Recreating Cybertron in the Marvel Universe
Chapter 61 Hackers
Green monster?Military laboratory?
Bennett couldn't help but become interested and hurriedly entered on the computer:
Beret: Really?
The netizen named Little Boy did not answer, but directly uploaded a video.
The video is very short, only about six seconds, but in the video, a green humanoid monster can be vaguely spotted.
The monster roared around, and the soldiers nearby used rifles to suppress fire on him. However, the bullets that hit him were all bounced off by his green skin. Then, the green monster just waved his hand, and several The soldiers were knocked away by him.
At the end of the video, the green monster seemed to have discovered the person taking the photo, and rushed over with an angry roar. Then, the video went dark...
Bennett and others were silent. Although the little boy often spread false news in the chat room that could not withstand scrutiny, this time, it seemed to be true.
Shadow: Where did this video come from?
Little boy: Sorry, someone else sent me this message, so I don’t know where it came from.
Shadow was usually taciturn in the chat room, but this time he was obviously interested. After being silent for a while, he suddenly said: Let's visit the Culver University database!
Shadow is considered the founder of their small chat room. As long as he speaks, others usually won't object. And what he calls 'access' is naturally the hackers' own way.
Big A, who was afraid that the world would be peaceful, was the first to agree, and Bennett thought about it carefully and agreed. He was really curious about all this. Although their website was full of experts, their opponent was SHIELD after all, so Although the ideals are full up to now, there is no record of success at all. Some of the news found are basically rumors. This is the first time that there is video evidence.
The four people made up their minds, and soon they worked together to break into the internal network of Culver University. They thought that since Culver University could have a military laboratory, it would be strong, but they did not expect the process of their invasion. But it was unexpectedly smooth.
When the little boy found the relevant folder and clicked it without thinking, the leader's shadow suddenly felt an ominous omen in his heart, and he hurriedly entered on the computer: Wait...
Unfortunately, it was too late. The little boy had already opened the file. It was like opening Pandora's box. Massive viruses suddenly spewed out from the file and paralyzed their system in an instant. All disguises and protections were lost. Invalid, this is simply a trap prepared by others in advance.
Before Shadow even had time to send out the message, the computer had already lost control. The only one among the four who was not hit was Bennett.
But why didn't he get hit?
In fact, Bennett was also unclear. He didn't even feel that this was a trap. When he found that the three shadows were all silent, he still had time to ask in the chat room:
Beret: Is everyone here?
Beret: What's wrong?Why is no one talking?
Berets:? ? ?
No one answered. Bennett didn't know that he had become the only survivor in the chat room. However, if he could lower his head and look behind the main box of his computer, he would find a small mobile phone. is being connected to the computer's interface.
Ronan didn't know that the computer he accidentally selected was Bennett's special computer. Not only the hardware, but also the software and firewall had been upgraded privately by him.
The smart guy connected to the computer also doesn't know, because to it, the difference between this computer and other computers is not that big. Anyway, they are all types that can be easily cracked...
Smart Ghost is very obedient. If Ronan doesn't ask it to do something, it will generally not take the initiative to do it, but this does not mean that it is not curious.
When a group of 'miscellaneous' viruses entered this computer, because they might hinder their work, the clever man was distracted and dealt with it.
Then, it discovered the source of these viruses. Out of curiosity, the smart ghost separated a glimmer of consciousness and entered the enemy's computer.
Sitting quietly in the command and control center of the Pentagon, John took a sip of coffee out of boredom. He was also a hacker, but unlike ordinary hackers, he worked for the government.
High salary, generous benefits, all kinds of state-of-the-art electronic equipment, and more importantly, he no longer has to be as secretive as before. John simply loves this life to death.
Because a video was leaked recently, the military's cooperative laboratory was attacked by many people, and the task of him and his colleagues was to catch these colleagues.
Just as he put down the coffee cup, a prompt popped up on the computer, and another group of fools took the bait.
Being well prepared, John laughed and watched these fools fall into the trap. Although one guy was still resisting, it didn't matter. He would soon fall into the same trap as the others. fate.
He moved the mouse and was about to get rid of this guy, but suddenly found that his computer became a little unruly...
