinary broiler chickens as a springboard, I don’t know if this hacking technology is now outdated.

If the other party had not decisively pulled the cable and cut off the network, and gave him another ten seconds, he would have been able to lock the exact location and then counter-invade the opponent’s computer.

At this time, the chief of the security section not far away walked out of the office: “Korod, I just saw a network intrusion prompt. ”

Korod shrugged: “Head, don’t care, a rookie, has been forced by me to cut off the power.” ”

Talter gave him a thumbs up: “Good job, but next time you can lock the other party’s address, it will be better to find out the identity.” ”

“No problem, Head, but I don’t think he’s afraid to come again.”

In the library, Chen Tian reopened the notebook with interest.

He simply tried to hack into the internal network of the White House just now, but he was stopped, and the other party’s method was very clever, which immediately made Chen Tian interested.

Dozens of seconds later, with the notebook turned on, Chen Tian’s hands turned into phantoms again, and countless messages brushed across the screen like a waterfall.

Even because it runs too fast, the temperature of the notebook keeps rising.

In the network security department, Koroder just stood up to go to lunch, and an exclamation mark popped up in the lower left corner of his computer, and he suddenly raised his eyebrows.

“Someone invaded again?”

Saying that, Korod sat down, tapped his fingers on the keyboard a few times, and then a smile appeared at the corner of his mouth: “Interesting, it’s the person just now.” ”

“You can’t run this time.”

Korod’s demeanor seemed very relaxed, after all, the rookie just now didn’t hold on for even a minute.

In fact, normally speaking, it can break through several layers of protective network and come to the point of the White House intranet, which is already a master in the hacker world.

But in Korod’s eyes, such people are still rookies.

Sure enough, dozens of seconds later, he broke the rookie’s last camouflaged broiler chicken, ready to lock the specific IP of the other party.

But………

“Huh! Interesting. ”

Koroder sat up straight, his expression became serious, and his hands tapped faster and faster on the keyboard.

Ten minutes later, Korod let out a breath and wiped the sweat from his forehead.

At this time, the middle-aged white man who came behind him at an unknown time, Tart said solemnly: “Korod, who is the person who invaded this time?” I can actually fight you for so long. ”

The expression on Korod’s face was not so relaxed this time, and he shook his head slightly: “It’s still the same person just now, and it’s the same invasion method as before.” ”

Tart was stunned, a little puzzled: “Then you…”

“But this time, the other party’s jumping broiler increased too fast, faster than the program deciphering speed I weave.”

Speaking of this, Korod felt some toothache.

He never imagined that someone would decipher computer IPs in other countries around the world, disguised as their own addresses, faster than the software he designed could decipher.

In other words, the ‘person’ who deciphers the PI address of other countries’ computers is actually a compiled super software.

Otherwise, how could a human be able to hack hundreds of computer addresses around the world in a second?

It seems that he met a master who used the most basic hacking technology to the peak, seemingly using basic intrusion technology, but it is actually super coding.

It can jump tens of thousands of IPs in one minute, scatter around the world, break through firewalls with massive broilers, and finally invade the core network.

And the first temptation pretended to be a rookie, just to paralyze him, and the second time was the real attack.

It’s just that I don’t know why, after holding out for ten minutes, the other party suddenly dropped, otherwise he was ready to apply for other simultaneous assistance in defense.

But in this way, he Korod’s face is lost. In the face of hacker intrusion, I actually have to find colleagues to help.

Next, Korod and Tart waited for more than ten minutes, and only breathed a sigh of relief after making sure that the other party had left completely.

Tart clapped his hands and looked at the other serious-looking subordinates in the office: “Okay, everyone go to dinner, the people who invaded just now have been repelled by Korod.” ”

“West, the computer is broken.”

In the library, Clarice looked at Chen Tian with some doubt, where his notebook was smoking black smoke.

Chen Tian’s eyes flashed with transparent light, glanced at the laptop, and nodded: “It’s that the temperature of the motherboard is heating up too fast, the heat dissipation can’t keep up, and the CPU line flashes spontaneously.” ”

“Oh.”

Clarice blinked wide-eyed.

“If it’s broken, it’s broken, Clarice, let’s go eat first.”

“In the afternoon, I will go to the underground base and ask Mr. Orolo to borrow the main computer of the base.”

