home

search

Chapter 39: Hello

  Chapter 39 Hello

  Sachie has been in the hacker world for many years, from an unknown small role to a well-known vampire in the hacker world. He is naturally a seasoned veteran, isn't Siemens powerful? Isn't General Electric strong? Didn't they fall into his trap? But now, when he faces this mysterious opponent, Sachie suddenly feels very insignificant.

  After being stunned for a moment, Sachi cancelled the attack on the server. Almost at the same time, the attack his own computer was receiving also disappeared without a trace. Sachi sat in his chair, thinking deeply for a long time before logging back into the server again. He did this just to see if he could get some information about this "Mirror Reflection System", nothing more.

  Just as Sachi was quietly observing the server, two other data streams also landed on the server. All three parties discovered each other's existence, but they all chose not to interfere with each other. It seems that the other two were just here to watch the excitement.

  Sachie didn't care about these two people, he just focused on staring at the server, as long as the server had any slight abnormality, he would analyze it in the first time to get the intelligence he wanted.

  After observing for a while, Sachi was disappointed to find that the server was now in autonomous operation, indicating that the other party had already abandoned control of the server, and his intention to obtain intelligence also fell through.

  Just as Sachi was about to give up, the two onlookers suddenly took off in pursuit of a stream of data. As an observer, Sachi could tell at a glance that these two were experts. Driven by curiosity, he followed them, wondering what they were after.

  Moments later, Satch discovered something that left him speechless - the two guys, along with the data stream they were tracking, had all converged on an IP address that Satch was very familiar with, as it turned out to be none other than the North American Aerospace Defense Command in the United States!

  "My god! Are these three guys crazy? How dare they do this? Do they want to trigger a global nuclear war?"

  Every skilled hacker knows that no matter how good your technique is, and no matter how powerful you are, there are some things that you just can't touch, such as the North American Aerospace Defense Command.

  This department is the most powerful strategic institution in the United States, without exception! Because it controls the nuclear secrets of the United States! What are nuclear bombs? I believe everyone on earth knows that once a mistake occurs, the consequences... just thinking about it is terrifying!

  Sachie was shocked beyond measure, and the two pursuers were equally shocked. The two people were Satan and Angel, who had agreed to observe together, but when they found a stream of data exiting from within the server, they immediately followed suit.

  Satan and the angel were unwilling to confront the US government directly, but they had no such scruples about the organization that had hacked into the server. They wanted to see what this organization was all about.

  A moment later, the two were stunned. This guy had actually invaded the North American Air Defense Command's local area network without hesitation! What was going on? Did this guy not know the consequences of doing so?

  Satan and the angel made a decision through private communication: they must stop each other's actions! Because they have realized a very serious problem - if this organization is not benevolent, what if it triggers a nuclear disaster?

  Satan and Angel are top-notch hackers, they naturally know that there are many madmen in the hacker community, these people can do whatever they want in the virtual world of the Internet! Plus, the two are Americans, seeing such a thing happen, they even more cannot stand by and watch, so the two immediately followed the data flow, also infiltrating the North American Aerospace Defense Command's local area network.

  This person being chased by Satan and the angel is naturally Feng Xiaotian. After he finished dealing with the server's affairs and confirmed that everything was correct, he retreated from inside the server. The hacker competition was still ongoing; how could he possibly stop before achieving his goal?

  As for the IP address of NORAD, it was actually the one that Feng Xiaotian found in the core folder of the server. Feng Xiaotian had no idea what this address meant, he just enjoyed the thrill of overcoming difficulties, so without any hesitation, after exiting the server, he directly infiltrated this address.

  "Hmm... there's only one supercomputer here, if there were a hundred of them like the servers, it would be quite troublesome."

  After logging in to this address for a moment, Feng Xiang Tian came to such a conclusion through his own observation, but he obviously missed one point: why is there only one supercomputer here? Did the organizers of the hacker competition just focus on the server? This is clearly illogical. Think about it, if they have the ability to provide such powerful servers, how can they be so lax in the final battlefield?

  The answer is simple because this supercomputer's name is "Fortress" and its processing speed has reached over 10 billion times per second!

  Feng Xiaotian was completely unaware of this, and after drawing his conclusions, he began his first tentative attempt. Feng Xiaotian's method was simple - he directly sent a data exchange request to the supercomputer, which was essentially an ordinary access request. However, the information Feng Xiaotian sent out was somewhat special because he typed out the English word "Hello", which even elementary school students knew meant "hello". Feng Xiaotian did this not because he was arrogant, but rather to notify the organizers of the hacker competition: pay attention, I'm here!

  Less than three seconds after Feng Xiao Tian's message was sent out, the North American Air Defense Command base suddenly sounded a loud alarm! The piercing siren was like a doomsday knell, stirring up people's hearts and making them anxious. Many people showed shocked expressions, and everyone in their hearts was thinking of the same question: What's going on? Was someone attacking their base?

  Unlike their astonishment, Feng Xiang Tian was staring intently at the computer screen in front of him. After sending a probing message, he received a response from the other party: "You do not have access permission."

  A cold, emotionless sentence, that's what Feng Xiaotian saw as the result. Facing this message, Feng Xiaotian began to think deeply. It was clear that this computer must have been set up with access request conditions, restricting all unfamiliar IDs from intervening. This made things a bit complicated. If he couldn't solve this problem, it would be impossible for him to control this computer.

  What's going on? Can't even exchange data, how can I control this computer?

  Feng Xiaotian thought for a moment, and a solution had already formed in his mind. In fact, the method was very simple: since this computer refused to intervene with all unfamiliar IDs, he would simply use an ID it was familiar with to make the application.

  Feng Xiaotian took one glance and saw that this computer was actually connected to many small computers, which together formed a local area network. What Feng Xiaotian had to do now was to capture one of the computers connected to it, and then use that computer to control the supercomputer!

Recommended Popular Novels