Chapter 259: Intercontinental Communications
In the dimly lit room, where the Sprite, which had been half drunk last night, was still open, and the trash can next to the table was filled with empty bottles, a young man sat in front of the computer, his hands tapping quickly and skillfully on the keyboard. Pen @ fun @ pavilion wWw. ļ½ļ½ļ½Uļ½Eć InfoToday, Kevin doesn't plan to continue using UCLA's computer room computer to roam the virtual world because he has just bought a new IBM computer, which is much higher than the configuration in the school.
Speaking of which, Kevin has two things to thank IBM.
For one, IBM's stock price has plummeted a lot since it was caught up in the topic in March, and in order to recoup revenue, they have been rushing to launch a new computer that is very cost-effective. The price is close to the people, and the configuration is more advanced than any computer on the current market, so that the company's revenue in the current quarter has increased many times compared with before, and the losses caused by the low stock price have been recovered a lot.
Of course, IBM's business situation is not Kevin's interest, but this new computer is really good, and it is with it that Kevin can happily use it to play with IBM's second inspiration to himself.
That's right, all kinds of invasions!
In fact, Kevin was a veteran hacker many years ago, as early as 1978, when he was only 15 years old, he went around the North American air protection command system in a very boring way. Soon after, he entered the communications network system of the nationally renowned Pacific Telephone Company. Changed the number and mailing address of the company's computer users, including some well-known people. As a result, it caused a lot of losses to that company, which is really gratifying!
But this is just a simple adventure in pranks and idle and boring, until the entire IT world, and even the financial industry, broke out in this so-called "exchangegate" incident, Kevin suddenly realized that hacking can have such a terrifying power!
In recent times, Kevin has been guided by this line of thinking, with a very clear purpose, and has been specifically infiltrated into many important networks around the world.
A few months earlier, for example, he had been part of the Soviet Union's state network. You know, as early as when computers and the Internet first began to develop, this country has been following the footsteps of the United States, from imitating IBM's computer products to imitating AT&T to lay network infrastructure across the country, not only keeping up very tightly, but also surprising everyone, their product performance is really strong!
So, whether it's the interest in the Soviet network or the secrets hidden in this mysterious red country, Kevin can't help but be interested in finding out anyway.
With the example of the Soviet Union, the rest of the world, of course, is also under his "clutches". For example, MI6, for example, Eton College, one of the best secondary schools in the world, is like that existence that the whole world cannot forget, the Pentagon......
Thinking of the Pentagon, Kevin, who was typing, suddenly shuddered.
However, I don't know if it was the God in the dark who sensed Kevin's heart, and just as he was shivering, the computer screen full of English codes suddenly cleared.
Then, a line of green letters appeared in front of him.
Kevin's eyes widened.
"How are you, Kevin?"
A simple greeting, and then before Kevin could respond, the second sentence followed: "We met at the Pentagon, remember?"
It's really whatever you want!
Kevin's body was a little weak.
He looked at the Cisco router on his desk, and it stands to reason that it should have the ability to warn after its own modification. When an intruder from the Internet suddenly visits, it will definitely flash a red light to alarm.
Able to bypass the cybersecurity protocols he wrote......
I don't know what the other party thinks, and I am not in a hurry when I see that Kevin has not replied for a long time, as if he is sincerely giving him time to prepare mentally, and he will stop saying the second sentence.
Kevin was silent for a moment, then typed his first words: "Who are you, and why do you call me Kevin?"
The other party's reply arrived immediately, and sure enough, he had been waiting for him: "Since you have locked the IP address of the specific home, what is your real name, isn't it clear about the investigation?"
That's true, Kevin closed his eyes helplessly. As far as the Social Security Agency's network protection is concerned, it is completely defenseless for him, let alone this hacker who can hack into his computer?
Kevin typed, "You're a hacker too, aren't you? What are you looking for me? Is it just to come over and show off your skills?"
The other party quickly replied: "It is quite a remarkable achievement to be a hacker who has caused a headache for the Ministry of Defense in this day and age." Kevin, with your abilities, it would be a waste to just hang around the servers at will. Don't you think?"
Kevin blinked, he already understood what this mysterious visitor meant.
With a contemptuous smile on his lips, he replied, "You're a lobbyist sent by the Pentagon, right? You want me to work for the government? Let me be the Pentagon's cybersecurity adviser? Or just set up a bureau and want to arrest me?"
