Daily Updates!
Stay informed of NEWEST chapters of HacKer (updated) with notification directly sent to your email.
LOG IN
Wo Sang Nation Foreign Ministry International Intelligence Agency tracing Specialist, after pursuing Hacker Union's Server, immediately has stopped. They treated as Hacker Union's Core Member Shi Lei obviously, Shi Lei's have shifted blame very successfully!
Traced Specialist also merely to stop the moment, the colleague who contact was expert in the invasion attack, assisted to attack Hacker Union's Server together.
Wo Sang Nation Asahi News, Yomiuri News, controls in Hacker Union's two trio. In Hacker Union internal voice channel, [Black Blade] is having a happy expression: „brothers, we can the breathing heavily one breath, Foreign Ministry International Intelligence Agency that group of grandsons, be directed by [Lucifer] that Great God. Does not know whether [Lucifer] can escape finally!”
Alliance Second-In-Command, is Little Group Head [Black Tiger] opens the mouth saying: „Boss, the strength that shows from [Lucifer], he should be able to escape tracing with ease!”
[Black Panther] approves the person of same belief: „Second Brother said right, strength that [Lucifer] shows, was too formidable! NHK Official web page Defensive Power, was pierced by him like a white paper unexpectedly. NHK internal Security Department, absolutely does not have any means!”
„Boss, is not good!” [Black Gun] opens the mouth to say suddenly that „Boss, our Server encounter attack, doubting is the Foreign Ministry International Intelligence Agency grandson!”
„Anything!” [Black Blade] has called out in alarm one, „what's the matter! We simply have not provoked Foreign Ministry International Intelligence Agency, moreover weren't they trace [Lucifer]?”
[Black Panther] in the heart has not a good feeling, „Boss, you said that can be [Lucifer], shifted blame to us?”
[Black Gun] shouts greatly: „Boss, the Second Brother, [Black Hand], returns to base together! Our Little Group soon could not block!”
„All people return to base! Damn [Lucifer]!” [Black Blade] anger snort|hum. Hacker Union seven Core Member outside, gave up their Task immediately, is bringing own Zombie, returns to Hacker Union's Server to return to base.
A [Black Wolf] in the heart distortion, one name named hatred thing, multiplied in his in the heart slowly, his in the heart sent out angry roaring: [Lucifer], is you! I must hold you, I must retaliate you!
Foreign Ministry International Intelligence Agency, through NHK Television Station, has issued the urgent news note. They only announced merely a news, invades NHK Nation(s) Television Station Hacker, doubting is the Hacker Union Core Member behavior. At present their tracing Specialist, currently encircles Hacker Union's Server strictly, once they broke through Hacker Union's Server, then all will reveal the truth.
Sits in front of Number One Server, Shi Lei hēi hēi badly smiles looks at Hacker Union and Wo Sang Nation Foreign Ministry International Intelligence Agency, takes Hacker Union's Internal Server as the battlefield, hits life and death!
The Wo Sang Nation Foreign Ministry International Intelligence Agency strength, most only showed 1/10, Hacker Union can also withstand, Shi Lei has not managed them temporarily, he also had more important target.
After the Second step frames by planting stolen goods on Task accomplish that shifts blame, Shi Lei starts implement Third step plan, invades Canon!
This Xia Nation Hacker greatly noisy Wo Sang Nation program, most basic blasting fuse exactly as stated Canon, Canon Koinu Ichiro. If Koinu Ichiro has not exposed Shi Lei, Shi Lei will not whip up the Cyber War struggle that adds fuel to the flames in the back.
Although loss of Wo Sang Nation already very serious, but Shi Lei has not satisfied. As Canon of blasting fuse, has not received any injury unexpectedly, this satirized simply!
Shi Lei connects Supercomputer [Swallow], Access Company First Grade Zombie, two formidable Zombie performance syntheses, killing of sneakily has approached Canon.
Shi Lei's target is Canon Company Technical Information, especially optical device, as well as Digital Camera Technical Information. Although Shi Lei does not like Wo Sang Nation Little 'Devil', but has to acknowledge that Canon Company in the Digital Camera domain, is in World leading status.
If can invade Canon Company, gains Technical Information of Canon Company research and development department, that was developed!
The main computer of Canon Company research and development department, similarly is Supercomputer, and estimated performance Extremely Advanced, has almost achieved Supercomputer [Swallow] one-fifth, is listed at Worldwide Supercomputer Ranked more than 300.
Such formidable Supercomputer, wants to invade very difficultly. Even if in Shi Lei is controlling Worldwide Ranked Ninth Supercomputer [Swallow], has the difficulty very!
Reason that High-tech secret technology Industry, telecommunication Industry, financial Industry, these giant oligarchs like Supercomputer, that exactly as stated because of Supercomputer Safety!
Shi Lei is controlling Supercomputer [Swallow], paces back and forth in Canon Company Official Website, has not invaded immediately. He is seeking for the most appropriate opportunity, seeks for the Canon Company Security Defense neutral gear.
From Canon Company Official Website, Shi Lei entered Canon Company human resources department Server carefully, seeks for human affairs data of research and development department in human resources department Server.
Before Hacker invasion, needs to be fully prepared, deals to arise suddenly * the situation that will not be thrown into confusion. Canon Company Tokyo City Headquarters, altogether has to research and develop the personnel Three Thousand many people, they distribute in Tokyo City each research institute.
