The Goddess Shines on America

Chapter 238: , Hand speed is good, do you often hit?

In a nutshell, customers are dissatisfied with the speed of the merchant's supply.

In fact, from the perspective of the general efficiency of the industry, it is difficult for a company to develop a new product that no one has developed in the entire industry within three months.

But why did everyone encounter two major events in a row? The front-foot IBM just invaded the Nasdaq with a big fanfare, and then the Pentagon let a personal hacker wander around. If you were any one, you would definitely be eager for Alice the next day. Just hand over the firewall technology?

"Our company's current main dilemma is insufficient manpower."

Speaking half-truths, Alice stared at the FBI and NSA chiefs present here like two fat sheep: "Because the scale is expanded too fast, the company building has long been crowded. Think about it. , A total of only five or six floors of office building, the floor area is not particularly large, not only to be packed with 200 employees, but also to have a machine room, there is also a dining hall, but also to vacate the reception room for the guests. Under the premise that the number of personnel cannot be increased, I have been as fast as possible."

When she said these words, Alice put her heart in her heart.

As she said, the contemplative expressions of the two directors implied.

The network security protocol, and the development of a new product called the firewall as a finished product, is the fuse of the network security crisis caused by the IBM incident. Except for the industry leader Cisco, the country is long and wind. ♂ww.cfw↙xn¤et’s family can’t rest assured to hand over the work to other companies, such as a certain Lucent technology behind Cisco’s ass.

Therefore, even if Alice is frankly understaffed, the two directors can never move the project to other people, which is different from the relationship between the Ministry of Defense and its arms contractors. Whether it is Alice's talent or Cisco's unique strength at this time, they can only choose this one to buy and sell.

Of course, the most critical question is, after all, this is only three months, isn’t it?

"Insufficient staff, insufficient office space, then expand and recruit again!"

In the end, Dominic categorically said: "Network information security, this battle without gunpowder smoke will only get more and more intense, Alice, I will provide you with another 10 million US dollars in research funds. Expand the site, expand the recruitment of employees, what should I do? Whatever you want, I'll wait for the result!"

"That's really an honor!"

In this way, Alice shook hands with Dominic with a big smile: "I promise to deliver the product to you within this year, don't worry!"

The problem in Washington seems to have been resolved. Of course, the two directors are very expensive, and their office is not in the Pentagon. After talking with Alice, they naturally went back to each house to find their own mothers. Two dark commercial vehicles, carrying two big men who defend the country in different fields, drove toward their territory.

"Hey, it's really amazing, these guys."

Alice strolled out of the area where the Pentagon was located. It wasn't very far from the airport, just to see a plane heading for the sky, I didn't know where it was going.

"The owner who hires people forwards and does not have people backwards. When asked me to call the hacker's location, the airport shuttle bus took me to the Pentagon. Now that I have given the general location, why did I ask me to take a taxi home?"

Someone apparently ignored the fact that she didn't have special plane transfers. After slipping onto a more prosperous road, she waved to stop a taxi.

"Driver, find me a large hotel connected to the Internet!"

"Okay, please sit firmly!"

The time difference is about two hours.

The University of Southern California, Los Angeles, was established in 1880. It is the oldest private research university on the West Coast of the United States. It ranks in the top 50 in the world and is ranked as one of the most difficult universities in the United States for undergraduate admission.

Of course, such a university will inevitably have a computer room, and as much as Stanford and Caltech, many students have the habit of hanging around here.

Of course, such a so-called chaos is also filled with sophisticated programming and web surfing.

Kevin Mitnick was sitting in front of one of the computers, cold sweat oozing from his forehead.

At this moment, just in front of his computer, a line of English was displayed.

"Hello, Kevin, did you have a good time with me?"

Looking at this line of dark-green fonts, Kevin realized with a panic that his always dexterous fingers were so stiff that he couldn't even type a word.

This is simply a nightmare.

For many years, he was able to successfully invade the North American air defense command system as early as 15 years old. At that time, he only relied on a computer and a modem. Later, I even entered the communication network system of the Pacific Telephone Company to modify data wantonly. When was it not arbitrarily?

Even what he just did, hacking into the central computer of the Pentagon, was something he did once as early as three years ago. Although he was sentenced to six months in the youth correctional facility in California because his skills were not superb at the time, he was absolutely confident that after three years, he was absolutely confident that the Pentagon's rice bucket would no longer be a hindrance!