After going to the cafeteria for lunch, Chen Tian found Orolo and borrowed the main computer under the pretext of inquiring about some information.

For Chen Tian, the current Storm Girl trusted very much, and agreed without thinking.

At two o’clock in the afternoon, the US Cyber Security Department, suddenly Korod looked stunned, and suddenly sat up straight: “Head, that person is really here again.” ”

“Is it coming.”

Tart’s eyes sharpened in the back: “This time, you join forces, you must lock the identity of this person and find it out.” ”

As the head of the cybersecurity department, Tartt was very cautious, feeling that the two attacks in the morning were certainly not a coincidence, so he was already waiting for the afternoon.

And on the grounds of national security, he persuaded Koroder to accept the plan assisted by others.

“Don’t worry, head.”

“Leave it to us.”

The surrounding youths said with relaxed expressions.

Although they are not geniuses at the level of Korod, they can enter the security information department, and each of them is very amazing in computer software.

A few are even similar to Korod, who were once the world’s top hackers, and were finally recruited by the United States.

At this time, everyone was sitting in front of their computers, and in front of them was a huge display screen, which had been connected to the department’s supercomputer.

But more than ten minutes later, everyone, including Korod, was sweating profusely, looking at the countless information waterfalls in front of them in disbelief.

They were breached by someone who broke through the firewall.

The torrent of millions of broilers that broke out in an instant directly broke through the blockade of their compilation.

No one could have imagined that the White House intranet, which had not been breached for six years, would be broken into today by an unknown hacker using the oldest method.

Tarte was the first to react and shouted: “Quick, disconnect the network and disconnect the line!” ”

Korod shook his head a little dejected: “It’s useless, head, the other party actually bypassed us and entered when he first invaded.” ”

“Korod, how is that possible?”

One hacker member didn’t believe it because they didn’t find a single trace of a breach.

Korod said calmly: “Because the other party’s method is to use tens of millions of broiler chickens as a cover to attract our attention and consume the computing power of the host at the same time.” ”

“And he himself, with a disguised code, mixed with the instructions we issued, bypassed the firewall and entered the intranet.”

“It’s just that after the other party went in, he just browsed the ordinary information on the intranet and did not download those military secrets, so he did not trigger the alarm.”

“This…”

Korod’s words made everyone stunned.

Which hacker inside and outside the attack, not for those military and scientific secrets? I have never heard of someone attacking the US White House intranet just to browse ordinary information.

Of course, these ordinary information are also classified as political secrets, but they are not as top-level scientific research and technology, and the level of military secrets is high.

At this time, Korod sighed and said, “Look, the other party has retreated.” ”

As his voice fell, the waterfall of information on the big screen disappeared at a speed visible to the naked eye, and finally returned to normal web pages.

No one cares about the chaos of the White House Cyber Security Department, the underground base, Chen Tian sits in front of the main control computer, thoughtfully recalling the information he just browsed.

Chen Tian’s eyes narrowed slightly: “The twelve primordial sentinels have been finally debugged and shipped to Alcatraz Island from Trask Industries at six o’clock in the morning. ”

Saying that, Chen Tian operated on the computer again and found the location of the Trask Industrial Company.

Then relying on hacking technology, he broke through the primary firewall and went in and quietly browsed.

“The Sentinel Robot Laboratory is not in the Trask industry, but in a large military facility on the Mi side, and it is very troublesome to destroy.”

“Sure enough, the United States attaches great importance to the sentinel plan.”

Sitting on the chair, Chen Tian pondered for a long time, and then eliminated some traces of search on the computer, got up and left.

He has already got the news he wants.

The next step is to think about the most favorable choice to make in the next mutant attack.

According to the plot trend, Wolverine, who goes out next, will find Jean and want her to go back with him, but is seriously injured and unconscious by Magneto’s random blow.

At the same time, Magneto used the doppelganger to attract the attention of the American official.

I myself raided Alcatraz Island with all his power, tearing the Golden Gate Bridge and descending domineeringly.

And when Magneto leads the attack to gain the upper hand, the awakened Wolverine leads the X-Men to arrive.

In the end, Magneto was hit by a potion bullet and lost his superpowers, and Jean ran away again, killing countless soldiers and mutants before being killed by Wolverine.

But this ending is not a good thing for him as a ‘mutant’.

Because without Magneto, some people’s eyes will be on the school or him.

So this time, the ending needs to follow his script.



Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like