Chapter 875: Cant stand it! (2/2)

After speaking, Su Ke trot for a while, quickly returned to the room and sat in front of the computer, the time shown on the screen was already 8.25.

”SK?”

”SK?”

”SK?”

According to the address given by ICE, I entered the private local area network again. This is an encrypted area. It is a bit like the company's own chat room. Su Ke had communicated with ICE here before, but staying now There is only a bunch of call information on the screen.

Wouldn't they already be acting? Su Ke was really a little sad, but at this moment, another sentence popped up on the screen: ”I trust, uncle, you are finally here!”

The name of ICE suddenly popped up again in the list.

”Sorry, there was a delay just now, what about you guys?” Su Ke quickly subtitled.

”Join speed!” ICE then typed out a string of network addresses.

At this time, there were two computers in front of ICE. One was following the companion's intrusion into the database of the Ivapert group, and the other was waiting for the rabbit, uh, waiting for Suker.

Otherwise, as soon as Su Ke landed, he would find out.

”Okay!” Su Ke took a deep breath, and before arguing with Li Zeqing, he was disturbed. Now he calms himself down. He just subconsciously read the formula of ”Taoist Twelve Duanjin”. In the past, the strength that began to flow from one to the other quickly swam through the body, and my heart became clear.

The hacking tools that I downloaded from my mailbox were opened one by one, the broiler computer jumped one by one, and it seemed like I had traveled all over the world.

The wall conflict clock at the Institute of Global Conflict and Cooperation at the University of California, United States is 4.30 in the morning. It is the time when everyone is silent and everyone sleeps, but now the lights are bright and everyone's face is somber.

Not only are the staff of the 'Minerva Project' gathered here, but also the staff of the 'Otec project', which is a network and information security researcher in the new network environment. They all belong to the University of California. Come and help.

These are the top talents of the two projects. The Minerva Project Suk does not know about it, but Otec is the real network field. The aspects of information security research naturally include the well-known hacking techniques.

Information security is not only protection, but also anti-invasion, that is, offense. Since it is called research, naturally there are innovative methods. ICE they run into their injustice, encryption technology, anti-intrusion, Trojan anti-submarine, and even vulnerability camouflage. And other aspects are unprepared.

”SHIT!”

This is a bald foreign man with big nose, blue eyes, and eagle hook nose. Seeing this body type can participate in UFC fights, with a tiger-backed waist and a burly figure, but at this time, he stared nervously at the computer screen in front of him, his hands knocking quickly Hit the keyboard.

The fine sweat on his forehead gave him a clear overview of his current performance. He turned his head and shouted at his companion: ”Scola, come on, help me, I can't stand this new guy. ! ”