So, what is the situation?

After the sentence on the screen appeared, it didn't mean to urge, just relying on that sentence, it flashed in front of Kevin silently.

"call……"

After stiffening for a while, Kevin's body softened.

Then, as if he had a clear heart, the hacker on the opposite side sent him a second greeting in due course.

"Your hand is very fast, do you use it often?"

What do you mean?

Kevin didn't understand a bit.

How often do I fly?

Not understanding what this hacker meant, he decided to follow the other party's rhythm first.

He answered honestly: "I rarely fly."

Then, there was a long silence on the other side.

Then, a line of letters appeared again: "Do you know what happened just now?"

Kevin knew what the other party meant. When he invaded the Pentagon, he received a strong counterattack. Two hours later, a mysterious hacker suddenly broke into the computer without his permission. It was obvious.

"Were you fighting me just now? When did the Pentagon have such a great programmer? Or are you their foreign aid?"

When writing these words, Kevin felt nervous.

Only he...no, the person in front of him should also know what the situation was like just now.

Just a little bit, the other party can get his own IP address, and Kevin knows very well that the other party is really only one thought away from the doorstep. Because he was using the computer in the computer room of the University of Southern California, and the other party's last point was only to lock his specific seat.

Is the last step really difficult?

When he saw this line of words, Kevin knew that he had lost, until the opponent could return quietly after deliberately withdrawing, and quietly breached the last point of defense of the computer.

He quickly wrote another sentence: "Are you posing to the Pentagon just now?"

This is the truth that Kevin immediately guessed.

Sure enough, the other party quickly replied: "Thank me, boy, I saved your fragile life!"

Well, the other party must be a guy with strong abstract thinking.

After confirming that the other party was not malicious, Kevin suddenly became excited.

"What is your nickname? I have never seen a master like you before. I always thought I was good enough. You are more than a hundred times stronger than me!"

He looked at the sentence left by the other party excitedly, and then the screen flashed, and the English sentence that had started directly had a name plus a colon at the beginning.

Then there was another sentence.

Neo: This is my code name.

Kevin moved his finger, he knew that the other party must be a very personal guy: "Neo? Why is it such a name?"

Neo: Actually I plan to name myself Trinity, but after thinking about it, it's cooler to be the savior of mankind.

Kevin's eyes were so big.

"You are a girl!?"

When he finished typing this sentence, he excitedly let out a cry of ghost and wolf howling!

"Wow~~~~!"

"Hey, idiot, what is the wolf howling!?"

"You convulsions!?"

"Scared me to death!?"

"Sorry, sorry~"

Kevin waved around the computer room leisurely, and many people were frightened by his voice.

Then, I saw Neo on the screen speaking.

"Allow you to imagine me as a beautiful woman with a hot body, and slap it."

After typing this sentence, the next sentence came out immediately.

"Or chat love love?"

Good guy, it's hot enough.

Kevin realized speechlessly that with just these two sentences, he actually reacted a little bit.

Damn, little Kevin, you have to live up to it!

Little Kevin is indeed very competitive, it did not make the big Kevin lose his mind. Years of hacking experience made him come back to his senses after being slightly stimulated, and then looked around cautiously.

Yes, although there is no monitor on my own computer, the monitoring probe in the computer room is working on the side of my body.

The probe can't see the content on the display, but if you really hit it, and the other party happens to control it, then it will be lively...

Then, just as he looked at the monitor, Neo spoke again.

"Oh~ It seems that you have discovered my little secret... Left~www.readwn.com~ A "LEFT" is displayed at the end of the sentence.

Then Kevin simultaneously noticed that the surveillance probe he was staring at turned to the left as expected.

"my Lord……"

It’s a risk, it’s a risk. Kevin kept touching his chest. It’s a risk. He withstood the temptation. He didn’t chat with the so-called Neo who was planning to call himself Trinity. Otherwise...

"Hey, man, this is your school computer room?"

Just as Kevin was screaming, two students chatted and walked in.

"That's right, and our computer room is still using Cisco hardware equipment, which is a hundred times more advanced than your school!"

"Haha, then I have to try it quickly."

While chatting, the two students sat in front of two computers and pressed buttons eagerly. (To be continued.)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like