typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1597 The enemy's first opportunity!

.

The distant Liberty, on March 4th, it was less than 8 o'clock in the morning.

A mysterious apartment, Thomson David is inquiring about the peripheral member forum, but he underestimated the defense of the peripheral member forum, and Thomson David is unable to enter it at all!

"Damn!" As time went by, Thomson David's anger became stronger and stronger. He was about to be unable to help but prepare to report the organization's affairs to the NSA National Security Agency.

However, just as Thomson David was hesitating, a dialog box popped up on the computer screen in front of Thomson David.

‘Do you want to deal with the organization?’

Thomson David looked at the dialog box on the computer screen in shock, and his already depressed mood became even more depressed. Because this dialog box represents Thomson David's computer, which was hacked!

The world's peak-level hackers actually encountered computer technology problems one after another, which was a huge humiliation for Thomson David!

Thomson David crossed his hands and hesitated whether to reply to the message in the dialog box on the screen. However, when Thomson David was hesitating, a message appeared again on the computer screen.

‘Mr. David, we are not enemies! In fact, we have a common enemy!’

Thomson David took a deep breath. Since the other party already knew his true identity and had hacked into his computer, what else can I avoid?

‘Who are you?’ Thomson David replied to the message, first asking about the other party’s identity. Even if the other party almost 100% won’t answer, he still has to ask.

‘It doesn’t matter who I am, what matters is that we can unite and deal with the organization!’

Thomson David thought carefully, he was thinking about whether this mysterious man was his enemy or himself.

After some careful consideration, Thomson David finally replied to the message.

‘What are you going to deal with?’

Thomson David tends to believe in mysterious strange hackers. In other words, Thomson David doesn't care about the purpose of mysterious strange hackers.

Because no matter what purpose he has, he cannot threaten Thomson David's position. After all, Thomson David is the core security expert of the NSA National Security Agency, and whether he takes action against or other hacker organizations, he has his own position and a justice position that does not need explanation.

‘Mr. David, how much information do you know about the organization?’ The mysterious strange hacker asked Thomson David.

Thomson David knew nothing about the organization!

wrong!

Thomson David installed a chess piece within the organization, but the time was still short, and the chess piece that Thomson installed had no way to get any information.

And Thomson David also didn't plan to explain it clearly to the mysterious hacker.

‘Sorry! I know very little information about the organization! I only know that the other party must have a peak-level hacker in the world, and the other party has huge computing resources!’

Thomson David has tested these two pieces of information, or summarized the relevant information at the cost of identity exposure.

If the organization does not have the world's peak hacker and huge computing resources, how can it stop his former attack?

‘There are a total of three world-class hackers, including the mysterious Mr. M, Raphael, the former fourth giant of the Angels Council, and a mysterious hacker with an unknown identity. The organization has a total of about 2,000 tflops computing resources, most of which are loosely distributed computing resources. If we want to deal with the organization, in addition to three world-class hackers, we also need huge computing resources as a backing to achieve the possibility of completely defeating the organization!’

The mysterious strange hacker actually knows the organization so well!

Thomson David looked at the information on the screen in surprise, guessing in secret what the hacker who invaded him was, and why he knew so much secret information.

‘Impossible! According to the news we received, Raphael, the fourth giant of the Angels Council, has died! In addition, how could the organization gather 2,000 tflops of computing resources?’

Thomson David refuted the mysterious strange hacker. NSA's National Security Agency has a wide range of intelligence channels, and even the most secret things in the hacking world have been more or less.

‘In fact, Raphael, the fourth giant of the Angels Council, disguised himself as a sword of flame, betrayed the Angels Council and joined. As for how the organization gathered 2,000 tflops of computing resources, it should be that they mastered a very advanced loose structure distributed computing solution, and it is possible that they even discovered unknown hardware-level vulnerabilities, thus controlling a large number of computer equipment and collecting huge computing resources!’

The mysterious strange hacker sent an explanation message, asking Thomson David to judge the situation by himself.

Thomson David once again determined the organization and controlled 2,000 tflops of computing resources. Even though most of them were loose distributed computing resources, Thomson David had already experienced how powerful the loose distributed computing resources controlled were. Therefore, Thomson David vaguely backed down and did not even want to go against the organization.

However, the mysterious strange hacker seemed to have anticipated Thomson David's idea, and did not wait for Thomson David to reply to the message and sent another message.

‘Mr. David, we have a chance to defeat the organization! You and me join forces, and my technical strength, I believe that I have already recognized you. Right? Secondly, the issue of computing resources, I have a low-level vulnerability in the system that has not been announced yet. At the same time, I also have a hardware-level vulnerability. If nothing unexpected happens, we can also collect more than 2,000 tflops of loose distributed computing resources.’

Thomson David's face looked ugly. He was the core security expert of the NSA National Security Agency. However, an unknown hacker was actually discussing these things with him, which made Thomson David a little unhappy.

But the anger towards the organization in his heart overwhelmed all concerns, Thomson David typing on the keyboard and replying to the message.

‘We are still missing the help of a master of the same level!’

Thomson David raised the final question. Since the organization has three world peak hackers, even though they now have two world peak hackers and will soon have equivalent computing resources, they still lack a world peak master.

‘I will handle this! Mr. David, can we become temporary alliances? Can we fight the organization together?’

The mysterious strange hacker sent an inquiry, obviously wanting to get a positive answer from Thomson David.

Thomson David just hesitated for less than three seconds before making the final decision!

‘If we also have equal power, we can be temporary alliances, we can fight the organization together, and we will definitely defeat them!’

Thomson David really wants to defeat the organization, even if he relies on the power of other hackers, he still wants to defeat the organization!

‘Mr. David, I need to contact another temporary ally now and wait for my news!’

Also in New York, in another mysterious room, the Angels Council's No. 1 giant hidden in the shadows, cut off the link with Thomson David, and then picked up a one-time prepaid phone to dial the number.

The number one giant of the Angel Council, Jehovah, held his cell phone in his right hand, dialed the number, and waited. About thirty seconds later, the phone was connected and a man's voice came from the cell phone receiver.

"What's wrong with the Lord?"

The Lord was still a neutral voice and responded, "You have won! I need your help!"

"You know the price!" the man reminded.

"Yes! I can hand over Abertiel to you!" The tone of Jehovah was somewhat helpless and reluctant, but he still made a decision.

The man laughed, "Since you are willing to hand over Abertiel, then tell me, what help do you need? I guess it should be very difficult?"

This man was the mysterious man who was preparing to help Jehovah when Shi Lei and Raphael attacked Jehovah. He and Jehovah should also know him in the real world. Otherwise, he would not have appeared in Jehovah's room at the beginning.

"I need your help and attack the organization together! And I need the supercomputer resources you have and the broiler network resources!" Jehovah and the lion opened his mouth.

The mysterious man said with no concern and affirmation: "No problem! When?"

Aberthir is the pseudo-artificial intelligence system of the Angels Parliament. Aberthir’s value is very high, at least exceeding the level of tens of billions of dollars. What Jehovah said is actually nothing compared to Aberthir!

When Jehovah contacted Thomson David and the mysterious hacker to prepare for the attack, Shi Lei was not aware of it, and Shi Lei was still in North Ossetia.

The enemy took the lead!

.(To be continued...)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next