--what happened?
Before he had time to react, the data on the computer suddenly started to beat crazily. Then, the other party seemed to be tired of playing and gave up on checking his data. Instead, he used the computer as a springboard to attack his internal network.
But how is this possible!
Where he is now, the Pentagon is the most secure network in the entire United States. How did the other party get in!
"Someone invaded!"
Before he had time to think, John shouted loudly. As the headquarters of the U.S. Department of Defense, this place not only controls the entire U.S. military power, but it is also said to even contain the password for nuclear bombs. Once it is breached by the other side, the consequences will be disastrous.
A colleague quickly cut off his power supply and looked at the screen that was gradually extinguishing. Just when John breathed a sigh of relief, thinking that the matter was finally over, the computer screen next to him suddenly jumped slightly...
And this is just the beginning, just like a viral infection, one, two, three... When the big screen in the center of the command room started to jump, John slumped in his chair helplessly, - he was finished!
Who is the other party?Russia?China?Or North Korea...
All the data of the U.S. military is constantly being reviewed. Just when the opponent breaks through the layers of protection that should be impossible to break through, and gradually approaches the set of numbers that absolutely cannot be consulted, unexpectedly Yes, the other party suddenly stopped all intrusions. Just like the ebb of the sea, all traces began to disappear, and the data on the computer began to quickly return to normal.
but why?
No one can stop him. Stealing the password for nuclear weapons is the ultimate dream of all hackers, but the other party suddenly withdraws when he is about to succeed.
It was like a loud slap, hitting John and his colleagues hard on the face, but no one felt humiliated, and only huge joy filled their hearts...
Bennett couldn't help but become interested and hurriedly entered on the computer:
Beret: Really?
The netizen named Little Boy did not answer, but directly uploaded a video.
The video is very short, only about six seconds, but in the video, a green humanoid monster can be vaguely spotted.
The monster roared around, and the soldiers nearby used rifles to suppress fire on him. However, the bullets that hit him were all bounced off by his green skin. Then, the green monster just waved his hand, and several The soldiers were knocked away by him.
At the end of the video, the green monster seemed to have discovered the person taking the photo, and rushed over with an angry roar. Then, the video went dark...
Bennett and others were silent. Although the little boy often spread false news in the chat room that could not withstand scrutiny, this time, it seemed to be true.
Shadow: Where did this video come from?
Little boy: Sorry, someone else sent me this message, so I don’t know where it came from.
Shadow was usually taciturn in the chat room, but this time he was obviously interested. After being silent for a while, he suddenly said: Let's visit the Culver University database!
Shadow is considered the founder of their small chat room. As long as he speaks, others usually won't object. And what he calls 'access' is naturally the hackers' own way.
Big A, who was afraid that the world would be peaceful, was the first to agree, and Bennett thought about it carefully and agreed. He was really curious about all this. Although their website was full of experts, their opponent was SHIELD after all, so Although the ideals are full up to now, there is no record of success at all. Some of the news found are basically rumors. This is the first time that there is video evidence.
The four people made up their minds, and soon they worked together to break into the internal network of Culver University. They thought that since Culver University could have a military laboratory, it would be strong, but they did not expect the process of their invasion. But it was unexpectedly smooth.
When the little boy found the relevant folder and clicked it without thinking, the leader's shadow suddenly felt an ominous omen in his heart, and he hurriedly entered on the computer: Wait...
Unfortunately, it was too late. The little boy had already opened the file. It was like opening Pandora's box. Massive viruses suddenly spewed out from the file and paralyzed their system in an instant. All disguises and protections were lost. Invalid, this is simply a trap prepared by others in advance.
Before Shadow even had time to send out the message, the computer had already lost control. The only one among the four who was not hit was Bennett.
But why didn't he get hit?
In fact, Bennett was also unclear. He didn't even feel that this was a trap. When he found that the three shadows were all silent, he still had time to ask in the chat room:
Beret: Is everyone here?
Beret: What's wrong?Why is no one talking?
Berets:? ? ?
No one answered. Bennett didn't know that he had become the only survivor in the chat room. However, if he could lower his head and look behind the main box of his computer, he would find a small mobile phone. is being connected to the computer's interface.
