HK976 Angel Council Stronghold!

. Liberty Country, Wall Street. June 6, 12 o'clock sharp.

Shi Lei stood opposite an inconspicuous building, with a strange smile on his face covered by a baseball cap. In front of Shi Lei, this inconspicuous building, although it looks half inconspicuous on Wall Street, has a lot of origins.

On the surface, this humble building belongs to the Wall Street Angel Fund Investment Management Company. However, secretly, this inconspicuous building is the New York stronghold of the Angel Council! At the same time, it is also the most powerful tool for collecting money in the hands of the Angel Council!

Angel fund investment management companies, not to mention that they have no reputation in the world, even on Wall Street. No fame does not mean no strength, and the strength of angel fund investment management companies is very strong. Before Shi Lei's rebirth, the profit of the angel fund investment management company in the previous year reached 5 billion US dollars, and even at that time, it was more than 30 billion yuan when converted into Xia Guoyuan.

Angel Fund Investment Management Company is directly under the first giant of the Angel Council, and the transfer of funds needs the permission of the first giant. However, any one of the four giants of the Angel Council can withdraw less than $100 million in funds at the angel fund investment management company.

Last time, Shi Lei investigated Rafael in New York City, and Shi Lei guessed that Raphael was based in Angel Fund Investment Management Company. Shi Lei was ready to say hello to Raphael, indicating that he had found Raphael!

Of course, if he can kill Raphael, Shi Lei will not hesitate to kill Raphael. It's just that the headquarters of the angel fund investment management company looks inconspicuous from the outside, but the internal defense is very tight. Shi Lei wants to kill Raphael, and basically has no chance.

Standing opposite the headquarters of the angel fund investment management company, Shi Lei did not walk in immediately. Instead, he opened the laptop bag, took out a blank induction magnetic card in it, and a work card of an angel fund investment management company, hung it around his neck, and then asked through the Bluetooth headset: "Yi Zuer, have you found the other party's network address?" ”

Shi Lei did not expect that Yi Shuer could hack into the security system of the headquarters of the angel fund investment management company, and the security system of the headquarters of the angel fund investment management company was written by the first giant of the angel council, and the defense strength was very considerable. According to the black magic software written by Shi Lei, he wants to open the security system of the headquarters of the angel fund investment management company. The difficulty is very high!

"Sir, please later, the network address is being reverse-searched based on the real address." Yi Shuer responded to Shi Lei.

Hackers usually look up real IP addresses in the cyber world, and then pass through real IP addresses. And investigate the address in reality. This process can also be performed in reverse, through real-world addresses. Reverse query to the network address.

Even if the network address is hidden. Through the reverse query of the real address, the real IP address can also be found without barriers!

With the huge computing resources of IWN, Yishuer promoted the black magic software, invaded the network service provider in New York City, and searched for the location that matched the headquarters of the angel fund investment management company inside the network service provider's server.

Nearly a minute later. Yi Zuer finally found the matching information and reported: "Sir, the system has determined the target's network address. ”

Shi Lei had a smile on his face and carried his laptop bag. Walking outside Wall Street, after walking 300 meters, Shi Lei found a roadside seat, he sat on a wooden chair, took out the laptop in the computer bag, put it on his lap and started it on.

Yi Zuer could not independently complete the invasion of the angel fund investment management company's defense system, and Shi Lei had to assist Yi Zuer to complete this invasion work together.

"Are you ready?" Shi Lei put his hands on the notebook keyboard, and the location he chose was a bit remote, and there were no pedestrians nearby.

Yishuer's cold and emotionless voice sounded in the Bluetooth headset, "Sir, Yishuer is here to serve you!" ”

Shi Lei didn't say much, he directly used the new laptop, first connected to the IWN secret network, developed the notebook into the sub-end of the IWN secret network, and then connected to the entire IWN secret network with the sub-end of the IWN secret network, and obtained direct communication with Yishuer.

"Yi Zuer, send me the network address!" Shi Lei said through the Bluetooth headset, and Yi Shuer immediately sent the Internet address of the angel fund investment management company.

Shi Lei controlled the computing resources of the entire IWN secret network and began to test the access control system of the angel fund investment management company. The access control system is one of the Internet of Things systems, which is not connected to the Internet, but to the internal network of the building. Fortunately, there are a large number of wireless networks in the internal network of the building, and Shi Lei can invade into the internal network of the building through the wireless network. Otherwise, it will be more troublesome to crack the access control system.

'Raphael, I wonder if you're in there!' Shi Lei quickly put his hands on the keyboard, typing lines of source code, and the smile on his face became more and more vigorous.

