Disdain that I'm too poor, my bank card mutated at the beginning
15 Reverse hacking, breaking through the firewall in seconds! At the fifteenth watch

black Knig

Settings
ScrollingScrolling

"Crackle!"

His fingers quickly tapped on the keyboard and typed the code into the computer.

Then, Lin An switched to another computer and skillfully typed in another line of code.

Immediately, the page flashed, and a sea of pure codes appeared.

For ordinary people, looking at code was no different from looking at a book of heavenly texts.

However, Lin An smiled.

"Caught you!"

He had an electronic cigarette in his mouth and a confident smile.

As a highly-paid technical expert hired by Seahorse Investment Company, his main responsibility was to use the Internet to collect all kinds of information about the stock market.

Including stock trading information, detailed to the minute; Collecting stock market data from stock companies, including all kinds of comments on the Internet, and so on!

It even included scandals between various company executives, comments, and so on.

All he needed to do was to collect this information from the vast amount of information on the Internet.

As for the analysis, that was the responsibility of others.

However, this level of collection was like using a sledgehammer to kill a chicken for a technical expert like him. It was too boring on a daily basis.

And he was not the kind of person who followed the rules. When he was a Red Guest, he occasionally worked part-time to earn some gray income and practice his skills at the same time.

And this unexpected surprise this time made him quite pleasantly surprised.

Not only did he earn 200,000 yuan in stock revenue in just two days, but he also managed to attract Lin An's interest by selling and buying stocks in an extremely bizarre manner.

Money was enough, but skills were limitless.

He was trying to challenge this limit.

"Mm, try to come up with a name!”

Lin Anxin said.

In fact, it was very difficult to track the signal of a cell phone.

In the Dragon Country, at least one-third of the population had mobile phones, which was a total of hundreds of millions.

It was basically impossible to track down such a mobile phone that was scattered across the country, had a huge data network, and had extremely scattered terminal.

However, it was impossible to trace the phone signal, but it was possible to trace the frequency of the number.

Although it was also very difficult, it was much easier.

As a technical expert, he was very confident in himself.

Now, while the company was not busy, he used the company's powerful network to connect to his three modified computers and began his search.

Because of the previous two attempts, it was very smooth this time.

The computer screen in the middle was still filled with a sea of codes, but Lin An's gaze fell on a section of code in the middle.

"Eh?"

" Huh?" Suddenly, he exclaimed in surprise," What's going on? A firewall appeared around this code?”

Although the operating system of the phone had its own firewall, which was basically the best in the industry, it was nothing to a hacker like Lin An.

They could easily crack or bypass it and enter the system.

However, this way, he would definitely be invited to drink tea!

He was not that thirsty.

Therefore, he had to find a way to hack in without breaking the firewall. Only then would he be able to do it without anyone noticing.

He needed to find a loophole in the firewall.

He typed out a few lines of code and tried a worm virus that he often used.

This virus could disguise itself as a system file and sneak into the firewall.

Because the technique was ingenious and was written by Lin An himself, there was no other harm other than scanning the phone's hard drive, so it was easy to fool him.

He had used it many times and it was very useful.

However, when he entered the code, the worm virus program touched the inconspicuous firewall. In an instant, the firewall rapidly replicated the original six to seven lines of code. In the blink of an eye, it had expanded by a hundred times. The code spread out and occupied the entire computer screen.

Lin An's expression instantly changed.

This firewall? What was going on?

Before he could figure it out, the " worm virus " that came into contact with the code of the protective wall suddenly expanded, as if it had swallowed the code of the protective wall. In just a few seconds, it had expanded from two lines of code to millions of words.

"Not good!"

Lin An came to a sudden realization. Was this a virus?

But how could this be?

The firewall on his computer was personally designed by him. It was even more secure than the national bank.

But just now, he could not withstand it for even a second before completely collapsing?

More importantly, what kind of virus was this?

How could someone install a virus into the firewall?

"What should we do?"

Lin An was anxious.

He tried to turn it off, but it was impossible.

The operating " mutated worm virus " continued to expand, and the number of bits had reached tens of millions.

"Buzz!"

Suddenly, a notification sounded.

Lin An turned his head abruptly and saw that the computer on the staff seat outside the office, which had been turned off, had strangely turned on by itself.

One by one.

Amidst the buzzing sound of the hard drive, the screen lit up. A greedy snake made up of pure data swam on the screen, opening its mouth and eating fiercely. Its body grew larger and larger.

"F * ck!"

Lin An remembered that the corners of his mouth were filled with blisters.

The firewall he set up was useless?

The other party actually used his worm virus to reverse contaminate him?

What was even more terrifying was that he clearly remembered that he had blocked his connection with the other computers in the company. How could he still be hacked?

This book comes from:m.funovel.com。

Last Next Contents
Bookshelf ADD Settings
Reviews Add a review
Chapter loading