"What's going on?"

Lina's voice was weak. Ever since she sat in this position, everything had gone wrong for her, and she already felt powerless.

Not long after, a staff member came with the news.

Langley's power supply system had been hacked. Lina's eyes darkened

, she took a deep breath and almost fainted:

"Find me, find the damn murderer at any cost. I will skin him and beat his muscles."

Lina is like a tigress that wants to eat people.

The CIA and the Pentagon, the two most powerful institutions in their country, have all suffered computer damage.

The newly developed smart firewall is like paper in front of the mysterious hacker. So fragile.

This kind of hacking technology can completely disrupt the order of a country and make people shudder.

After the last demonic incident, all their secret information, no matter what level, was saved to an independent server.

This time the computer Destroyed, although there is no important information.

But all ordinary files and data are lost, which is enough for them to spend a lot of energy to reorganize.

This kind of invasion is a slap in their face, and it is a hard slap.

There used to be demons Organize this clue, this time there is not even a single useful clue

"Everyone kept it secret, and it was announced that the incident was caused by a machine failure.

The computers are worn out and need to be replaced with new ones."

"Director, Hua Shengdun is calling."

The assistant ran over to inform, making Linna's face even worse.

"Find it for me now."

When I returned to the office, I saw the phone on the table and took a deep breath before picking it up.

Just now she scolded others, now she has to be prepared to be scolded.

"Mr President"

"Trash, is the entire CIA so useless?

Since you came to power, have you ever done something satisfying that you didn't think was embarrassing enough?

How many times has this happened? How many times? Say it yourself.

If you are incompetent, just tell me, don't keep it and be nailed to the pillar of shame.

Whatever method you use, find the hacker."

Damn it.

Lina dared not speak with anger, and her face immediately turned dark again, but she could only swallow these words in her stomach.

If she resigns now, she will really become the most shameful director of the CIA.

As arrogant as she is, this It is absolutely not allowed.

In a while, the term will end and the presidential election will be held.

The old and the new will change. After this period, they can be more dignified.

But they don't know that the current actions are just Lin Feng's actions. A little interest.

The revenge from Lin Feng is not over yet.

Two departments as big as the CIA's Langley headquarters and the Pentagon were attacked.

Despite the gag order, the news still leaked out.

Fortunately, because of the Longteng Group, most of the attention was focused on it.

Coupled with their downplaying, the impact of the fishing boat was not significant.

CIA conference room.

In order to find clues to this hacker attack, members of the CIA's CCI (Cyber ​​Intelligence Center) and COG (Computer Network Operations Group).

As well as network security Members of the office are all gathered in the conference room

"No useful clues were found. The other party's methods were very clever, like a ghost."

Dennis's confidence felt like it had been hit like never before.

He had also participated in a series of network denial-of-service attacks that shut down thousands of Internet websites. He even planned unauthorized access attacks on the computer systems of the U.S. Air Force and the U.S. Army. He was arrested by the CIA Only after he was caught did he choose to join the CIA.

He considered himself a god-level computer expert, but in front of this mysterious hacker, he felt like a baby.

Their computer firewall monitoring was of no use.

The other party was more like a computer expert. They carry out dimensionality reduction strikes

"We didn't find it here either. Morrison said reluctantly:

"The world's top hackers, we investigated everything we could.

I even asked a few of the white hat hackers for help, but still couldn't find it."

This feeling is the same as the first time he tracked the demon organization. He felt very powerless.

The world's top hacker masters, including the rising stars who have emerged after the rise of intelligent viruses in recent years.

They all know each other, and they even have them in their CIA information. Their complete information.

But in their impression, no one's strength made him feel powerless.

The conference room fell into silence.

"Is it possible that the team of some Internet companies did this?

Or was it the work of the enemy’s hacker army?"Myron next to me spoke.

All the senior officials of the CIA are in the conference room, and Myron is also present.

This is related to their face. If they don't find the hacker, they will be attacked for the third time, the seventh time, or even The eleventh time.

If it goes on endlessly, none of them will be able to see anyone.

As a senior agent, he may not understand the technology of network security.

But he can more or less provide some analysis and suggestions for solving crimes.

"The other person doesn’t have to be a hacker, come to think of it, besides being a hacker.

Which other top teams and national hacker corps in the world can bypass the monitoring of our smart firewalls?"

"Maozi and Huaxia."Morrison blurted out.

Everyone's eyes lit up and the focus was on him.

"All I can think of are these two countries.

Needless to say, everyone knows Mao Zi.

Since Lin Feng's Chinese character programming language rewritten some basic rules of programming, China's programming technology has become a global leader.

Chinese hackers are the only group of people we don’t understand.

China’s Hongke Army and the China Alliance are both possible"

"I don’t think it’s the Honker Army or the Demonic Virus.

Smart viruses have become an important research object for network security teams in various countries.

On the Internet, a silent cyber war has been going on. The strength of both sides is known to each other.

Their smart viruses may be able to invade ordinary companies.

But it is still unable to bypass the intelligent firewall monitoring at our headquarters and invade our network like a ghost."

"Who is that? Maozi people?"

"If there is anyone who might invade us like a ghost, there should be a top team."

Dennis suddenly spoke, and everyone immediately looked at him

"Longteng Laboratory of Longteng Group."

Longteng Laboratory?

This name surprised the people present. They were all unfamiliar with this name.

"Longteng Laboratory is the intelligent network security laboratory under the artificial intelligence laboratory of Longteng Group.

This laboratory is called Longteng Laboratory in the hacker circle.

The goal of their laboratory is to attack Longteng Group's intelligent network shield and firewall at all costs.

Legend has it in hacker circles that if they find vulnerabilities in the company's smart network shield and firewall.

For one security vulnerability, the team will be rewarded 10 million. If ten vulnerabilities are found, the reward will be 100 million. There is no upper limit. _Feilu reminds you: three things about reading - collection,

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like