In these research, is storing up research data of correspondence, but Canon Company Headquarters research and development department main computer, stores up is researching and developing data. Just, the research and development department main computer, was being protected very strictly, wants to enter the research and development department main computer, is not simple!
Shi Lei is searching data of research and development department in the human resources department, then the corners of the mouth revealed have wiped the smiling face. Xia Nation has a slang, stable defense, often collapses from the inside!
Canon Company foreign defense is very indeed formidable, even can say that perverted described, absolutely is not defense that NHK Television Station Official Website that type of paper sticks!
What a pity, so formidable Defense System, the weakness, that is internal defense is similarly insufficient! Shi Lei in Server of human resources department, looked up Canon Headquarters, research and development department identity of several Researcher High Grade. Has invaded then internal completely Defense System, from internal Security Defense System, after having intercepted the account number and password of that several Researcher High Grade, then bypassed the defense system of Canon Company, enters to Internal System of research and development department.
Internal System of Canon Company research and development department, according to authority of that several Researcher High Grade Shi Lei assembles, is unable to gain them to study beside data information, but Shi Lei is Hacker!
Shi Lei has gone round the System authentication secretly, uses the System authorization flaw, sneakily to the authority temporary weighting of Researcher High Grade, permits Researcher High Grade temporarily, pulls and reads other research projects data.
The Supercomputer [Swallow] operational capability, has surpassed Supercomputer of research and development department, both sides fiercely are resisting, System is authorized flaw under the protection of Supercomputer [Swallow] , to continue to become effective.
Shi Lei inputs code on the keyboard hastily, in the retrieve research and development department, research about Optics Technology, Digital Camera related technology. The condition screens under restriction(s), has rejected numerous about the medical equipment of duplicator, fax machine and so on technology, only leaves behind the Digital Camera technology and Optics Technology that Shi Lei has needed.
Document data size that even if merely only remaining Optics Technology and Digital Camera technology, System counts, has surpassed 200 gb!
Canon Company Supercomputer, strict restriction(s) flowing of data, although Shi Lei draws support from Supercomputer [Swallow] now, can examine these data with ease, but does not have the means to take away. Because of Canon Company Supercomputer, once examines to have the data external connectivity to flow, will then sound the warning!
Shi Lei looks that surpassed 200 gb data to worry, these data completely were the Gold Mountain silver ore, if did not move out, Shi Lei was not absolutely willingly. Where has to enter the truth that Treasure Mountain actually returns empty-handed?
How Canon Company Supercomputer, there is strict data flow to move restriction(s). This restriction(s) origin in the hardware equipment, wants to suspend it through software, will only cause the warning!
Shi Lei scratches the head, even if at this moment gives him the photographic memory super power, will want to surpass 200 gb data to look, perhaps will spend for several months! Let alone does not have the ability of photographic memory, where has the time to go to him?
„What to do should!” Shi Lei looks at the computer screen, thought aloud.
Suddenly, Shi Lei thinks that a story, about the story that a child deceived people. This story spreads broadly in Xia Nation, what said was the wolf came the story!
Shi Lei decided used the wolf to come the story, probed Canon Company internal Security Department. He is controlling Supercomputer [Swallow], in Supercomputer of Canon Company research and development department, has manufactured a Virtual data package. Then this Virtual data package, transmits randomly outward.
Canon Company interior Security Department, had discovered immediately research and development department Supercomputer, currently transmits data outward, they go into action immediately, closely monitors Supercomputer, the discovery simply does not have any data flow to leave.
High Degree vigilant Canon Company interior Security Department, does not lose heart investigates thoroughly entire Supercomputer, has not actually discovered any issue, but finally gives up.
After they give up, Shi Lei promoted Virtual data package of volumes, rose it to the 10 gb size, then once again transmits data outward randomly.
Huge data flow, lets Canon Company interior Security Department, has sounded the Crazy warning, flow monitoring hardware Reporting System, counts the data quantity to have the 10 gb size fully, but after internal Security Department involves investigate, had not discovered slightly. Supercomputer of research and development department, without any exceptionally, internal data any has not lost, does not have any trace of duplication.
Waits for Canon Company interior Security Department, after lax was slightly little, Shi Lei once more Virtual data package of volumes, promoted to 100 gb, and establishes one to transmit data randomly.
The hardware warning of flow monitoring, Canon Company interior Security Department, investigated thoroughly Supercomputer of research and development department again, as well as research data data in Supercomputer. Just, these current capacities all are Shi Lei structure Virtual data, simply has not left any trace. Canon Company internal Security Department, how can also find out issue?
Repeatedly after more than ten times, Canon Company interior Security Department also did to be sick, after flow monitoring hardware sent out the warning, they did not inspect the inspection unexpectedly.
Shi Lei knows that the opportunity came!
( To be continued. If you like this work, welcome you to come 138 reading literature registered member to recommend this work, your support, is I biggest power.)
Enter your email address that you used to register. We'll send you an email with detailed steps to reset your password.
By signing up, you agree to our Terms of Service and Privacy Policy.
Already a member? Log In
Stay informed of NEWEST chapters of HacKer (updated) with notification directly sent to your email.