"Without further ado, I don't expect to gain your trust all at once. ā
The mysterious visitor doesn't hide his name, and every line is preceded by a colon to indicate "Neo's" name, but Kevin isn't fooled enough to think it's his real name.
"Talking to you this time has nothing to do with the Pentagon. Now I'm going to tell you, Kevin, you seem to have been hanging out in a mall near Eton College for a month, right?"
Is this the case?
Kevin couldn't help but laugh, how many years, how many years he had entered the computers of companies and institutions, and this was the first time that someone had been named and called to the door. He also thought that his first time would be explained to a large company or national power, but it turned out to be an ordinary shopping mall!?
He quickly replied: "Don't tell me that you are a girl named Alice Phil Lidzbellen, or her father, the ...... of the Federal Republic of Germany."
Just before the second sentence after entering the car was not finished, "Neo" spoke: "Presumably from the name, you can also hear that she is a little nobleman, it shouldn't be difficult to find me in this kind of relationship, right?" So Kevin, listen honestly, this mall called 'Alice' has been covered by me since today, if I find traces of you sneaking into their host, it won't be me who came to greet you today, but the FBI, no problem, right?"
"Of course, no problem, I'm just a little interested in the mall, and there's no reason why I can't let it go. ā
Kevin stared at the lines of chic green letters on the screen, and the corners of his mouth provoked an evil smile: "But Neo, I'm very interested in you now, so generously running into my computer, aren't you afraid of being tracked back by me?"
The other party did not answer immediately, as if he was frightened, and did not reply for half a minute.
Seeing that this "Neo" was dumb with only the last line of threats, and then looking at his latest statement, Kevin smiled more and more confidently, and typed: "Let me guess, you should be in the UK now, maybe in that shopping mall in Windsor Town? You are a student at Eton College? Oh my God, this really makes me feel honored, to actually fight with a highly educated man in the ever-changing cyberspace." I'll admit that you're very strong, but ......"
Knock down a "but" plus a line of ellipsis, and just as Kevin continued to bow his head to codeword, the screen interface suddenly changed.
Someone actually popped up the graphical user interface in the DOS interface!?
Kevin stared at the screen in a daze, and a counter-like pattern appeared in front of him, with a string of four-digit numbers written on it. And below this row of numbers, that row of numbers is......
"Bastard, my deposit account at Bank of America!?"
Kevin was going crazy and quickly typed, "Hey, bastard, you hacked into the Bank of America? You found my bank account? What are you going to do!?"
After typing this line and pressing enter, Kevin reluctantly found that the content he had just typed disappeared directly. The top and bottom of the entire screen are blank, with only the middle ground having that kind of picture.
No, not the picture.
The familiar four-digit deposit suddenly soared, as if it was deliberately stimulating Kevin's nerves, and the increase in money actually started with two decimal places. Single digits, then tens digits, then hundreds, then thousands...... Soon, if this was really Kevin's account deposit record in real time, then he suddenly had $50,000......
Keep rising.
Ninety thousand dollars.
When the numbers broke through to six figures, Kevin's heart twitched hard.
It seems that it is starting to play tricks again, when the deposit soars from a few thousand yuan all the way to 100,000, the growth rate has slowed down, but it is undoubtedly still growing at a rate of ten yuan per second.
Ten dollars a second, if this is a normal workplace job, how much is the monthly salary?
Just then, "Neo" reappears at the bottom of the screen.
"Kevin, this is a commission for you, if you help me develop a new product, the money I see now is just the tip of the iceberg. How's that, are you interested?"
Kevin stared cautiously at the screen, he had tried countless methods, but there seemed to be no other way to make fun of the image than to unplug the network cable, unplug the power supply, or press and hold the power button.
āā¦ā¦ Are you really sending me money?"
He stared at the counter, which was rising by ten yuan per second, and the corners of his mouth were smiling strangely as he typed.
"It's just a statistic now, but if the project is really successful, the income you will get is calculated in 100 million yuan. ā
Kevin swallowed hard and spit, his throat muscles highly contracted.
"Tell me, let me help you research something?"
"Neo" was silent for a moment.
Then, a line of green sentences appeared, causing Kevin to lean forward instantly.
"Ternary computers. (To be continued.) )