Chapter 493: You fight me! (1/2)
[The text of Chapter 1]
Section 494 Chapter 493 You live and die!
Just as the National Intelligence Agency of the Southern Dynasty is divided into three domestic, international, and northern intelligence offices, the core of the Qingwatai website is the same, but all the information is filtered and purified before it is posted here. Of course, the password for access is only known to the president. .
However, Qingwatai ’s website defense is very distinctive. If the Pentagon that Su Ke had invaded before was a three-story package, then Qingwatai can be described by pleats, three inside and three outside.
Su Ke was a little excited. After all, he could fight with so many masters, but he was lost, but he was assigned to a task that he could cope with, like a firefighter. Where there was trouble, he would add it immediately.
However, Su Ke, who has been fully rewarded with advanced (advanced) hacking skills, is really empty of blood and has nowhere to report. In the discussion group, ICE has made detailed arrangements for the next division of labor.
There are a total of six people, divided into three groups. One is a sharp knife, cuts the defense, and advances directly. The other is destruction, creating loopholes to trap the host. The remaining group is Su Ke and a person with the code 43. They are only responsible for rescue. Disaster relief.
Supporting the chin, using only one hand to control the keyboard, and staring at the screen, these people are really good. In exchange for themselves who have not received advanced rewards, they are really not opponents. Even their offensive thinking is very advanced, but Well now! Ha ha! In such a short time, Su Ke has even seen a few vulnerabilities that were ignored by these peers, but were fatal to the website.
However, I am embarrassed to mess with it. If I mess with the ICE plan, I am a sinner, but it is interesting to say that the defense of the website in the Southern Dynasty is really bottomless. In such a short time, Su Ke can count it. Invaded the fourth defensive wall.
Although the other party has begun a counterattack, trying to cut off the network information flow of ICE and others, but he is not as good as others, and he has lost ground, so that Su Ke is really doing nothing.
In the lobby of the Nan'an network security office, Park Zhengxing quickly tapped his finger on the keyboard. A layer of sweat had appeared on his forehead, and he moved directly into the eye socket along the brow bone. The sour feeling made him very uncomfortable, but he couldn't spare time. Smeared with sweat, the small lunch box did not know when he had been knocked to the ground, and delicious kimchi was scattered.
The hard disk was overloaded, and there was a sour voice. Suddenly the screen suddenly turned black, and there was no response at all. Park Zhengxing punched on the keyboard, and he stood up the next moment and ran to Another computer continued to fight.
This is the fifth computer that has been compromised. One third of the computers in the office lobby cannot be turned on. The class manager on duty is looking anxiously at the bad scene now, because he is only an administrative officer. These technologies are only half-knowledgeable and totally helpless.
Seeing that Park Zhengxing's computer was also hacked, he could no longer control his emotions and shouted at the secretary behind him: ”Come on! Please come to George!”
George Howard, the leading hacking expert in the United States, has successfully invaded the air defense command system, directly threatening the national security of the United States, and then deciphered the central computer password of the FBI, and even worked on major websites to specifically rob various programs and data.
According to FBI estimates, George Howard has exceeded $ 600 million, which is why the Bureau of Investigation has deployed it closely and finally arrested him at the cost of two years, while waiting for him is up to 50 Years of imprisonment.
However, the cyber warrior plan created by the United States rescued George, and he was absorbed into the plan along with other hackers. These people worked for the National Security Bureau and are the most secretive cyber force.