Chapter 444 - Chapter 444: Chapter 278: Only He, No! (Please Subscribe)_2 (1/2)
Chapter 444: Chapter 278: Only He, No! (Please Subscribe)_2
The man in the brown hat made a great effort amidst his busy schedule to find some free time. During the night, he began to read “Ace Agent.”
He wondered, is a novel really as magical as she claimed?
On the other side,
Lin Chuan, under the identity of “Killer 28,” had made contact with the bounty issuer, Big Tiger.
However, these bounty issuers were all very cunning.
They didn’t reveal any information about themselves during the conversation, and Big Tiger was no exception, keeping the conversation completely watertight.
Lin Chuan had no choice but to resort to his old profession and initiated a backup plan—
—to track Big Tiger’s network IP.
This time, tracking the network IP wasn’t as simple as the unrestrained attacks he had done before.
Because his conversation with Big Tiger was conducted through the BM website, which meant he had to go through this website to track Big Tiger’s network IP.
BM, being an assassin website, was backed by mysterious forces.
Lin Chuan didn’t want to make unnecessary enemies.
Thus, Lin Chuan took a relatively cautious approach.
As night deepened,
Lin Chuan had had a good night’s sleep the previous evening and was still quite alert at this hour.
Young people, who isn’t a night owl?
Yet Lin Chuan wasn’t particularly worried about the million-dollar bounty.
Meet the soldier and cover with earth as the water comes.
The higher one climbs, the more troubles one encounters, and the journey ahead gets tougher.
Initially, Lin Chuan was just a down-on-luck writer writing for a living.
Back then, the only problem was being poor.
Now, he wasn’t poor anymore.
But as they say, the more famous you are, the more problems arise, and sure enough, troubles came flooding in.
Luckily, Lin Chuan had a great mindset.
He walked out of his room unhurriedly in his ‘dah-dah’ slippers, filled a cup with warm water, and took a few gulps.
Only then did he start the IP tracking operation.
Lin Chuan bypassed the BM website and began tracking the bounty issuer, Big Tiger.
To Lin Chuan, Big Tiger seemed likely just to be an intermediary, with a large organization behind him.
Every big organization would keep a group of hackers to guard against cyber intrusions,
like the Morgan Group.
Although the hackers of the Morgan Group didn’t seem very prominent to Lin Chuan, facing an unknown organizational power, Lin opted to play it safe.
He preferred to spend more time rather than rashly invade and risk being discovered by the enemy, alerting them and spoiling the operation.
Caution was Lin Chuan’s consistent style.
It was also the key to his rare failures in the hacker field.
Outside the window, the night had fallen low.
The city’s neon lights flickered in the north wind, casting a hazy glow.
Lin Chuan’s eyes were fixed on the computer screen.
Data on the screen scrolled like waves, rows of code running within the programmed software.
The tracking began!
His hands moved swiftly, not at all like someone with a girlfriend should, but rather like a pianist who had been single for decades, his fingers dancing across the keys.
Lin Chuan first conducted a network scan on his communication with Big Tiger to capture any digital traces Big Tiger might have left.
This step was crucial.
Since he was avoiding BM website’s firewall, he also had to guard against snooping by both the BM website and Big Tiger.
At this moment, Lin Chuan was like a silent, stalking venomous snake, using “Hot Positioning” to search for his prey, ready to strike swiftly upon discovery!
Unfortunately,
the initial network scan was unsuccessful.
Lin Chuan touched his nose and muttered, “Are today’s opponents all this cunning?”
He had obtained a lot of information from this network scan, but much of it was misleading, such as a data packet hopping between multiple servers, its path complex and variable, clearly well-disguised and encrypted.
But as Lin Chuan followed the trace, it was like navigating a maze; walking along, he suddenly hit a dead end with no path forward.
—It was a fake data packet.
The opponent’s counter-tracking ability was strong, Lin Chuan concluded.
In reality,
Lin Chuan was unaware that due to the conflicts between Sania and himself, various powers had frantically enhanced their network security, fearing infiltration by a hacker master like Lin Chuan who might plant evidence and then accuse them of theft, which would be the end of them.