Chapter 234 : Take a peek at the top secret plan!

Chu Hao does control the supercomputer Yan, but Chu Hao can only borrow part of the supercomputer’s performance. After all, the system of the supercomputer Yan undertakes various large-scale tasks. If Chu Hao does not impose restrictions and messes with the supercomputer Yan, he will surely be discovered by the security personnel of the supercomputer Yan.

For this reason, Chu Hao didn’t dare to fight with the supercomputer of JFS, so he could only think of other ways.

Looking at the SO plan, Chu Hao cautiously inquired about the user status of the confidential information server authority group.

From the authority group of the confidential information server, Chu Hao found that there were only three users who had authority to mobilize the SO plan.





After finding these three usernames, Chu Hao investigated the network security department and everyone’s account information in the JFS internal network.

To investigate their account information, the best way is to hack into the other party’s computer and find relevant information in the other party’s computer.

If you want to invade the computer of a JFS security expert from an external network, although it can be done, it is quite difficult to not be discovered by them.

It’s just that Chu Hao is now on the JFS internal network. It is not that difficult to access the computers of those security experts from the internal network, and it is not easy to be found.

Controlling the supercomputer Yan, in the internal network, find the connection information of the security experts. After entering the computers of the security experts, first retrieve the names of their computers.

Many people like to change the computer to their own username. Sure enough, in the computer name of the Network Security Department, Chu Hao found a user name that was the same as the confidential information server authority group.

Chu Hao carefully checked the computer, and successfully extracted the computer login password from the computer’s configuration file record.

With this password, Chu Hao now needs to take a gamble!

The password of this user name can be used in the confidential information server as well. If the password is universal, Chu Hao can naturally enter the confidential information server and take the S0 plan smoothly.

If the password is not universal, if calculated according to the security level of JFS, it should cause an alert to the confidential information server. So the action of stealing SO plan failed, Chu Hao still oiled the soles of his feet, hurry up!

Such gambling behavior is generally unwilling to Chu Hao. But if you don’t take a gamble, you have to face the supercomputer of JFS. Chu Hao is not sure to kill the supercomputer in a short time and without attracting attention.

For today’s plan, only let it go!

Success or failure in one fell swoop.

In the JFS internal network, Chu Hao once again came to the confidential information server. This time, Chu Hao did not use the JFS internal network again, and entered with the universal authentication identity, but entered the account and password just obtained.

Hovering the mouse over the confirm login button, Chu Hao did not click it for a long time.

‘Damn JFS, do all these embarrassing settings. Hey, die, die, success or failure is in one fell swoop!’ Chu Hao gritted his teeth and pressed the confirmation button (Node’s).

Chu Hao vigilantly monitors the data exchange of the confidential information server to prevent it from raising an alarm suddenly, which he does not know. However, everything seems to be developing in a good direction. With the account and password just obtained, he successfully logged in to the confidential information server, and Chu Hao gained the authority!

After obtaining the permission, Chu Hao immediately began to copy the SO plan!

The volume of the SO plan is more than 500MB, which is almost 0.5GB.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like