Ronan didn't know that the computer he accidentally selected was Bennett's special computer. Not only the hardware, but also the software and firewall had been upgraded privately by him.
The smart guy connected to the computer also doesn't know, because to it, the difference between this computer and other computers is not that big. Anyway, they are all types that can be easily cracked...
Smart Ghost is very obedient. If Ronan doesn't ask it to do something, it will generally not take the initiative to do it, but this does not mean that it is not curious.
When a group of 'miscellaneous' viruses entered this computer, because they might hinder their work, the clever man was distracted and dealt with it.
Then, it discovered the source of these viruses. Out of curiosity, the smart ghost separated a glimmer of consciousness and entered the enemy's computer.
Sitting quietly in the command and control center of the Pentagon, John took a sip of coffee out of boredom. He was also a hacker, but unlike ordinary hackers, he worked for the government.
High salary, generous benefits, all kinds of state-of-the-art electronic equipment, and more importantly, he no longer has to be as secretive as before. John simply loves this life to death.
Because a video was leaked recently, the military's cooperative laboratory was attacked by many people, and the task of him and his colleagues was to catch these colleagues.
Just as he put down the coffee cup, a prompt popped up on the computer, and another group of fools took the bait.
Being well prepared, John laughed and watched these fools fall into the trap. Although one guy was still resisting, it didn't matter. He would soon fall into the same trap as the others. fate.
He moved the mouse and was about to get rid of this guy, but suddenly found that his computer became a little unruly...
--what happened?
Before he had time to react, the data on the computer suddenly started to beat crazily. Then, the other party seemed to be tired of playing and gave up on checking his data. Instead, he used the computer as a springboard to attack his internal network.
But how is this possible!
Where he is now, the Pentagon is the most secure network in the entire United States. How did the other party get in!
"Someone invaded!"
Before he had time to think, John shouted loudly. As the headquarters of the U.S. Department of Defense, this place not only controls the entire U.S. military power, but it is also said to even contain the password for nuclear bombs. Once it is breached by the other side, the consequences will be disastrous.
A colleague quickly cut off his power supply and looked at the screen that was gradually extinguishing. Just when John breathed a sigh of relief, thinking that the matter was finally over, the computer screen next to him suddenly jumped slightly...
And this is just the beginning, just like a viral infection, one, two, three... When the big screen in the center of the command room started to jump, John slumped in his chair helplessly, - he was finished!
Who is the other party?Russia?China?Or North Korea...
All the data of the U.S. military is constantly being reviewed. Just when the opponent breaks through the layers of protection that should be impossible to break through, and gradually approaches the set of numbers that absolutely cannot be consulted, unexpectedly Yes, the other party suddenly stopped all intrusions. Just like the ebb of the sea, all traces began to disappear, and the data on the computer began to quickly return to normal.
but why?
No one can stop him. Stealing the password for nuclear weapons is the ultimate dream of all hackers, but the other party suddenly withdraws when he is about to succeed.
It was like a loud slap, hitting John and his colleagues hard on the face, but no one felt humiliated, and only huge joy filled their hearts...
You'll Also Like
-
Devil Fruit Era: I have maxed out my Armament Haki Ryusakura
Chapter 185 2 hours ago -
You were asked to be a conscript, but you created The Matrix
Chapter 158 2 hours ago -
Gao Wu: I am invincible now that I have connected to the Immortal Gate.
Chapter 266 2 hours ago -
Battle of the Other Worlds: Summon the Traveler Wu Song at the Beginning
Chapter 200 2 hours ago -
Martial Arts: I am in the Valley of Unrequited Love, I am invincible by touching corpses
Chapter 122 2 hours ago -
The Great Lord of the World
Chapter 302 2 hours ago -
Review of tomb raiding: The top ten treasures shocked Lao Hu
Chapter 213 4 hours ago -
Hong Kong Movie: I am a police hero with a supernatural power
Chapter 201 5 hours ago -
Watching Ke Xue’s video, it was revealed that Shinichi cannot take the civil service exam?
Chapter 335 5 hours ago -
Entertainment: Is anatomy more professional than forensic medicine? Check it out
Chapter 247 5 hours ago