Chapter 45: Even being cut off from the internet can't stop my invasion!
Complaints aside, Professor Vincent still gave his solution. He said into the receiver, "Old friend, your best course of action right now is to cut off the connection between the local area network and the Internet. Otherwise, even if you ultimately defeat those hackers, the losses you will suffer will be extremely huge."
This approach James had not considered, but if the connection to the Internet was cut off, it would mean that NORAD became an independent system without presidential or congressional authorization, which would be tantamount to treason. Moreover, doing so would also allow the hacker trapped by the "honey pot" system to escape, how could James bear to do this?
James expressed his thoughts, and Professor Vincent sighed after listening: "Old friend, the problem now is not treason or whether we can catch the hacker. If your local area network is thoroughly destroyed by hackers, our country will face a direct nuclear threat. Compared to this, do you think there's anything more important? Besides, you're ensuring the highest security of the nation, who would have any objections?"
James thought for a long time before gritting his teeth and saying, "Alright! I'll listen to you, let's cut off the network connection!"
"James hung up the phone and instructed his subordinates: 'Disconnect our network connection.'"
His subordinates were taken aback upon hearing this and then asked: "Boss, isn't this illegal? We haven't received any authorization..."
"James cut him off, bellowing: 'What else can we do? Just sit back and watch these hackers run amok? - Go! I'll take full responsibility for anything that happens!'"
The staff nodded and left, at this moment, everyone in the security center stopped their work, looking at James with a face full of loss. Everyone felt guilty for not defeating the hacker, James took all the responsibility, actually also to relieve them. Everyone's heart was filled with mixed emotions, and they all fell silent for a while.
One minute later, the network connection was cut off, and all hackers who had invaded the local area network were kicked out. James turned to his subordinates and said, "Everyone go help the monitoring center people repair the computer now, I'll be right back."
James finished speaking and walked out of the room, trudging heavily towards General Lech's office, where an unknown fate awaited him.
At the same time, Feng Xiaotian was staring blankly at the computer screen. Originally, he had been lurking in the local area network watching the intense battle between the two sides, but suddenly he was kicked out of the network. The message displayed on the computer was: Your login address has been disconnected from the network connection.
Feng Xiao Tian sat for a while, then whispered: "This... why did the organizer do this? Is the hacking competition still going on? I haven't succeeded yet!"
Feng Xiao Tian immediately became displeased, in his view, the organizer's actions were clearly evasive! Isn't this a breach of trust? When hosting the hacker competition, wasn't it said that first you break through the server, and then break through the computer behind the server? What's going on with this half-hearted approach now?
Feng Xiang Tian is not a person who gives up easily, he thought this was the organizer's test for hackers, so he immediately made a decision: No! I absolutely cannot give up! You think cutting off the network connection will make everything okay? Get out of here! I'll let you know what it means to truly "penetrate every hole"!
Unlike the second rod of Laughing Heaven, Angel is now greatly relieved. Since discovering that NORAD had cut off her network connection, she immediately set to work on damage control, busily clearing up her digital trail for several minutes before sitting down in her chair to collect her thoughts. The experience was like a rollercoaster ride - she hadn't expected to be tricked by the black hat hacker into "Fortress" computer system!
Well... it seems like hackers aren't exactly upright and honest people, so what he's doing isn't entirely unjustifiable either?
For a moment, the angel was very confused. After being stunned for a while, she contacted Satan through the internet. The two compared notes on what had happened and found that they had both lost out in this matter. From now on, they would be sworn enemies with Wind Laughing Heaven, and if they ever met again, it would likely be a fierce battle of hackers.
Unlike them, Sachi in Lyon, France was shocked! He saw the whole thing with his own eyes, he didn't think these people were so fierce, they actually forced NORAD to cut off their network connection! After being shocked, Sachi started thinking, after a while, he made up his mind: he must improve his hacking skills, any one of these three people was someone he couldn't defeat. Sachi smiled and opened a document, he wanted to start learning from the most basic computer programming, constantly supplementing and strengthening his foundation knowledge. At this moment, there was a sentence in his heart: You all wait, I, the vampire, will surpass you one day!
At this moment, Feng Xiaotian was busy, he was trying to find a way to infiltrate the North American Air Defense Command's local area network again, which seemed like an impossible task, but in Feng Xiaotian's view, it wasn't necessarily so!
What method did Feng Xiaotian come up with? That is to invade this LAN through a network signal connection device!
There are two ways to disconnect from the internet. One is to set up a program on your computer to cut off the connection, and the other is to unplug the network port to cut off the connection.
If it's the second method, Feng Xiaotian won't be able to succeed. The reason is very simple: others are not connected to network devices, how can you enter their computer?
So Feng Xiao Tian just wanted to try it out, what if the other party was setting up a disconnection message through the computer's own program? Wouldn't his chance have arrived then?
Feng Xiaotian first invaded the database of AT&T, the largest network service provider in the United States. After invading the company's database, Feng Xiaotian searched for more than ten minutes and finally found a encrypted folder containing the network signal connection device serving NORAD.
Feng Xiang Tian accessed the device's backend through a network channel and easily found data residue in the background. Through data analysis, he discovered a result that made him laugh: the other party had not pulled out the network cable, but instead cut off the network connection by setting up a computer program, which allowed him to invade!