hacker vigilante

Chapter 14 Escape

At this point in time, Edman didn't look at his phone either. To be on the safe side, two operations are required.

Roy immediately simulated a fake virus attacking the computer to attract Edman's attention, and on the other hand directly hacked into his mobile phone and dialed the chairman's phone number.

The only thing Roy is worried about now is that if the chairman does not connect, it will be really troublesome.

Now you can still use the satellites in your home for positioning. If the satellites move away after a while, there is nothing to do.

"Answer the phone, I rely on you."

Roy stood in the corner and clenched his fists secretly. Things like fingerprints are considered simple.If it doesn't work, just stun and record a fingerprint information, but it's really troublesome without a special key.

Now Roy has no way to hack into the mobile phones of the remaining eleven people in the first place. If the chairman doesn't answer it, there is really nothing to do.

"What's the matter with this computer? Has a hacker entered? Activate the security system."

Edman looked at the computer that suddenly had a blue screen and started jumping codes, frowned and subconsciously pressed the button on the side.

Somewhere in the building, all the computing power of a group of computers was directly mobilized to check Edman's computer.

However, this actually has no effect on Roy's actions now, because the main battlefield still depends on whether the mobile phone can get through.

If you miss this opportunity, it will be very troublesome. It is not impossible to leave a backdoor program in the phone. This kind of high-ranking guy will not easily answer calls from strangers.

The mobile phones of these executives undergo a daily security check, and even implants cannot effectively control them for a long time.

"People are still too cautious now." Roy sighed inwardly.

In fact, ctos was not like this when it first came out, mainly because there were once or twice a history of big companies being ruined by hackers.

As a result, the demand for network engineers and network security personnel has increased rapidly, and the increase in demand will naturally increase the number of people who study. Although it is not saturated yet, there will also be too many people.

In addition, more low-level engineers are not useless. As long as there are high-level engineers who can clarify the direction, then low-level engineers can quickly sum up computing power to perform auxiliary calculations.

At present, the autonomy of artificial intelligence still needs to be improved, but it is impossible for artificial intelligence to replace senior engineers to find ideas.

Artificial intelligence that can break the game usually uses conventional problem-solving ideas. Once there are too many twists and turns or even logical puzzles, artificial intelligence will be difficult to parry.

Of course, the artificial intelligence of the system is excluded, but even the thinking ability of the artificial intelligence of the system is related to Roy's own hacking level.If it is too difficult, the system probably can't help it.

When the busy tone came from the phone, Roy knew it was over.

Moreover, it is impossible to directly place the backdoor program, because the mobile phone security system is greater than Roy's own hacking level.

At this time, Roy suddenly understood that in fact, the phone did not control him from the beginning, but was misjudged by the operation in the opponent's security system.

The purpose is to determine your own network address for counterattack.

"Damn it! Careless!"

Roy has always believed that the system's hacking ability is omnipotent, and even if it cannot be broken through for a while, it will not be played by others.Coupled with his abnormal equipment such as nano-armor, Roy actually didn't focus too much on the subtle operations of his actions. At the same time, Roy's own sense of crisis also declined.

There are indeed life-threatening crisis judgments, but it is hard to think of such a trap.The main reason for this is that things have gone too smoothly recently.

"The anti-tracking progress is 60.00% eight, please leave the area as soon as the host. The estimated time to be breached is 47 seconds!"

Roy didn't care about the situation anymore, the ability of optical mimicry invisibility can still be used.

This ability cannot be exposed, even if it is locked by the opponent.

Roy quickly stepped into the toilet, hid in the private room and immediately released the stealth mode.The technology involved in optical mimicry stealth is really too big. This is something only owned by top technology companies. Once exposed, it is likely to cause a series of problems.

Although Roy also has contacts with people from the Ministry of Science and Technology and has visited some high-tech laboratories, the answer to who can equip the unknown armor is almost ready, so his identity exposure is almost a certainty.

"It's a pity that the people who study this technology are all well-known. In this case, it is very difficult for me to upgrade secretly. If you want to innovate, you still have to look at the blueprint of the system."

As for how the previous data came from, it was still obtained by Roy's fake visit to steal the data.

Maybe the top son is interested in the visit, and a large sum of money is thrown into it.Those doctors may not like it, but the assistants and other research institute personnel are very interested, not to mention such a dark thing as making a fortune.

It is also very useful to actually get such a sum of research and development funds.

After Roy kicked the door open, he jumped out of the window.

Ten seconds have passed since such a series of operations.

But Roy didn't care. He really found out that it was impossible to catch up with him.

His chariot is already on the way.

Roy turned over, and the nano armor switched to the powerful mode. At the same time, a sharp blade appeared on the arm armor and stabbed fiercely into the wall.

The impact of going down is very strong, and the small propeller behind Roy is also outputting continuously.

Falling from such a high place, at a height of nearly 50 meters, you said that it is definitely impossible to rely solely on nano-armor, and it is definitely impossible not to do such an operation to reduce the impact force.

The jetpack hasn't been finished yet, and the current technology is not very mature, but the small impact-reducing thrusters are still OK.

The nano armor protects Roy from the oncoming cold wind, and the hacker's vision keeps turning on to record the situation at this moment.

Whether it is the speed of descent or wind speed, the outside temperature, the degree of wear of the blade, and the thickness of the wall material are all quickly fed back to Roy so that Roy can make a better judgment.

"It should be fine."

Roy thought to himself, the hook shot out and fixed on the sixth floor.

After a few seconds, Roy landed smoothly.

After putting away the hook gun, Roy turned and looked at the two security guards who were pointing their guns at him.

Shaking his head, he said helplessly.

"You two don't really think that you two can keep me?"

(To be continued...)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like