Chapter 779 : Unexpectedly powerful!

The strength of Dream Entertainment is unexpectedly powerful. I originally thought there was only one Mr. M. But this time Mr. M did not appear, but it led to a more fierce existence. Neither the Sakura group nor the Hokkaido kelp could bear such a big responsibility. So put the blame on the SG of the Southern Dynasty.

Although he dreams of being a master of entertainment, he clearly knows all the facts. But the Wassan country side. SG, the second-generation hacker organization that blamed the Southern Dynasties, didn’t want to confuse masters who dreamed of entertainment, nor did they think of being able to confuse it.

The reason for this is to put the responsibility of invading dream entertainment on the bright side and let the media know. Let everyone know.

Once everyone knows that it is the second-generation hacker organization SG in the Southern Dynasty that invaded Dream Entertainment, the responsibility naturally falls on SG.

The three of them became tigers. Very simple truth!

When the responsibility of invading Dream Entertainment clearly fell on SG, the “master of Dream Entertainment”, who wanted to find face, naturally looked for SG’s troubles instead of focusing on Sakura Group and Hokkaido Kelp.

Wasang Country, East Capital, East University of Technology.



As the owner of the supercomputer Yan, Eastern Institute of Technology received an anonymous report stating that the supercomputer Yan had fallen into the hands of hackers.

The security guards of the supercomputer Yan immediately launched a system-wide investigation. When they discovered that the authority system of the supercomputer Yan had been modified as a whole, they finally realized the seriousness of the matter.

Then, when a large number of security experts jointly discussed how the supercomputer should be handled, it became difficult.

According to ordinary processing methods, the physical connection between the supercomputer and the Internet should be cut off at this moment. Before the earth simulator, the physical connection was directly disconnected.

To deal with hacking, disconnecting the physical connection is a very effective way!

No matter how great a hacker is, it is impossible to intrude into a computer without a network connection.After all, hackers are just hackers, not gods!

But using disconnected physical connections to deal with hackers is not without weaknesses. Disconnecting the physical connection, as an effective way, is a very effective way for hackers who have not successfully invaded.

If the hacker has successfully invaded, the computer has important information, and how long the hacker has mastered the computer, then disconnecting the physical connection is definitely a foolish move.

Because no one knows whether the hacker has planted a network virus Trojan in the computer. Once the physical connection with the Internet is cut off, causing the Trojan horse to be unable to connect to the Internet, which in turn stimulates the Trojan horse and causes great damage to the computer, who is responsible?

The data in the supercomputer Yan is quite precious, and there is absolutely no possibility of accidents!

Tohoku Technology University, the supercomputer project team leader, named Fujita Yoshiho, a man in his fifties, standing in the computer room of the supercomputer Yan, looking at the supercomputer Yan (the promised), his expression is very gloomy.

“~Tell me, supercomputer Yan, is it really controlled by someone w.?” Fujita Yoshimine roared.

All the security experts bowed their heads in a solemn way and did not respond.

“Huh! A bunch of waste! A bunch of rice buckets! Cut off the power to me, cut off the power supply of the supercomputer Yan directly, and then take out the hard disks of the disk array cabinet one by one for virus detection, and then take out the data!”.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like