typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 584 Uncle Jess, I seem to have heard something strange.

(Please vote for the super large chapter)

"The bottom layer of data exchange on the Internet is actually the transmission of data packets. Various information is encapsulated in these data packets and then transmitted to various computer terminals for processing.

"Our current attack method can be understood as sending some data packets covering the control program to the enemy's computer. Once these data packets successfully enter the opponent's computer, we can find ways to gain control of the opponent's computer.

"The firewall is a protective means that cuts between the internal network and the external network. It can effectively filter out which data packets come from allowed users and which data packets come from disallowed users, thus blocking those 'malicious users'."

'The user's data packet enters the computer.

“The function of anti-virus software is that after malicious data packets enter the computer, the anti-virus software can identify those malicious data and programs and remove them from the computer.

"Of course, this is just a brief process. The actual situation is much more complicated than this. Well...Uncle Jess, did I go too deep?"

Vianna paused and seemed to be thinking,

"Ah, I thought of it, Uncle Jess, you can understand it this way, we are currently engaged in a siege battle similar to the one in the novel.

"Your friend with the symbol E in the underlying data and I are the attackers, and the hacker opposite is the defender. The firewall is the city wall, and the anti-virus software is the defensive force in the city.

"This city is not just one big city, they also have many satellite cities, which are small computer terminals on the periphery.

"There are normal exchanges of personnel and materials between big cities and satellite cities, and this is ordinary transmitted data.

"These urban agglomerations composed of satellite cities and large cities, which are secondary intranets, also have a larger firewall outside.

"When you first broke into the network of the laboratory outside, Uncle Jess, you first bypassed the firewall outside and entered the urban agglomeration of these satellite cities, allowing E to first occupy a satellite city with weak defenses.

.

"Then she took advantage of the exchanges between this satellite city and other satellite cities to quickly occupy other satellite cities.

"After occupying these satellite cities, we can mobilize the computing power of these satellite cities, that is, city resources, and bypass the peripheral firewalls through the network to put more of our data packets, that is, soldiers coming in.

"At the same time, we can also have our soldiers disguise themselves as normal soldiers in this satellite city and try to sneak into the big city, which is the core server, and the wall of that big city, which is the function of the firewall, is to filter out

Find out who is a normal soldier and who is our disguised 'spy'.

"The overall computing power of the network of the peripheral laboratory we attacked before was not high. If our 'spies' got into the core server, even if the hacker himself has strong computing power, the computer created by E's powerful computing power would

We are all vulnerable to the data tide.

"The 'anti-virus' troops in the city will be easily defeated by us, and then the city will be occupied by us.

"The hacker probably knew about this situation, so he spent most of his computing power on maintaining the firewall and improving the firewall's screening capabilities.

"At the same time, he is also detaching a part of his 'troops' to uproot the satellite cities under our control.

"Because theoretically, as long as all the terminals we control on the internal network are cleared by him, we will no longer be able to send 'troops' in from the outside to attack the core server."

The girl's voice paused for a moment, "Uncle Jess, can you understand this metaphor?"

"I understand, but I don't seem to fully understand."

He Ao raised the bone axe, once again split an oncoming attacker injected with genetic medicine into two halves, and moved forward quickly.

Wei An knows the knowledge that Wei Anna said, and He Ao, who inherited Wei An's memory, also knows it, but Jace shouldn't know it.

"So you are actually playing some kind of strategic game. If we push down the opponent's main city, it will be considered a victory, and if the opponent clears all our occupied territories, it will be considered a victory?"

"Well, you can understand it this way."

Vianna was still typing on the keyboard.

Due to work reasons, this girl seems to rarely communicate with other people, and once she starts talking, she can't stop talking.

"So what happened to the 'trap' you mentioned before?"

He Ao then asked.

"This is simple,"

When Vianna was asked about her plan, she was a little happy and quickly replied,

"Isn't the hacker on the other side going to allocate computing power to take out the stronghold we established? But his total computing power is limited. The more computing power he allocates, the less computing power he has to defend the core server.

"In view of this feature, I first arranged three terminals as the first layer of 'traps'. These three traps are progressively layered in order to disguise a large-throughput 'key network terminal'.

"In fact, most federal smart devices now support simultaneous connection to internal and external networks.

