In the distant country of Lijian, it was less than eight o'clock in the morning on March 4th.
A certain mysterious apartment, the Peripheral Member Forum that Thomson David was checking, but he underestimated the Peripheral Member Forum's defense, and Thomson David could not enter it at all!
"Damn it!" As time went by, the anger in Thomson David's heart became stronger and stronger. He was about to be unable to bear it and was ready to report the organization's affairs to the National Security Agency of the NSA.
However, just as Thomson David was hesitating, a dialog box popped up on the computer screen in front of Thomson David.
'Do you want to deal with the organization?'
Thomson David looked at the dialog box on the computer screen in shock. His already depressed mood became even more depressed. Because this dialog box meant that Thomson David's computer had been hacked!
The world's top hacker actually encountered computer technical problems one after another. This was a huge humiliation for Thomson David!
Thomson David crossed his fingers, hesitating whether to reply to the message on the screen or in the dialog box. However, when Thomson David was hesitant, a message appeared on the computer screen again.
'Mr. David, we are not enemies! In fact, we have a common enemy!'
Thomson David took a deep breath. Since the other party already knew his true identity and hacked into his computer, what else could he avoid?
"Who are you?" Thomson David replied to the message, first asking for the other party's identity. Even if the other party would almost 100% not answer, he still had to ask.
'It doesn't matter who I am, what matters is that we can unite together to deal with the organization!'
Thomson David thought carefully. He was wondering whether this mysterious man was his enemy or himself.
After some careful consideration, Thomson David finally replied to the message.
'How are you going to deal with it?'
Thomson David tends to believe in mysterious stranger hackers. In other words, Thomson David doesn't care at all about the purpose of mysterious stranger hackers.
Because no matter what his purpose is, he cannot threaten Thomson David's position. After all, Thomson David is the core security expert of the NSA National Security Agency. No matter he takes action against, or other hacker organizations, he has his own
position, a just position that does not require explanation.
‘Mr. David, how much information do you know about the organization?’ the mysterious strange hacker asked Thomson David.
Thomson David knows nothing about organizations!
wrong!
Thomson and David placed a chess piece within the organization, but the time was short, and there was no way for the chess piece placed by Thomson to gain any information.
Moreover, Thomson David did not intend to give a clear explanation to the mysterious hacker.
'Sorry! I know very little information about the organization! I only know that the other party must have the world's top hackers, and the other party has huge computing resources!'
Thomson David has already tested these two pieces of information, or in other words, summarized the relevant information at the cost of exposing his identity.
If the organization does not have the world's top hackers and huge computing resources, how can it stop his previous attacks?
'There are three top hackers in the world, including the mysterious Mr. M, the flaming sword Raphael, the former fourth giant of the Angel Council, and an unknown mysterious hacker. The organization controls a total of about 2000tflops of computing resources, of which
Most of them are loosely distributed computing resources. If we want to deal with the organization, in addition to three world-class hackers, we also need huge computing resources as backing. Only then can we completely defeat the organization!'
The mysterious strange hacker actually knows the organization so well!
Thomson David looked at the information on the screen in surprise, secretly guessing who the hacker who invaded him was and why he knew so much secret information.
‘Impossible! According to the news we received, Raphael, the flaming sword, the fourth giant of the Angel Council, has died! In addition, how can the organization gather 2000tflops of computing resources?'
Thomson David refuted the mysterious stranger hacker. The intelligence channels of the National Security Agency of the National Security Agency are very extensive. Even the most secretive things in the hacker world are more or less accessible.
'In fact, the fourth giant of the Angel Council, the Flame Sword Raphael, faked his death, betrayed the Angel Council, and joined. As for how the organization gathered 2000tflops of computing resources, it should be that they have mastered a very advanced loose structure distributed
Computing solutions may even discover unknown hardware-level vulnerabilities, thereby controlling a large number of computer devices and collecting huge computing resources!'
The mysterious and strange hacker sent explanatory messages, allowing Thomson David to judge the situation on his own.
Thomson David once again determined the organization and controlled 2000tflops of computing resources. Even though most of them were loosely distributed computing resources, Thomson.David had already experienced the organization and how many loosely distributed computing resources it controlled.
How awesome. Therefore, Thomson David faintly backed down and did not even want to go against the organization.
However, the mysterious stranger hacker seemed to have anticipated Thomson David's thoughts and sent another message without waiting for Thomson David to reply.
'Mr. David, we have a chance to defeat the organization! You join forces with me. I believe my technical strength has been recognized by you, right? Secondly, regarding the issue of computing resources, I control the bottom level of a system that has not yet been announced.
Vulnerability. At the same time, I also have a hardware-level vulnerability. If nothing unexpected happens, we can also collect more than 2000tflops of loosely distributed computing resources.'
Thomson David's face was ugly. He was the core security expert of the National Security Agency of the National Security Agency, but an unknown hacker was actually discussing these things with him, which made Thomson David a little unhappy.
But the anger in his heart towards the organization overrode all worries, Thomson David typed on the keyboard and replied to the message.
'We still need the help of a master of the same level!'
Thomson David raised the final question. Since the organization has three of the world's top hackers, even if they now have two of the world's top hackers and will soon have equivalent computing resources, they still lack one of the world's top hackers.
Level master.
'I will take care of this! Mr. David, can we become a temporary alliance? Can we fight the organization together?'
The mysterious and strange hacker asked, obviously wanting to get a positive answer from Thomson David.
Thomson David only hesitated for less than three seconds before making the final decision!
'If we also have equal power, we can be a temporary alliance, we can attack the organization together, and we will definitely defeat them!'
Thomson David really wants to defeat the organization, even if he relies on the power of other hackers, he must defeat the organization!
'Mr. David, I now need to contact another temporary ally and wait for my news!'
Also in New York, in another mysterious room, the number one giant of the Angel Council hidden in the shadows cut off the link with Thomson David, and then picked up a disposable prepaid cell phone to dial the number.
The leader of the Angel Council, Jehovah, held the mobile phone in his right hand. After dialing the number, he waited. About thirty seconds later, the call was connected and a man's voice came from the receiver of the mobile phone.
“Lord, what’s the matter?”
Jehovah, still a neutral voice, responded: "You win! I need your help!"
"You know the price!" the man reminded.
"Yes! I can hand Abertir over to you!" Jehovah's tone was somewhat helpless and reluctant, but he still made a decision.
The man laughed heartily, "Since you are willing to hand over Abertir, then tell me, what help do you need? I guess it should be very difficult, right?"
This man is clearly the mysterious man who was preparing to help Jehovah when Shi Lei and Raphael attacked Jehovah. He and Jehovah should also know each other in the real world. Otherwise, he would not have appeared in Jehovah's room.
"I need your help to attack the organization together! Moreover, I need the supercomputer resources and broiler network resources you have!" Jehovah Lion said with his mouth wide open.
The mysterious man affirmed without caring: "No problem! When?"
Abertil is the pseudo-artificial intelligence system of the Angel Council. Abertil's value is very high, at least more than ten billion dollars. The requirements stated by Jehovah are actually nothing compared with Abertil!
When Jehovah contacted Thomson David and the mysterious hacker to prepare for the attack, Shi Lei did not know that Shi Lei was still in North Ossetia.
The enemy has the upper hand!
.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!