typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK976 Angel Council Base!

.

Li Jianguo, Wall Street. June 6th, 12:00 noon sharp.

Shi Lei stood opposite an inconspicuous building, with a strange smile on his face hidden by his baseball cap. Although the inconspicuous building in front of Shi Lei looked half inconspicuous on Wall Street, it was

It has a great background.

On the surface, this inconspicuous building belongs to the Wall Street Angel Fund Investment Management Company. However, secretly, this inconspicuous building is the New York stronghold of the Angel Council! At the same time, it is also the most powerful money-making tool in the hands of the Angel Council.

tool!

Angel Fund Investment Management Company has no reputation globally, not to mention on Wall Street. No reputation does not mean lack of strength. Angel Fund Investment Management Company is very powerful. Before Shi Lei was reborn, Angel Fund Investment Management

The company's profit the previous year reached 5 billion U.S. dollars. Even at that time, when converted into Xia Guoyuan, it was more than 30 billion U.S. dollars.

The Angel Fund Investment Management Company is directly affiliated with the top giant of the Angel Council, and the transfer of funds requires the permission of the top giant. However, any one of the four giants of the Angel Council can withdraw funds of less than US$100 million from the Angel Fund Investment Management Company.

Last time, Shi Lei investigated and found out that Rafael was in New York City, a country in the United States. Shi Lei guessed that Rafael was based at Angel Fund Investment Management Company. Shi Lei was going to say hello to Rafael, saying that he had found Rafael!

Of course, if he could kill Raphael, Shi Lei would kill him without hesitation. However, the headquarters of Angel Fund Investment Management Company looked unremarkable from the outside, but the internal defense was very tight. Shi Lei wanted to kill him.

Raphael, basically there is no chance.

Standing opposite the headquarters of the Angel Fund Investment Management Company, Shi Lei did not walk in immediately. Instead, he opened his laptop bag and took out a blank magnetic induction card and a work permit of the Angel Fund Investment Management Company. Hanging on

on his neck, and then asked through the Bluetooth headset: "Yizur, have you found the other party's network address?"

Shi Lei did not expect that Yizuer could invade the security system of the Angel Fund Investment Management Company's headquarters. The security system of the Angel Fund Investment Management Company's headquarters was written by the top leader of the Angel Council, and its defense strength was very impressive. According to the black magic software compiled by Shi Lei

, it is very difficult to open the security system of the headquarters of Angel Fund Investment Management Company!

"Sir, please wait a moment, we are searching the network address in reverse based on the actual address." Yi Zuer responded to Shi Lei.

Hackers usually query the real IP address in the online world, and then use the real IP address to investigate the real-life address. This process can also be performed in reverse. Through the real-life address, the network address is reversely queried.

Even if the network address is hidden, the real IP address can be found without any hindrance through reverse query of the real address!

Yizuer used the huge computing resources of the IWN secret network to promote black magic software and invaded the Internet service provider in New York City. Within the Internet service provider's server, he searched for a location matching the headquarters of the Angel Fund Investment Management Company.

Nearly a minute later, Yizuer finally found the matching information and reported: "Sir, the system has determined the target's network address."

A smile appeared on Shi Lei's face. He carried his laptop bag and walked outside Wall Street. After walking three hundred meters, Shi Lei found a roadside seat. He sat on a wooden chair and put his laptop in his bag.

I took out the computer, put it on my legs and started it up.

Yi Zuer could not complete the invasion of the Angel Fund Investment Management Company's defense system on his own. Shi Lei had to assist Yi Zuer to complete the invasion work together.

"Yizur, are you ready?" Shi Lei put his hands on the laptop keyboard. The location he chose was a bit remote, and there were not many pedestrians nearby.

Yi Zuer's cold and emotionless voice sounded in the Bluetooth headset, "Sir, Yi Zuer is at your service at any time!"

Shi Lei didn't say much. He directly used a brand new laptop, first connected to the IWN secret network, developed the laptop into a sub-terminal of the IWN secret network, and then used the IWN secret network sub-terminal to connect to the entire IWN secret network, gaining access to the IWN secret network.

Direct communication from Izual.

"Yizur, send the Internet address!" Shi Lei said through the Bluetooth headset, and Yizuer immediately sent the Internet address of the Angel Fund Investment Management Company.

Shi Lei controlled the computing resources of the entire IWN secret network and began to test the access control system of the Angel Fund Investment Management Company. The access control system is one of the Internet of Things systems. It is not connected to the Internet, but to the internal network of the building. Fortunately, the building

There are a large number of wireless networks in the internal network. Shi Lei can invade and enter the building's internal network through the wireless network. Otherwise, it will be more troublesome to crack the access control system.

"Raphael, I wonder if you are in there!" Shi Lei quickly put his hands on the keyboard, typing out lines of source code, and the smile on his face became wider and wider.