"Many computer terminals in the laboratory above also support this function. They can connect to the internal network and the external network provided by the communication service provider. They can use the external network to temporarily maintain work when there is a problem with the internal network.

"And in this case, smart devices generally use a corporate account, and they can collectively access the external network directly through this corporate account.

"However, all the equipment in this laboratory has the function of connecting to the external network turned off. We entered the internal network and after controlling the terminal, we also enabled the external network access function to deliver more remote computing power.

"Generally speaking, the attacker's computing power is not enough, well... not as exaggerated as E, so in order to concentrate the computing power, they usually only project the computing power to the external network through one or two terminals. This kind of

Terminals are 'critical network terminals'.

"In this kind of battle, it usually takes time to rebuild a 'key network terminal' after it is destroyed. In this case, our computing power may be insufficient, causing the opponent to reverse the situation of the battle.

“But in fact, because of the powerful computing power of ‘E’, all our network terminals are ‘key network terminals’, but the hacker on the other side doesn’t know that, so he has been trying to find our ‘key network terminals’.

"With this feature, I used a series of traps to disguise a fake 'key network terminal'.

"Those three serial traps have only one function, and that is to attract hackers' attention to other network terminals and 'protect' the 'fake key network terminals' we disguised.

"The hacker was very smart. He identified three of my traps and then determined the location of the 'key network terminal' I pretended to be. So he mobilized a lot of computing power and prepared to directly destroy the 'key network terminal'."

Speaking of this, Vianna laughed and her tone became lighter, "Then he entered my trap. Because the computing power to protect the core server was reduced, E easily broke through his defense and controlled the core server.

device.

"I also found his data channel connecting the above-ground laboratory and the underground laboratory. Unfortunately, he ran too fast and closed the port the moment the server was breached. Otherwise, we could just drive in without having to fight here.

Firewall."

The little girl sighed, "This guy is still strengthening the firewall."

To sum up, Vianna created a fake target to attract the hacker's attention, and then used several small traps to mislead the hacker, making the hacker think that the fake target was real.

Then the hacker mobilized his strength and prepared to injure Vianna and Eve in one fell swoop. Unexpectedly, he fell into Vianna's plan and Eve had her home stolen instead.

"It's okay, there will be a solution."

He Ao tipped the axe, and bright red blood flowed down the ax blade. In front of him, there were the last two researchers, and the blood covered the gate that horizontally separated the elevator shaft under He Ao's feet.

These researchers were waiting here when He Ao landed on the gate, and each had a D-level genetic potion in hand.

They should have been sent up before the gate was closed, and their purpose should be to 'impede' He Ao from continuing down when he found this place. Only the last two of them are dead now.

"Devil, you are the devil..."

At this moment, the two researchers were trembling and retreating, and did not rush over like the previous researchers.

He Ao switched the headset to Eve's single-line communication, "Eve, how long will it take to break through the firewall?"

"It's estimated to take another fifteen minutes and thirty seconds."

Eve's voice was unusually calm.

"Fifteen minutes is too many,"

He Ao paused for a moment. The other party must be transferring data frantically now. "Is there any way to bypass the firewall?"

"Retrieving information,"

Eve's voice paused, "According to the data of the core server of the peripheral laboratory, there is a 90% probability that there is only one core router in the hidden laboratory connected to the external network, and other devices have no networking capabilities."

In other words, He Ao's method of finding a random computer and implanting the control program compiled by Eve to bypass the firewall will not work.

Those terminals cannot connect to the external network, and without Eve's external computing power support, they only control one or a few terminals. There is a high probability that they will be easily cleared by the hacker.

However, in this case, after violently breaking through the firewall, there is a high probability that you can directly control the core server of the hidden laboratory. Unfortunately, fifteen minutes is still too long to break through the firewall.

"Where is the data port of China Unicom's internal and external laboratories that Vianna mentioned? Is there any way to restart that port?"

He Ao asked again.

If the data channel between the internal and external laboratories is reopened, Eve can deliver computing power through the network of the external laboratory and directly input it into the internal network of the hidden laboratory, thereby bypassing the internal network firewall of the hidden laboratory and continuously delivering computing power.

force.

This can repeat what we just did in the external laboratory and greatly shorten the time to control the core server.

"Reading building construction drawings... Possible line layout is being simulated...Simulation successful... Possible locations of internal and external network smart switches have been marked..."

Along with Eve's voice, He Ao's bracelet vibrated.

