Reborn Hacker

Chapter 50

The official website with the code name γ still has a very high level of authentication. Of course, a fingerprint verification system like the FBI is still impossible.

As usual, He Ran directly bypassed the authority authentication and directly seized the highest authority.At that time, there were no administrators operating in the backstage, so He Ran was free to wander around in their backstage at this time.

"Well, seize the highest authority on the official website of XX enterprise?"

"Huh? Steal the latest drug formula from XX Pharmaceuticals, and conduct a thorough data cleanup."

"Uh, this is..."

He Ran saw the transaction records in the background, usually some company representatives contacted the code γ, of course, occasionally a certain government official asked the code γ to attack political opponents and the like.It's ridiculous that there are many political enemies who have invited people with the code name γ to attack each other. Of course, they don't know it.What caught He Ran's attention was a rare transaction between a government agency and the code name γ.The content of the transaction is the theft of various execution orders and some data from the city halls of country Z. Some first-tier cities such as SH City and BJ City are the top priority of the transaction.

"The situation is a bit troublesome. It seems that this matter is not a matter of ordinary civil organizations." He Ran called Qi Zhanhang to come over and take a look, "Look at this transaction information."

Although Qi Zhanhang’s father, Qi Changhe, is the finance minister of the city hall, most of the time he would not talk to Qi Zhanhang about the city hall. Qi Zhanhang knew that the leak of the city hall information happened by chance when Qi Changhe was chatting with Chen Hong. heard.Therefore, after seeing this transaction information, Qi Zhanhang was a little confused. Why did the government agency of country M need to hire a hacker organization in the network code-named γ to do this kind of work for him.

"In my opinion, it should be that the central government has issued instructions to governments at all levels to implement, and these instructions should be able to affect a certain status of country M to some extent." He Ran analyzed, "But such an impact It is limited, so the government of country M does not use the highest authority, but finds some civil organizations to test gold. As far as the website defense measures of the group of people code-named γ are concerned, it should still be very good, if it is not for me to bypass it directly In terms of permissions, when attacked by hackers in the current sense, the data in the background will be automatically destroyed. That is to say, even if something happens to the codename γ, it has nothing to do with those who have made transactions.”

"In other words, this organization is a group whose interests are paramount." Qi Zhanhang concluded.

"..." He Ran has also been baptized in various ways to a certain extent, so he will not comment on this.

"What do you want to do next?" Qi Zhanhang asked.

"I should be asking you this question. For me now, I'm just someone you 'hired' to help." He Ran replied.

"I mean to inform the city hall and continue to report to the higher authorities." Qi Zhanhang changed the subject, "But I know you won't do this, and it's impossible to do it without exposing yourself."

He Ran frowned when he heard the first half of the sentence, and relaxed after hearing the second half.

"Actually, we don't need to tell them." He Ran said with a smile at this time, "If I'm not mistaken, big cities such as BJ and TJ should have already discovered the data leak. There is no response at all, such a large-scale data leakage incident cannot be suppressed like that. Therefore, the government computer talents of country Z should start to investigate in a short time. The power of a country's government is always something you cannot foresee of."

"That's right, this matter is no longer just a matter of SH City Hall."

"Then you don't have to worry too much about the codename γ. Anyway, I had the idea of ​​letting you practice your skills at the beginning. Now that there is no extra pressure, let's have fun with them."

"Alright, I still have two guys with very good skills left, who are just suitable to be my training partners at this stage."

Sitting back in his seat, at this moment, γ2 has already begun to believe that the transcendent has left his computer.He did not unplug the network cable when he invaded because of self-esteem. At this time, He Ran was not there (in his opinion), so he unplugged the network cable, left the villa where he is now, and rushed to another villa to use another IP. The address is linked to γ1.

γ2: Head, are you there?

γ1: What's your business?

He Ran was depressed at this time, why did that guy at γ2 disconnect from the Internet just because he ignored him for a few minutes.You know, when chatting online, it's common to walk away to go to the toilet, drink water, or eat something. This guy really doesn't understand the true meaning of chatting online. (Of course, ICQ did not even appear in this era, and there was no so-called online chat at all. ICQ: November 1996)

γ2: Head, the Transcendence hacked my computer.But that computer only has the data of the last two days, so it shouldn't be a big problem.

γ1: Who is the Transcendence?

γ2: It is the protagonist of the mass defeat of Monsters that has been rumored in the hacker world recently.

γ1: Huh, the annihilation of such a small organization like Monster is not surprising.What, are you afraid of that so-called transcendent?

γ2: Head, that transcendent is not in vain.It was only 2 minutes from when I found out about his invasion to when he finished the invasion...

This data made γ1 have to re-examine this recent figure in the hacker world.At first I thought he was just a software guy with some skills and luck, but I didn't expect Hei to be really capable.Although Monster also has two top-level hackers, there is still a big gap in scale from organizations with the code name γ. γ1 has always believed that hacker organizations without more than five top hackers are just small-scale hackers, but as code-named γ's second-in-command also affirmed the ability of the transcendent, so this person had to attract enough attention.

γ1: Why would he hack into your computer?

γ2: This is also where I find it strange. I don’t know who provoked the transcendent.

