Hunting Crime: After Sending Account Thieves To Prison, It Became Popular On The Internet

58. I Use The Data-Based Sword To Cut The Sky, Cut The Ground, And Cut The Rebels!

Magic City.

Dragon Network Monitoring Center.

In the eyes of outsiders, this is the highest command to monitor the national network.

But insiders know it.

All the top 100 hackers in the country are gathered here.

They serve the people day and night.

It protects the safety of people's hearts and property.

At this moment, in the No. 1 hall of the Network Monitoring Center.

The tense atmosphere permeated the audience. Hundreds of people were sitting in front of their computers, constantly typing on the keyboard, with their eyes fixed on the screen.

"We have been besieging this overseas fraud organization for a long time, everyone, come on!!"

"Before tonight, please work harder, be sure to take down the other party and destroy this overseas organization!"

The commander stood in the center of the hall, staring at the battle situation on the big screen behind to boost morale.

"Yes!!" Hundreds of people responded in unison.

The sound of hitting the keyboard is faster.

"Boss, the task this time is probably not that simple." The assistant asked in a low voice.

He has been with the commander for several years.

Usually, it is not necessary to dispatch so many people to deal with such overseas organizations.

"There must be a deep meaning in the above request, we just execute the order." The commander did not give any other explanation.

This surprised the assistant a little.

It seems that it is really a big deal to keep it strictly confidential to this extent.

"Team leader of the first and second teams, how long do you estimate how long it will take to break through the first layer of defense." The commander asked in a deep voice.

"Boss, give us two more hours, no, just one hour." The captain of the first team wiped his cold sweat and said.

"Boss, this time is really wrong. How can the previous overseas organizations be so tenacious?! I feel that they came well prepared, and they have been specially prepared for a long time." The captain of the second team was suspicious.

The instructor stared at the big screen, clenched his fists and said, "Continue!!"

"Yes!" the two replied.

All three have a feeling.

It took them half a day for this layer of defensive barriers.

How long will it take to really break through this overseas organization.

"Um!?"

"what!?"

"what happened?"

"Where did this person come from!?"

"Fuck, he's a bit strong."

"It doesn't seem to be ours."

at this time.

An emergency has occurred.

Surprised and puzzled sounded everywhere in the hall.

"What happened?" the commander asked quickly.

"Boss, the first layer of defense was broken by someone, but it doesn't seem to be ours, and...and...this person was forcibly broken through from a brand new port." After collecting the latest situation, the captain of the first team hurriedly said.

"What!!" The commander and assistant were stunned.

"How long did he attack to break open?!" the commander asked quickly.

This question made the captain of the first team look even more strange.

He replied slowly: "Ten seconds, less than! The specific time is a little over nine seconds."

hiss--

As soon as the words came out.

The commander, assistant and other members who didn't know the truth were all stunned.

What the hell? !

They broke through this layer of defense and spent hours without success.

But this man broke in ten seconds? ?

Is this a joke? !

"Lock the screen perspective!" said the commander.

After the big screen flickered for a while, the sudden stream of data was locked.

"Huh?! The scale of his data flow can only be considered a C-level, right? How can he break the first layer of defense on this scale?!" The commander asked with confusion.

You must know that this wave of their attack has assembled hundreds of C-level scales, dozens of B-level scales, and several super-strong data streams of A-level scales.

There is absolutely no reason for this person to be faster than them!

Not only did the commander think so, but the other members also thought the same way.

Could it be that this person has found an extremely weak point to attack and break through? !

Just when they were full of doubts.

This sudden stream of C-scale data has rushed to the second layer of defense.

Um! ?

Do not redo the code to strengthen the structure, go directly? ? ?

Everyone was stunned again.

What surprised them was just beginning.

When this C-level data flow is about to approach the second-layer defense barrier.

The algorithm and character set of this data stream suddenly began to change.

Him, what is he going to do? !

I saw that the data flow contracted violently at this moment and formed a sword-like shape.

Then, it seemed to explode with momentum.

The code whistling around the sword-like shape turned into an impact force and swayed in all directions.

The condensation value of the data stream scale skyrocketed at this moment.

C+ level.

Grade B.

Grade B+.

Swords converge.

After this data stream burst into a burst of light, it slashed to the second layer of defense barriers.

Click!

The row code on the defensive barrier suddenly trembled, and a crack split along the center of the beheaded and opened to all sides.

Bang! !

A silent burst.

The second layer of defensive barriers, break! !

Hall 1 of the Network Monitoring Center.

It was silent now.

All hands have left the keyboard.

They were all stunned.

His eyes were full of disbelief.

Heck! !

They must be hell!

Celebrating the 7-day National Day holiday and reading books! Charge 100 and get 500 VIP coupons!

Immediately rush to recharge (event time: October 1st to October 7th)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like