A 3D image appeared on the projection of his wristband, and the image marked the location where he was standing, which was above the elevator shaft gate.

Not far from this gate, at an almost horizontal position, there is a closed emergency passage that connects the ground and the underground. According to Eve's mark, there is a 73% chance that the intelligent switch in the internal and external laboratories is right in the middle of this emergency passage.

Behind a secret door.

He Ao touched the projection with his finger and took a look at the surrounding structures.

The gate of this emergency passage should be made of an alloy similar to the gate under his feet now. It is not easy to break through in a short time.

If he takes the normal route, He Ao needs to return to the ground and find the closed gate of the emergency passage from the other side. Only after breaking through this gate can he enter the emergency passage.

Of course, he can also use his spiritual consciousness to speed up the breakthrough.

but······

He Ao raised his head and looked at the dark wall of the elevator shaft.

Why must we take the repaired road?

He walked to the edge of the wall, raised the bone axe, and struck down hard.

With a burst of gravel flying, he split a dent in the wall of the elevator shaft.

Judging from the design drawings, the walls around the elevator shaft have been specially thickened, especially near the gate, which is more than two meters thick.

He Ao moved very quickly, gravel splashed out, and in the hazy darkness, he accurately identified the direction.

There is also a solid alloy surface behind the cement of the wall, but it is very thin and will be split open by Ho Ao in two or three strokes.

The sharp bone ax penetrated the hard wall, just like the steel blade penetrated the soft soil.

After a few chops, He Ao straightened the ax upright, changed the position from chopping to shoveling, and used the ax as a shovel.

At this time, two invisible figures had touched behind him.

Two sharp blades slowly approached his back.

As his body gradually penetrated deeper into the wall, the blade also moved towards the back of his heart.

But the blade on the left reached halfway and stopped in mid-air.

Two fingers clamped the blade, and no matter how hard the person behind him tried, the blade would not move at all.

He Ao released the bone ax embedded in the wall, held the blade in his hand and slowly opened the blade. At the same time, he turned around.

When the person standing on the right saw this situation, he did not hesitate and sent the blade directly to He Ao's neck.

He Ao turned around and looked at the researcher who was standing on the left, holding the blade of the knife between him, his face full of anxiety, and still stabbing him hard, and sighed softly.

The last two remaining researchers have both worked under Jace and know Jace's character very well. They all know that Jace is the kind of 'good guy' who doesn't 'kill'.

That's why they accepted the task of killing 'Jace' because they 'understood' Jace and knew that Jace wouldn't kill them. This was an almost costless business. Even if they couldn't kill Jace, they could still leave alive.

It is precisely because of this that they felt fear after seeing He Ao killing other attackers.

But after seeing that He Ao didn't kill them further, they had other thoughts in their hearts. They thought that 'Jess' was still the kind-hearted and easy-to-bully Jace, and that Jace still missed his old friendship, so they could take advantage of 'Jess'

'Let go' and approach 'Jace' again.

The genetic medicines used by these two people are all 'assassin's' genetic medicines, which are suitable for them to sneak in the dark.

So they sneaked behind He Ao.

The researcher on the left just sighed when he looked at He Ao and did not take action immediately. He felt happy and quickly looked at his companion beside him. At the same time, he took out a small steel knife from his waist and swung it from another direction.

Stab towards He Ao's neck.

The next second, a broad hand grabbed his neck and twisted it gently.

Click——

With a superimposed crisp sound, his neck and the blade held by He Ao were broken at the same time.

The flying broken knife penetrated the neck of another attacker on the side, and the blood dyed the white lab coat red.

Two corpses fell to the ground, making two muffled sounds.

He Ao turned around, closed the single-line communication with Eve, and turned the earphones back to the public channel.

Of course, on the public channel, only he could talk to Vianna and hear the voices of Eve and Vianna at the same time. Vianna could not hear Eve's voice.

Meanwhile, he continued to 'dig' the wall with his axe.

These researchers are much more proficient in the power brought by genetic medicines than those mercenaries. They should be among the first people to use genetic medicines. Although their basic physical fitness is not as good as those of mercenaries, they can just use the genetic medicines.

combat effectiveness.

This is also the purpose of the controller of this hidden laboratory to send these researchers to attack He Ao.

