typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 1365 Network Security

Chapter 1365 Network Security (First Update)

"So that's where the Forge of Olympus comes from?"

"I have no idea."

"What is the name of that non-material city that fell from the sky?"

"I have no idea."

Although Epsilon Rodney Radium-223's barrage of questions was limited to the commander's communication channel in the chain of command, Constantine was still disturbed. He did not know the identity of Epsilon Rodney-Radium 223.

The process of prosthetic transformation is the secret of every Martian sage. He did not expect that the Martian sage in front of him would still have time to chatter while he was working on two fronts. But he heard Dr. Holden Radcliffe

The computer disk is running at high speed, and a large amount of data is being analyzed and processed by Epsilon Rodney Radium 223's thinking enhancement device and brain.

A new mission silenced Epsilon Rodney Radium-223.

At this time, the heavy trucks were heading towards the lighthouse base. Zephyr 1, as the advance team that set off early, had been keeping in contact with the convoy. Their camouflage was very good, and there was almost no chance of being stopped by the highway patrol. Even if they were

, the armed men hidden in the carriage are also ready to jump out at any time for a short but fierce battle.

"The Zephyr-1 signal has been interfered with."

The Martian mechanical soldier Alpha-Bronze 2 uses implants installed in the body to communicate with Epsilon-Rodney-Radium-223 alone in the chain of command, rather than using the communication device on Zephyr 1. Huo

Dr. Don Radcliffe was sitting on the folding bench dejectedly at this moment. He still couldn't figure out why these people wanted to arrest him, but he could easily guess the possible reason-either the Inhuman genome or the Life-Model

Decoy project, or the "Book of Darkness" - but he did not shout out immediately and provide all the information he knew. The experience of performing many missions let him know that if he loses his value at this time, the other party will be very

You may not be able to protect your own life.

"Lighthouse Base may have the ability to remotely control Zephyr 1."

"Call Ranger Triangulus-Alpha-10 to Triangulus-Alpha-17." Epsilon Rodney-Ra 223 finally let go of Constantine. She said to Alpha-Bronze 2, "I need them

Floating-point computing power. Let them be individually linked to each other and hard-linked to Zephyr 1. I need to use them as a springboard to launch an attack on the lighthouse base."

Alphonso Mackenzie started talking and saw the light tube above his head flash twice.

At first he didn't pay attention, just thought it was a problem with the light tube. He, Daisy Johnson and armed personnel had been waiting here for almost ten minutes. Everyone was unable to maintain their attention for a long time due to their high nervousness.

A little inconspicuous little twist and turn can also help everyone to lift their spirits and avoid being too nervous and causing fires or other accidents. But what happens next will never be recognized as a minor problem that needs to be repaired - in the first place

There was silence for a few seconds after the first light tube started to flicker, followed by the second light tube, and then all the light tubes in the entire corridor were flashing crazily at a chaotic frequency. The violent changes in the bright light made everyone

The agent almost felt sick.

"What's going on, Agent May?" Alphonso MacKenzie asked loudly over the busy communications channel. "Are we under attack?"

"The enemy invaded...the power system." Even Melinda May's voice became intermittent, "The computer room...restarted."

"I understand." Alphonso Mackenzie squinted his eyes and glanced around. "Daisy, I need you to be responsible for commanding the first line of defense." He said to Daisy Johnson, "Don't stick to this place. Find

Retreat when you have the opportunity. Our purpose is to delay the enemy's invasion, not to completely eliminate them. We do not have this ability, and Agent Coulson does not want you to be harmed."

"What are you going to do?" Daisy Johnson asked quickly. The flashing lights above her head gave her a headache, and the explosion-proof door not far away was painted with yellow and black stripes, which made her feel like she was in a tomb.

."We need you here, Mike."

"I am also needed in the computer room now. The enemy has launched a cyber attack on the power system. I must protect the network security department." Alfonso McKenzie weighed the shotgun and ax in his hand. "Don't worry, if there is an intrusion, I will be there."

We will rush back as quickly as possible. What's more, Yuyou is waiting at the second line of defense, and she has the ability to ensure that you can evacuate smoothly."

Elena Rodriguez was nicknamed Yo-Yo, Slingshot, because of her ability to run at extremely fast speeds but always return to the starting point, just like a thrown Yo-Yo. This nickname was implemented at the time

She was named after Alfonso Mackenzie, who was on the mission to search for the Inhumans. When Elena Rodriguez officially joined S.H.I.E.L.D., their relationship was quite ambiguous.

Daisy Johnson also relaxed when she heard that Yoyo was on the second line of defense.

She had no idea that at this moment there was a ghost made of electric charges wandering in the energy pipelines of the lighthouse base, observing their every move through surveillance cameras everywhere, including Alfonso Mackenzie's claim that he was going to the computer room

and the power room's statements were all seen by the ghost in the circuit - network security offense and defense are far more dangerous than the Beacon Base network security agents imagined. Epsilon Rodney Radium, who has infiltrated the base,

223 passed through layers of firewalls, jumped into the monitoring system with independent generating units and sandbox network systems, and in a few seconds mastered the deployment status of SHIELD agents and took countermeasures. Epsilon-Rodney-

Radium 223 even saw the SHIELD network security department fighting against the Zephyr One firewall through the surveillance system.

The charge carries the fragmented consciousness of Epsilon Rodney Radium 223, describing the intelligence she needs to see in binary and sending feedback. The mobile phones used by every S.H.I.E.L.D. agent are all specially modified

The tool can not only conduct information security countermeasures, but also prevent applications from sending information and operating hardware without the user's knowledge. However, such a firewall is not a problem for Epsilon Rodney Radium 223.

, the computing power provided by the Rangers Triangulus-Alpha-10 to Triangulus-Alfa-17, coupled with the architectural information in the Mars database about the design of the U.S. Department of Homeland Security chip factory, have allowed Epsilon-Rodney-

Radium 223 can slip into design loopholes like a ghost and become parasitic on the mobile phones used by S.H.I.E.L.D. agents.

The closer they are to the network security department, the closer Epsilon Rodney Radium 223 can see the code they used to attack Zephyr 1. This is not a visual information feedback, but between the mobile phone network and the computer network.

Connections between multiple secure Wi-Fi networks serve as springboards for intrusions.

"How's it going?" Constantine asked.

"It went well." Epsilon Rodney Radium 223 said intermittently, "but the signal is not good."

At first, it was just a few misplaced parentheses, and the automatic prompts and corrections of the coding software could solve the problem. But soon this kind of errors began to expand, and code errors began to appear from a sporadic handful, and Error warnings appeared almost every time it was run.

It happens all the time. The network security personnel who can come to SHIELD are all very experienced programmers. They can quickly find the errors and correct them. They just regard this situation as too nervous or other reasons, and

They did not think about intrusion. But when they called the code package, these programmers did not realize that the code package they were using had been replaced. Just like the prion of mad cow disease attacks the human body through food, the simple code is

The proteins that invaded the body, now they have allowed the pathogen to enter the body, and there is no chance of saving it.

"It's done." Epsilon Rodney Radium 223 said, "Now we can enter the lighthouse base."

Please vote!

(End of chapter)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next