Nearly two minutes later, a sign of successful intrusion was displayed on the screen of Shi Lei's laptop. The access control system was cracked, and Shi Lei could use the blank radio frequency card he prepared to enter the headquarters of the Angel Fund Investment Management Company and open the relevant access control.

system.

The second thing that needs to be invaded is the monitoring system. The monitoring system of the Angel Fund Investment Management Company is a network security system. The number one giant in the Angel Council is too confident. He is so confident that no one can silently break through the monitoring system defense he designed.

.

Shi Lei analyzed the defense system of the surveillance system, and his expression changed a bit. The number one giant of the Angel Council was very mysterious and very powerful in terms of technology. Even Shi Lei now dare not say that he could definitely defeat the number one giant.

If Yizuer is added, Shi Lei can be sure to defeat the first giant.

The role of Yizuer, an advanced pseudo-artificial intelligence system, is very important to Shi Lei. When Yizuer handles basic tasks, it is countless times faster than Shi Lei. The release of this kind of basic operation tasks saves Shi Lei a lot of time.

time.

"Is it a defense system that uses a disordered random variable encryption algorithm?" Shi Lei showed a serious look on his face. This disordered random variable defense mechanism is even more advanced than the chaotic starry sky algorithm.

The chaotic starry sky algorithm is based on the law of starry sky changes. Hackers who are familiar with the chaotic starry sky algorithm may also be able to crack the chaotic starry sky algorithm with the help of powerful hardware performance.

The unordered random variable encryption algorithm is different!

The decryption scheme of the disordered random variable encryption algorithm may be any kind of rule, and may even be the same as the chaotic starry sky algorithm. However, it is not an easy task to write a disordered random variable encryption algorithm. The technology is not up to par

Programmers who want to forcibly write a disordered random variable encryption algorithm will only cause loopholes in the program itself, which will be quickly broken by hackers. Only very powerful programmers can write a disordered random variable encryption algorithm perfectly.

Flawless.

The defense of the surveillance system at the headquarters of the Angel Fund Investment Management Company is the flawless random variable encryption algorithm. Shi Lei showed a wry smile and whispered: "Yizur, gather all the computing resources of the IWN secret network!

"

The computing resources of the IWN secret network maintain more than 1000tflops at any time, but these resources are not concentrated together at all times, but are scattered throughout the IWN secret network system. When IWN secret network resources need to be used, Yizuer

Only then will these computing resources be sorted.

"Sir, the IWN secret network computing resource arrangement has been completed, and a total of 1173tflops of loose distributed computing resources have been concentrated." Yizuer prompted.

Shi Lei took a deep breath, adjusted the defense of the surveillance system at the headquarters of the Angel Fund Investment Management Company, and then controlled the concentrated computing resources of the IWN secret network to attack the system composed of disordered random variable encryption algorithms with lightning speed.

defense system.

The disordered random variable encryption algorithm can resist world-class hackers, and can also cause trouble to world-class hackers, making it impossible for them to invade silently. Although Shi Lei is also a world-class hacker, Shi Lei owns the IWN secret network.

It also has an advanced pseudo-artificial intelligence system Yizuer.

When all the advantages were brought together, Shi Lei had the possibility to break through the defense system of the disordered random variable encryption algorithm, and it was a silent breakthrough.

Shi Lei's hands pressed quickly on the laptop keyboard. Although the pressure in grams of the laptop keyboard did not meet Shi Lei's preference, Shi Lei's typing accuracy did not decrease at all.

About five minutes later, Shi Lei suddenly stopped and showed a sincere smile.

"It's a pity that you can't predict that I will have the strength six years later!" Shi Lei whispered to himself, and then entered a series of codes on the keyboard. The laptop on his lap, the cooling fan suddenly started to work crazily.

It spun and made a sharp whistling sound.

The laptop's hard drive automatically low-level formatted repeatedly, and the power supply module constantly adjusted the voltage and current. Shi Lei placed the laptop on a wooden chair, and a pungent burnt smell came out from under the laptop's keyboard.

, and there was also vague smoke.

After waiting for a while, when the laptop was completely damaged, Shi Lei put the damaged laptop into his laptop bag, stood up and walked towards the headquarters of Angel Fund Investment Management Company. When passing by a trash can, Shi Lei put the damaged laptop into his laptop bag.

The laptop bag was thrown in together with the computer.

After throwing away his laptop bag, Shi Lei tidied up his appearance, wore an Angel Fund Investment Management Company badge on his chest, and walked towards the inconspicuous building belonging to the Angel Fund Investment Management Company.

The access control system and monitoring system of the entire building are completely in the hands of Shi Lei, which means that Shi Lei can enter and exit freely at will, and he does not have to worry about being recorded by the camera...

.

PS:AutomaticUpdate


This chapter has been completed!
Previous Bookshelf directory Bookmark Next