Nearly two minutes later, Shi Lei's laptop screen showed a mark of successful invasion. After the access control system is cracked, Shi Lei can use the blank radio frequency card he prepared to enter the headquarters of the angel fund investment management company and open the relevant access control system.

The second thing that needs to be hacked is the surveillance system. The monitoring system of the angel fund investment management company is a network security system, and the first giant of the angel council is too confident, so confident that no one can silently break through the defense of the monitoring system he designed.

Shi Lei analyzed the defense system of the monitoring system, his face changed a little, the first giant of the Angel Council is very mysterious, and the strength of the technique is very strong, even if it is Shi Lei now, he does not dare to say that he will win the first giant. If Yi Zuer is added, Shi Lei will be sure to defeat the first giant.

The role of this advanced pseudo-artificial intelligence system is very important to Shi Lei. When dealing with basic tasks, Yi Zuer's speed surpassed Shi Lei countless times. The release of this basic operation task saved Shi Lei a lot of time.

'Is there a defense system with an out-of-order random variable encryption algorithm?' Shi Lei showed a serious look on his face, this kind of disordered random variable defense mechanism is even a little more advanced than the Chaos Starry Sky algorithm.

The Chaos Star Algorithm is based on the law of starry sky changes, and hackers who are familiar with the Chaos Starry Sky algorithm may also use powerful hardware performance to crack the Chaos Starry Sky algorithm.

The out-of-order random variable encryption algorithm is different!

The decryption scheme of the disordered random variable encryption algorithm may be any kind of rule, and may even be the same as the chaotic star algorithm. However, it is not easy to write an out-of-order random variable encryption algorithm. Programmers who are not skilled enough to forcibly write an out-of-order random variable encryption algorithm will only make the program itself vulnerable, which can be quickly broken by hackers. Only a very strong programmer can write the out-of-order random variable encryption algorithm flawlessly.

The defense of the monitoring system at the headquarters of the angel fund investment management company is the flawless random variable encryption algorithm. Shi Lei showed a wry smile on his face, and said in a low voice: "Yi Shuer, gather all the computing resources of the IWN secret network!" ”

The computing resources of IWN Secret Network are maintained to the extent of more than 1000 tflops at any time, but these resources are not centralized at any time, but are scattered within the entire IWN secret network system. When it is necessary to use IWN secret network resources, these computing resources will be sorted.

"Sir, IWN secret network computing resources have been arranged, and a total of 1173tflops loose distributed computing resources have been concentrated." Eater prompted.

Shi Lei took a deep breath, adjusted the defense of the monitoring system at the headquarters of the angel fund investment management company, and then controlled the computing resources concentrated on the IWN secret network, and attacked the defense system composed of disordered random variable encryption algorithms with lightning speed.

The disordered random variable encryption algorithm can resist hackers at the level of the world, and it can also cause trouble to hackers at the peak level of the world, so that it is impossible for them to invade silently. Although Shi Lei is also a top-level hacker in the world, Shi Lei has an IWN secret network and an advanced pseudo-artificial intelligence system.

When all the advantages are concentrated, Shi Lei has the possibility of breaking through the defense system of disordered random variable encryption algorithms, and it is a silent breakthrough.

Shi Lei's hands quickly pressed on the notebook keyboard, although the pressure grams of the notebook keyboard did not match the data that Shi Lei liked, but Shi Lei's typing accuracy did not decrease at all.

After about five minutes, Shi Lei suddenly stopped, and he showed a sincere smile.

"It's a pity, you can't predict that I have the strength in six years!" Shi Lei muttered to himself in a low voice, and then entered a series of codes on the keyboard, and the laptop on his lap, the cooling fan suddenly spun wildly, making a sharp whistling sound.

The hard disk of the notebook is automatically formatted at a low level repeatedly, and the power supply module constantly adjusts the voltage and current. Shi Lei placed the laptop on a wooden chair, and under the keyboard of the laptop, a pungent smell of burnt fire came out, and there was a faint smoke that was faintly visible.

After waiting for a while, when the laptop was completely destroyed, Shi Lei put the damaged laptop into the notebook handbag, stood up and walked towards the headquarters of the angel fund investment management company. When passing by a trash can, Shi Lei threw his notebook and handbag into it along with his computer.

After throwing away his notebook handbag, Shi Lei tidied up his appearance, wore a work card of an angel fund investment management company on his chest, and walked to the inconspicuous building that belonged to the angel fund investment management company.

The access control system and monitoring system of the entire building are completely in the hands of Shi Lei, which means that Shi Lei can enter and exit freely at will, and he does not have to worry about being recorded by the camera....

(To be continued......)

PS:AutomaticUpdate