Since I Was a Special Soldier

Chapter 517: It's all effortless

"But I actually received anti-tracking today, and I'm investigating..." Jiang Yanhai quickly said this to Academician Bai, while quickly operating on his keyboard with both hands.

He had directly retrieved the newly copied file today. After the file was opened and the contents of the file were determined, Jiang Yanhai couldn't help but explode.

"What's the matter?" Academician Bai couldn't help asking.

"It's okay. I got a copy of the information. I will copy it for you now. Could you please find a relevant expert to help me confirm it." Jiang Yanhai didn't read it in detail. He didn't have time. Instead, he copied all the files and sent them to Academician Bai. .

And he immediately started to switch modes.

Jiang Yanhai's hands switched frantically on the keyboard, and at the same time he directly turned on the maximum function of the firewall instantly. The data stream directly borrowed the broiler occupied by the previous file-picking program, and arrived in Europe in an instant, bypassing Europe. A few laps later, Jiang Yanhai directly borrowed a springboard from Canada and arrived in the United States.

This is his largest broiler in the United States. It is used as a relay. This is a server of a public library in the United States, not to mention a supercomputer.

After entering this server, Jiang Yanhai directly copied his firewall in, and then immediately turned on the firewall's scanning mode. In an instant, a dozen warning entries popped up on his screen.

Jiang Yanhai did not use the electronic warfare program. In other words, this is just a good opportunity to learn about hackers in the world.

The person who counter-tracked his program is definitely a master. In just a few tens of seconds, Jiang Yanhai confirmed that the opponent's attack is very organized. When Jiang Yanhai entered this server, the other party had already borrowed three low-level communication ports to establish a preliminary level. Permissions.

Attempting to seize the system's advanced privileges.

Jiang Yanhai glanced at the scan results of the firewall at the moment, borrowing the super computing power behind him, the scan speed of the protection wall is extremely fast, and three vulnerabilities have been scanned, and he directly began to patch these vulnerabilities.

In addition, as for the primary permission that the other party has just obtained, sorry, brother, you can go out now.

After activating the super authority he had already hidden, Jiang Yanhai did not hide his whereabouts. After hitting the Enter key, all the people who logged in to the American Public Library server were kicked out instantly.

The system has refused to open to them.

The librarian who was operating saw that he was ejected directly from the system, and he was taken aback for a while. But before he could do anything, his computer went into a screened state in an instant, and a Donald Duck jumped out of the screen.

How cheap it looks like.

Then no matter how he moved the mouse and keyboard, it didn't work.

As a qualified librarian, hehe, knowledge is a must, so he immediately knew that this was the library server was hacked, and he called the maintenance department directly.

The server of this public library is based on ibm, and the system is unix. New vulnerabilities are still being discovered. Jiang Yanhai's hands quickly tap on the keyboard to fix the patches for these vulnerabilities one by one.

His firewall will only use the protection function, and other capabilities will not move. Borrowing the server's own firewall, Jiang Yanhai is constantly checking for deficiencies at this moment. He has made a decision to look at the strength of the other hackers on this server. .

The enemy who had been kicked out at this moment was no longer a threat, but at this moment, Jiang Yanhai suddenly discovered that there were a few more data streams outside the firewall, and these data streams obviously came from other places.

The other party still has companions.

Jiang Yanhai immediately determined that although hackers act alone most of the time, hackers also have their own circle. What's more, it is not certain whether these people are hackers or not. Maybe they are from government departments.

Because of the document just now, he just glanced around for a few times, and he was sure that it was actually the detailed design data and parameters of an engine, including many design drawings and so on.

He only took a few glances at the required data, which obviously exceeded all the aircraft engines on the market, and after conversion, he found that this engine can break through the thermal barrier compared to the one installed on the unmanned stealth fighter. The extreme speed engines of the Vertex Mach 3 are awesome!

For any engine, awesome thrust is not the point. So how can a rocket engine send hundreds of tons of objects into space? The question is, is it different?

A stable and long-term aircraft engine is a strategic level thing in every country. No, how could this thing be retrieved by the program that retrieved the data by yourself? How careless is this?

But since the stuff came back, why did I ask so much?

At this moment, in the United States, in a secret chat room.

"Sol, if you don't do anything now, fuck, I will take someone to copy your house tomorrow!" In the chat room, a grumpy old man with an id named xman posted a message directly in the chat room Long string in English.

"Xd, xd, xd, if it's not an x ​​guy, you guys can laugh to death, do I know? A **** program that extracts public information can actually steal your confidential information and laugh me to death." The id Sol's man even has I laughed a lot and made a long list of various expressions.

"Don't talk nonsense, Sol are you not doing anything? I have called a few brothers over to help." X man's face is ugly, fucking, you think I want to, who knows that SB is holding the file? It’s not crazy~www.wuxiaspot.com~ It’s fine to go to university to give lectures. Why does he bring his confidential notebook to go?

And is it connected to the public network? ! Do you want to read information in your free time? Look at your sister! The X man was dissing crazy in his heart, but now he didn't say anything, it was too late to say anything, and they came to clean up his ass.

Of course, they are not together now, but in different places, but for hackers, it doesn't matter.

"Shoot, shot, do you know who it is? Which country? Finland? Britain? Russia? Or India?" Sol asked directly.

"Sol, did you not vent completely on your girlfriend last night, and your brain was filled with jing (^-^)v?! Fuck, when you go out to hack others, will you protect yourself?! "

"X man, if you dare to humiliate Lao Tzu again, Lao Tzu will blow your chrysanthemum with Lao Tzu's 20cm long mink, believe it or not?! Shut up! Lao Tzu is here, I mean, do you see from his defensive style? Who is it coming out? Now there are so few hackers, who else can there be?"

"I don't know, I can't tell, the other party kicked us out almost instantly."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like