Tom Cat breaks through the dimensional wall

Chapter 119 Ignore the warning and continue visiting!

Dark web?

Jerry shook his head frantically upon hearing this.

It really knew nothing about it.

Tang Mu hesitated for a while and shook his head as well.

It knew something about the dark web, but it was all heard from the major up masters, and it didn't really know much about it.

What's more, this is still in the data world.

Who knows what the dark web in the data world looks like.

But one thing is certain, it is probably not a good thing.

Seeing the two newbies in front of him shaking their heads, the tall and thin masked man smiled with satisfaction: "The dark web is a good place. The entire data world is extremely huge, and the surface network metropolis where you are is just the tip of the iceberg of the data world."

"Many things that cannot be found on the surface can be easily found by going to the dark web, no matter what they are."

"Wow!"

Tang Mu and Jerry cooperated with the performance of the tall and thin masked man.

Holding his heart with both hands, his eyes were full of shining little stars.

"Well, I'll give you a link. Click it and you can go to the dark web."

The thin and tall masked man said, and sent out a long list of incomprehensible links, floating in front of Tom and Jerry.

At the same time, in the real world.

A hacker had a smile on his face, as if he had succeeded in his trick.

This man was the thin and tall masked man in the data world.

Originally, he just browsed the network disk to see if he could find some useful resources.

But he found traces left by two computer novices.

It was obvious that they were here to find something.

This hacker didn't need to know what Tom and the others were looking for, as long as he knew that Tom and the others were looking for something.

As long as he knew this, he could trick them into clicking on the link he sent out.

Once he clicked on his link, all the other party's data would be exposed under his nose, and it would be up to him whether to round it or flatten it.

As a hacker with poor personal ethics, his goal was of course to get some money from Tom.

Nowadays, many people use their real names to surf the Internet, and have also bound various mobile phone numbers and bank card numbers to various websites.

The hacker was confident that he could transfer the money he wanted from Tang Mu's account.

As for the so-called dark web, the hacker did know the address of the dark web.

He would usually take some commissioned work there.

But he would not be stupid enough to really send the so-called dark web link to strangers.

The hacker didn't know whether Tang Mu and Jerry would be in trouble.

But if the address of the dark web was spread casually, the hacker felt that he would be in trouble soon, after all, he was not in China.

It was still very easy for someone to find him.

He didn't want to be sunk to the bottom of the sea for no reason.

In the data world, Tang Mu looked at the unknown link floating in front of him, and in the hacker's expectant eyes, he raised his hand and pressed it.

The moment he pressed the unknown link, Tang Mu felt a faint pulling force, as if he wanted to teleport it somewhere.

At the same time, a red warning window popped up in front of Tang Mu.

[Your link is not a private link. Attackers may steal your information (such as passwords, communication content or credit card information)]

[Ignore warnings and continue to visit/exit]

This is the firewall working.

Seeing this scene, Tang Mu raised his head and looked at the thin and tall masked man in front of him with an inquiring look.

The thin and tall masked man obviously did not expect to encounter such an embarrassing scene.

Fortunately, he was thick-skinned enough.

He quickly said: "It's normal to have such a warning on the dark web, right? After all, there are many things in it that are not suitable for children to watch."

As he said, it seemed that he was not afraid of Tang Mu's hesitation. A bean-sized sweat bead slid down the masked face of the thin and tall masked man, and he said in a nervous tone: "You are not so timid that you dare not even click on a link?"

"Just kidding, I'm super brave."

Tang Mu raised his chin and chose [Ignore warnings and continue to visit].

Today, I will be a lone hero.

"Very good, that idiot has taken the bait."

Seeing that the other party dared to click on unfamiliar links randomly, the hacker, who seemed to be of average level, laughed so hard that he almost choked.

The website has already given a warning.

If it were him, he would definitely not continue to visit.

But it's better to be a little stupid, now it's time to reap the fruits of his labor.

The hacker in the real world rubbed his hands excitedly, and immediately prepared to obtain all the information about Tom Mu on the Internet to make a profit.

But after he "cracked" on the computer, he felt that something seemed to be wrong.

He couldn't find any information left by Tom Mu on the Internet.

No social media account, no email, no mobile phone number, no credit card.

It was blank, and he didn't look like a person living in modern society at all.

"Doesn't this person ever shop, entertain, or use social software to communicate with others?"

The hacker continued to dig deeper with confusion.

How could he know that Tom Mu's identity in this mission world was the same as Jerry's.

They were all natives of the data world.

As a native, it naturally cannot have the gadgets that only real-world netizens need.

The hacker was obviously encountering the natives of the data world for the first time, and was scratching his head.

Tom also encountered a small problem.

Originally, it thought that after confirming the continued access, it and Jerry would be sent to the dark web.

No matter how bad the situation is, we have to do the same as Delamain and create a vehicle for them to ride on.

But nothing happened.

Minutes passed and they were still standing there.

"Stuck?"

Tom turned to look at Jerry.

Jerry shrugged, not sure what the situation was.

It must be stuck...

Tom Mu could still feel the pulling force coming from the link.

Since there is no response after pressing confirm, if no one answers, just go there by yourself.

Make enough food and clothing by yourself.

Tang Mu thought so, and followed the vague pulling force to forcefully open a big hole in the network disk warehouse!

This gap is full of green code flowing rapidly.

Jerry was told to wait where he was, while Tom, a brave man with a high skill level, jumped right in!

How does it know?

That link is not useless, it's just useless to them.

At this time, the poor little hacker is still worried about this.

My hands were pounding away at the keyboard.

A sudden change appeared on the computer screen in front of me.

A hole suddenly opened on his computer desktop, and countless source codes composed of [0] and [1] were flowing in it.

The next second, a familiar cartoon cat image jumped out and landed on the desktop taskbar at the bottom of his screen.

"Tom?!"

The hacker was a little shocked.

I am trying to hack other people's information, but I won't say anything about it without success. A cartoon Tom Cat actually appeared on my desktop!

"Am I being hacked?"

The hacker, who had no idea about the natives of the data world, the first thing he could think of was that he had made a mistake. The person on the other side was not some idiot who didn't understand computers at all.

That is a computer hacker who is more skilled than himself!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like