Chapter 493: You Are in a Life-and-Death Confrontation!
Just as the National Intelligence Service of the Southern Dynasty is divided into three intelligence offices: domestic, international, and northern, so is the core of the Blue House website, but it is only after filtering and purifying all the information before putting it here. Of course, only the president knows the password to check. . %&*”;
However, the website defense of the Blue House is very distinctive. If the Pentagon that Su Ke had invaded before was a three-layer package, then the Blue House can be described as pleated, with three layers inside and three layers outside, and the package is very pleasant.
Su Ke was a little excited. After all, he was able to fight with so many masters, and he was a little lost, but he was assigned to the task of supporting him, like a firefighter. Wherever there was trouble, he would go to supplement it immediately.
However, Su Ke, who has already been rewarded for being proficient in hacking technology (advanced), is really full of enthusiasm now, but has no way to serve the country. In the discussion group, ice has already made detailed arrangements for the next division of labor.
There are six people in total, divided into three groups. One group is sharp knives, which cut the defense and advance directly. disaster relief.
Holding his chin, he only uses one hand to control the keyboard, and his eyes are fixed on the screen. These people are really strong. If they were me who didn't get high-level rewards, they were really not opponents. Even their offensive thinking was very advanced, but Now! Ha ha! In such a short time, Su Ke has even seen several loopholes that have been ignored by these peers, but are fatal to the website.
But I'm embarrassed to mess around. If I mess up ice's plan, I'll be a sinner, but it's interesting to say that the defense of Nanchao's website is really bottomless. In such a short time, Su Ke can count it. Invasion to the fourth layer of defense wall.
Although the other party has begun to organize a wave of counterattacks, trying to cut off the network information flow of ice and others, but the skills are not as good as others, and they are retreating, so that Su Ke really has nothing to do. i^
In the internet security office hall of the Southern Dynasty, Pu Zhengxing tapped the keyboard with his fingers quickly, and a layer of sweat had appeared on his forehead. After sweating, the small lunch box was knocked over by him at some point, and the delicious pickles were scattered.
The hard drive was overloaded, and there was a sour sound. Suddenly the screen went black, and there was no response. Park Zhengxing punched the keyboard. The next moment, he stood up and ran to the ground. Another computer continued to fight.
This is already the fifth computer that has been crashed. One-third of the computers in the office hall cannot be turned on. The section leader in charge of duty is anxiously looking at the current bad situation, because he is only an administrative officer. For these technologies are only half-understood, completely at a loss.
Seeing that Park Zhengxing's computer was also hacked, he could no longer control his emotions and shouted to the secretary behind him, "Quick! Quickly invite George here!"
George Howard, America's leading hacker expert, once successfully invaded the air defense command system, directly threatening the national security of the United States, and then deciphered the central computer password of the FBI, and even dealt with major websites, specializing in looting various programs and hackers. data.
According to the estimates of the FBI, George Howard has exceeded 600 million US dollars, which is because of this, the Bureau of Investigation strictly deployed, at the cost of two years, he was finally arrested and brought to justice, while waiting for him is as long as fifty years in prison.
However, the next cyber warrior program created by the United States rescued George, and he was absorbed into the program along with other hackers. These people worked for the National Security Agency and were the most secretive cyber force.
This time, George was dispatched to the Southern Dynasty for a recent small-scale joint military exercise. He was responsible for the monitoring and evaluation of cyber warfare between the two countries. However, as a cyber expert, he was naturally invited to the Cyber Security Division of the Intelligence Academy to guide the work. .
In the same office building, there is a high-end apartment specially applied for George. First, it is a small office in the United States, and secondly, you can enter the hall for monitoring at any time.
At this time, George Howard was wearing an apron, humming an unknown tune, and a large piece of tender steak on the pan was exuding a strong aroma.
To be honest, George is really helpless about coming to South Korea this time. As a Westerner, he really can’t see how these people eat with some pickled radish and cabbage with relish, and even has deep contempt in his heart.
Humans should eat meat. Seeing that the steak is gradually taking shape, a large amount of saliva has been secreted involuntarily in the mouth. At this moment, a rapid phone rang.
George, who wanted to wait until the delicious food was served before answering the phone, frowned tightly when the phone rang: "Hey! If you don't have anything to do, you're dead!"
"Mr. George, I'm Jin Yitai, the on-duty supervisor of the cybersecurity class. Now we are being attacked by a group of hackers. The situation is very critical. Please help!" English always expresses his meaning.
"Hacker? Oh! Wait a minute, I'll go downstairs!" If George can take his attention away from the delicious food, the only possibility is the Internet. When he hears a powerful opponent appearing, why not? Taking care of the steak, he picked up his dedicated computer and ran out.
The hard drive was overloaded, followed by a click, and then stopped. The computer screen went dark, and another computer was destroyed. This was the seventh computer.
George didn't even notice the abnormality over there, he quickly connected to the network, opened his specially made programming toolkit, and a smile appeared on the corner of his mouth: "It looks like the opponent is quite good!"
Yanjing, in the dark room, the computer screen is full of flickering fluorescence, ice's face is serious, but his eyes are very excited, he is about to get the final authority, he can get the list of potential personnel, just in At this time, they encountered a strong counterattack.
"Damn it!" Suddenly Ice jumped up in exasperation, quickly pressed the shutdown button, and unplugged all the computer's network cables, his face became ashen, and he turned to look at the man who had been standing behind him: "Boss !"
The man with the national character face didn't speak. He had been standing behind ice just now, and he knew at a glance the strength he encountered. Even if he went into battle, he might not be able to gain much benefit. Instead, the man almost touched it along the path of the broiler. Yanjing, and ice's decision to unplug the network cable is completely correct.
"Haha! I solved one!" George Howard, his sea blue eyes smiled very charmingly, although he had just touched the three broiler routes across Asia and Europe, but the other person responded in time and cut off the connection directly .
But fortunately, one has gone, and there are five other left! You can play slowly! Thinking of this, George targeted another hacker who was rushing ahead.