Chapter 399 - Chapter 399: Chapter 257: Hugging Silk, I Am the Fighter Jet Among the Top-Tier! (5000-Word Chapter) (2/2)

Yet Lin Chuan was able to accurately find the key information: “Status: Shut down.”

“Shut down, that’s even safer!”

Lin Chuan glanced at the time on the lower right corner of the computer: 2024/12/10/04:12, the corners of his mouth turning up slightly.

But he didn’t rush into the attack!

A true Hunter, when facing his prey, must maintain absolute patience.

At this moment, Lin Chuan was not just a world-class Hacker but also resembled the King of Killers. A single move from him would be fatal!

To stir the grass and startle the snake, returning without accomplishing anything, was not his style!

Then, Lin Chuan checked the activity status of the local network that Lucas was on, thanks to his hidden program.

The Morgan Group Asia-Pacific Branch’s local network was now at its lowest activity period, aligning with Lin Chuan’s predictions.

This was the foresight of a top-tier Hacker making a move.

Once Lin Chuan confirmed it was the best time, he immediately launched into action.

He took another sip of Maojian tea, and then his hands rapidly struck the keyboard. The mouse was left to the side, completely unused.

The codes that had been prepared in advance unfolded their utility in mere seconds.

The program embedded in the Hass Armed Forces network carrying weapon information showed its might at this critical moment.

Yes, power up!

They were starting up Lucas’s computer that had been shut down!

This might sound ridiculous, but in the world of Hackers, especially among top-tier Hackers, it was a completely achievable operation.

When a computer is under Hacker attack, can shutting it down avoid the attack?

The answer is no!

If the computer is connected to power, a Hacker can control the computer’s motherboard through pre-installed code. Another method is through the network to remotely start the computer, gaining control of the host machine.

The most effective way to prevent a Hacker attack—

Cut off the computer’s power supply, sever the motherboard’s capacitors, unplug the network card on the motherboard along with all computer peripherals, and remove the hard drive.

Thus, it’s as if making the computer completely disappear from the network, robbing Hackers of their target.

However, it was clear that Lucas had not anticipated that while he was attacking Haas Armed Forces, Lin Chuan could also be attacking him!

Or rather.

He had not fully realized that this lawsuit was actually a cyber-attack and defense battle!

There was also another possibility; he had great confidence in his home security system and did not take Lin Chuan seriously.

Little did he know, Lin Chuan had already discovered a security vulnerability in the network defense of the Morgan Group in these past days.

For a top-tier Hacker.

As long as there was a program, there would be security vulnerabilities. And as long as there were vulnerabilities, intrusion was possible. There was no need to understand it completely; one vulnerability was enough to be lethal.