γ1: How do you judge that the other party is a transcendent?

γ2: I had a direct conversation with him, on my computer.He had already successfully invaded at that time, but he was also discovered by me. If he wants to continue invading, he needs to pay a little price (He Ran is unnecessary). After that, he lurked for a while (He Ran was chatting at the time), and finally I confirmed him After I left, I disconnected from the Internet and contacted you elsewhere.

γ1: What about the conversation?

γ2: He said he was a transcendent from country Z, hired by some people to deal with us.

γ1: No, there is something strange about this.Someone recently received an order about country Z?

γ2: ..., head, it was you who took the order. The government of country M placed the order directly. At that time, you meant it as a favor.

γ1 squinted at the screen at this time: I thought the list against country Z was just a trivial matter, but I didn't expect that there are such talents in country Z. Some politicians in the government of country M really think well .

Thinking of this, γ1 suddenly received information from some people in the organization who should have been in contact with the country Z list, most of them said that they had been invaded.However, one of the pieces of information was that three core and fringe members of the organization were captured by the FBI, which made γ1 furious.

γ1: Favor? ?No no, now we can't give this favor away for free, tell those fat-brained things, we ask for double rewards.At the same time, they are asked to bring back the three guys caught by the FBI, otherwise they will directly send the transaction information to Transcendence as a favor.

γ2: Head, this is against the rules.Remuneration has always been agreed in advance, but on the FBI side, have some of us been arrested?This is not the first time, these people should be eliminated directly, such people who are not cautious enough to stay in the organization will only drag the organization down.

γ1: No, this is in line with the rules. When they placed the order, they never said that there would be such a force in country Z.As for those three guys, I just asked the FBI to release them, not to bring them back.In addition, those government officials should also feel the true meaning of the word suffering... Of course, it is obviously impossible to give transaction information to the Transcendents. We will start now, and they will be sworn enemies...

γ2: They?You mean, the Transcendence is also an organization?

γ1: I just received the news that many members who have contacted the list of country Z have been invaded.If it is not an organization, how is it possible to do such a thing in the same time period?By the way, contact the Monster people, we will join forces with them to deal with the Transcendent.

γ2: Okay, I understand, I'll get in touch right away.

After a few minutes.

γ2: Head, Despair said to contact X first before making a decision.

γ1 curled his lips in disdain, this group of guys without courage.

γ1: Whatever they want, anyway, it’s not necessary for them, if it’s not because they have enmity with the Transcendence... hmph.

When Reynold Bruce received the information from γ2, he was honestly taken aback.

Although Monster has two top hackers, he and X, they also understand that in a large hacker organization with the code name γ, there is a gap between them and some real top hackers who are deified on the Internet.Members of such an organization would actually invite Monster to unite against the Transcendent?

Since they were safely released from the labyrinth network, and later learned from their juniors that the creator of the labyrinth network was a transcendent, they implemented the law of absolute respect and keeping a distance from the transcendent.After coming out of the labyrinth network, the Monster members who have improved a little bit still admire the powerful hacker, the Transcendence.

Although he didn't know what the Transcendent had done, Reynold Bruce knew that at this time, most of the people in the organization had no intention of avenging the Transcendent, after all, they hadn't done anything clean and exterminated at all.

ReynoldBruce replied that it was a kind of procrastination to discuss with X. If he directly rejected the invitation of the code name γ, it would be difficult for the code name γ in face.

The author has something to say:

Small information:

ICQ is one of the earliest instant messaging software. ICQ originated from the Mirabilis company in Tel Aviv, Israel (founded in July 1996), by several Israeli youths (including Yair Goldfinger, SefiVigiser, Amnon Amir, Arik Vardi and Arik's father Yossi Vardi (Hebrew: ???????? ?)) Invented in November 7.

ICQ is the homonym of "ISEEKYOU" in English, which means in Chinese: I am looking for you.

ICQ is a network instant message paging software, which supports functions such as chatting through the Internet and sending messages, URLs and files.Both friends install ICQ software and can communicate with each other while surfing the Internet.Now you can also play small games and video chat with your friends.

In 1998, after America Online (AOL) purchased ICQ, it launched versions 99a, 99B, and 2000 with more functions, but at the same time, it inserted advertisements in ICQ.The built-in search function makes the software bloated, and the unpopular advertisement column makes the use of ICQ have a downward trend.Later, Mirabilis launched a simplified version of ICQlite, which only contains the most basic functions of ICQ.

ICQ2005 was released on February 2, 7.Soon, ICQ cooperated with PCCW to launch Netvigator ICQ5. In addition to the translation of some interface texts into Cantonese, a number of new functions were added to suit the usage habits of Hong Kong netizens.

ICQ2010 was released on January 1, 19.However, in terms of language, Traditional Chinese is officially removed from the support system.On the screen, the layout is more like the design of MSN7, and it can communicate with dating sites such as Facebook and import the address book of each email address, so it is more customized than the previous version.

News on April 4, according to foreign media reports, AOL and Russian investment company DigitalSkyTechnologies jointly announced on Wednesday that the two parties have reached an agreement that DST will acquire AOL's ICQ business for US$29 million.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like