Chapter 67: The Most Dangerous Hacker

Thomson Carter, the captain of Citigroup's cyber warfare unit, has been very talented in computer and network technology since he was a child. Pen Fun Pavilion wWw. biquge。 info

When he was 16 years old, he hacked into the computer host of Citi's military's air defense command system, rummaged through information on Citigroup's nuclear warheads pointed at other countries, and then quietly slipped away. After a long time, the Citigroup military found some traces, and they were immediately very nervous.

It took a number of similar incidents before the Citi government realized Thomson's existence and considered it dangerous.

In order to seize the information of Toms's hacking crimes, Citigroup's internal security department even spared a lot of money to bribe his important friend and encourage him to hack into a computer host that had been prepared for a long time.

Thomson was fooled, but when he invaded the target host, he found out that it was a trap and escaped before the pursuit warrant of Citigroup's internal security department was issued!

On the way to escape, he also took control of the local computer system many times, learned all the information about his pursuit, and even gave misleading information through the computer system, so that the pursuit of the security department was in vain many times.

After more than a year on the run, the security department dispatched a number of super hackers to assist, and by chance, they happened to catch Thomson. Immediately, Thomson was specially recruited into the military's cybersecurity force and became a super hacker in the Citigroup military.

After years of hard work, he was successfully promoted to the captain of Citigroup's cyber warfare unit by virtue of his outstanding skills and exploits in cyber warfare.

Thomson's hacking skills are very good, and he is relatively high among super hackers in the world, but he is not the first in the world.

By chance, Thomson had a flash of inspiration, and he actually took this inspiration as an opportunity to develop another programming language and system, and this system can also be connected with the systems currently in use in the world.

Using this language and system, he built a website in the name of Stranger to lure super hackers from other countries to attack, so as to obtain information about the location of super hackers around the world.

Because the website was built in a unique language and system that he had developed, and other super hackers didn't understand it, he was very confident that no one would be able to break into his website.

After more than half a month of testing, as he expected, no one could break through his defenses. But it's a pity that the super hackers of Huaxia Kingdom, one of Citigroup's main enemies, have been very restrained and have never chosen to participate in the attack.

In order to lure out the super hackers of Huaxia Kingdom, Thomson put the broken flag of Huaxia Kingdom and a middle finger pattern on the website, with his understanding of the mentality of Huaxia people, they will definitely not be able to bear it.

Sure enough, as he expected, the "Wei Yang" in the Huaxia super hacker "12 Zodiac Meeting" made a move and was defeated by him.

After defeating "Wei Yang", Thomson and his men cheered and finally defeated the super hackers of Huaxia, for which they also held a small celebration party with champagne.

At the celebration meeting, Thomson happily shouted: "After defeating most of the super hackers in Huaxia, the cyber combat unit will hold a grand and grand cocktail party to celebrate!"

With great fanfare, the results of defeating "Wei Yang" were put on the Internet, and Thomson and his subordinates waited for more Huaxia super hackers to arrive.

It really made them wait!, however, it was completely different from what they expected.

First of all, Thomson, who operated the Stranger account, found that this account with the highest level of authority was actually kicked out of the network system in front of him.

I tried to log in again, but I found that I couldn't log in anyway. Try it immediately with the reserved other accounts, but you can't log in either.

Inexplicably, Thomson and his cyber warfare forces lost all control of the website!

The matter was not over, and after a while, the damaged Chinese flag and middle finger pattern on the website were removed.

This is not surprising, since the other party controls the URL, of course it is easy to do, but it is more clear that the other party is a super hacker of Huaxia.

Thomson couldn't figure out how the other side could break through his website and defenses. He's been operating the super-admin Stranger account online, keeping an eye on the URL's every move, and he's pretty sure he hasn't been attacked by the program, but his opponent has quietly seized control.

Before he could figure it out, the URL had changed again, and what made him even more unbelievable was that the pictures and IP addresses of himself and his subordinates when they were just working in the cyber war room were put on the Internet!

Obviously, this is the other party hacked into the computer in front of him, and used the camera to take a photo unconsciously, and he also found out where he and the others were!

In front of this mysterious enemy, their Citigroup's cyber combat troops were as naked as if the other party had seen everything, and he, Thomson, was unaware of this! An unprecedented sense of humiliation rose from the bottom of his heart, and no one had ever crushed himself like this in hacking technology!

Could it be that the technology of the first hacker in China, "Chenlong", is so powerful to the point of being incredible?

Just as he was sighing, two video screens appeared on the website, which shocked him even more.

One is the real-time video of the network war room, which puts their real-time scenes on it, although I think it is very unpleasant, but it is not scary.

But the other video is not simple, it can be seen that it is a real-time video of an unmanned attack aircraft. He has seen a lot of similar videos, especially during the war in the desert oil country area, these unmanned attack aircraft can take down a lot of enemy troops.

To his death, the video scene taken by this unmanned attack aircraft was very familiar, although it was at night, it could still be seen that it was less than five kilometers away, and its flight direction was where his network combat unit was!

Calculated by the distance and the speed of the drone, the attack arrived only a few tens of seconds later, and Thomson shouted, "Get out of here!"

"But, our information?" said another team member, who didn't know much about the drone and didn't realize his current situation for a while.

"Hurry up, don't want anything, hurry!" Before he could explain, Thomson pulled his team members and rushed out the door!

The embarrassing scene of Citigroup's cyber warfare troops was broadcast live on the website, and hackers around the world enjoyed it.

As soon as Thomson and the others walked out of the room a few dozen meters, the house they were in appeared in the drone video, and a missile ejected from the drone and ignited, whistling towards the target house.

With an earth-shattering bang, a small mushroom cloud rose, and Citigroup's cyber war room was reduced to a wrecked brick in the explosion!

Because the server was blown up, the web page was no longer accessible at the same time, but hackers all over the world saw this stunned scene, and kept thinking of the sentence "Those who commit crimes against China will be punished even if they are far away!"

And the mysterious Chinese super hacker "Qin Jian Walks the World" has also entered the field of vision of hackers all over the world, and even many people secretly believe that he is the world's number one hacker!

Without saying a word, they can control Citigroup's military drones to attack Citigroup's cyber combat troops! Such a miraculous achievement is simply incredible!

And the governments of various countries have directly included "the sword in the world" in the list of the most dangerous hackers!