In fact, the mysterious man is also conducting experiments on these researchers. Through their use, it is proved that the combat effectiveness of genetic medicine can be improved with proficiency, and non-combatants can also use it easily.

This proves the strategic value of genetic medicine.

The sound of flying gravel and sharp blades digging into masonry and concrete echoed in the silent night.

In just a few tens of seconds, He Ao dug through the two-meter-long wall. He pushed aside the last gravel, and a narrow, downward staircase appeared in his field of vision.

Compared with the elevator gate, the sealing of this emergency passage is worse.

The smell of blood is also stronger.

He Ao raised his bracelet, glanced at the three-dimensional image, walked down the passage, and quickly found the hidden secret door.

This secret door is sealed in the cement wall. Without the blueprint, it is not that easy to find it.

He Ao directly raised the bone ax and opened the secret door.

At this moment, a phantom suddenly struck behind him.

He Ao turned around and struck behind him with an axe.

A golden shield of light flashed in the darkness, then was chopped into pieces by the ax blade, and the figure was knocked back.

He Ao did not look at the figure, but quickly walked into the secret door.

Behind the secret door there is only a dark and narrow space similar to a storage room, filled with dense lines connecting various shining machines.

Smart switch, it seems he has found the right one.

Relying on the terrorist's ability to see in the dark, He Ao quickly found a data line among these lines, then took off the bracelet and connected it to the data line.

"The switch is being invaded. It will take 30 seconds to reopen the port."

Eve's voice rang in He'ao's ears.

This is deep underground, the network is a bit unstable, and Eve doesn't have much computing power to deliver.

Vianna's voice sounded almost the next second, "Uncle Jess, how did you find this switch? It's amazing."

"Nothing, I'll leave the rest to you."

He Ao raised his head and looked outside the secret door in the direction of the figure he had just beaten away.

It came from below the emergency passage, and behind the figure that was knocked away, a figure with a fiery figure opened her hands, and blazing fire burned in her hands.

Behind her, a strong figure more than two meters tall raised his head and looked at He Ao.

In front of her, the person who had just been knocked away by He Ao also stood up.

Of the three people, the one who made the fireball should be the talent sequence that He Ao had seen before that could control fire. The tall figure should be a 'warrior', and the one who was knocked away should be a C-level person who could form golden armor.

He Ao looked at these three people calmly.

The feeling given to He Ao by these three people is no less than that of a normal C-level person, and there is no messy feeling exuded by other people who have taken genetic medicine.

Theoretically, there is only one situation where this phenomenon can occur.

These three people were originally D-levels corresponding to the pre-sequences of these three genetic potions. They perfectly integrated the power of the genetic potions, and they were also very proficient in the talent sequences.

He Ao held the handle of the ax in his hand, slowly walked out from behind the secret door, and stared at the three people in the shadow below, "I have always been curious about which talent sequences your genetic potion corresponds to."

"Talent Sequence 98: Warrior"

The tall man spoke slowly.

"Talent Sequence 101: Fire Controller."

The woman holding the flame wore a fiery red dress, and the blazing fire was compressed in her hands.

"Talent Sequence 122: Knight of Glory."

The first figure that was knocked away by He Ao was a well-proportioned man. He raised his hand, and a golden shield formed in his hand again.

"Talent Sequence 111: Terrorist,"

He Ao stood on the stairs, looking down at the three of them, "I think you should know some of my achievements. It seems that the conditions offered to you by the mysterious man are not bad."

"Kill you, and the boss will give us the secret medicine of these three talent sequences."

The Glory Knight pulled out a long sword from his waist and said, "There is no invincible C-level in this world."

"I like attractive men. If we met in a bar or dance club, we might have a nice night,"

The flame in the fire master's hand compressed into a blazing fireball, and the surging heat wave rippled the hem of her skirt. "It's a pity that here, I can only hope that your body will not cool down so quickly."

······

"Uncle Jess, did you encounter something over there? I seem to have heard something strange."

Vianna in the headset asked curiously.

······

He Ao reached out and turned off the microphone.

The fireball shot out from the fire master's hand, the blazing flames flew past He Ao's calm face, and the heat wave rolled up his hair.

"Smart switch control is successful and the port is being reopened. It is expected to be completed in 10 seconds."

Nearly 6,000 chapters, please vote at the beginning of the month


This chapter has been completed!
Previous Bookshelf directory Bookmark Next