HK1597 The Enemy's Advantage!
.
In the distant country of Lijian, it was less than eight o'clock in the morning on March 4th.
A certain mysterious apartment, which Thomson David was checking, but he underestimated the defense of the outside member forum, and Thomson David could not enter it at all!
"Damn it!" As time went by, the anger in Thomson David's heart became stronger and stronger. He was about to be unable to bear it and was ready to report the organization's affairs to the NSA National Security Bureau.
However, just as Thomson David was hesitating, a dialog box popped up on the computer screen in front of Thomson David.
‘Do you want to deal with the organization? ’
Thomson David looked at the dialog box on the computer screen in shock, and his already depressed mood became even more depressed. Because this dialog box represents Thomson David's computer, which has been hacked!
The world's top hacker actually encountered computer technical problems one after another. This was a huge humiliation for Thomson David!
Thomson David crossed his fingers and hesitated whether to reply to the message on the screen or in the dialog box. However, when Thomson David hesitated, a message appeared on the computer screen again.
‘Mr. David, we are not enemies! In fact, we have a common enemy! ’
Thomson David took a deep breath. Since the other party already knew his true identity and hacked into his computer, what else could he avoid?
'Who are you? ’ Thomson David responded to the message, first asking for the other party’s identity, even though the other party would almost never answer. But still ask.
‘It doesn’t matter who I am, what’s important is that we can unite together to deal with the organization! ’
Thomson David began to think carefully. He was thinking about this mysterious man. Is it the enemy or oneself?
After some careful consideration, Thomson David finally replied to the message.
‘How are you going to deal with it? ’
Thomson David tends to believe in mysterious stranger hackers, or in other words, Thomson David doesn't care at all about the purpose of mysterious stranger hackers.
Because no matter what his purpose was, he could not threaten Thomson David's position. After all, Thomson David is the core security expert of the NSA National Security Agency, no matter what he does against him. Whether it is another hacker organization, they all have their own stance, a just stance that does not require explanation.
'Mr. David, how much do you know about the organization? ’ the mysterious strange hacker asked Thomson David.
For organizations. Thomson David knows nothing at all!
wrong!
Thomson and David placed a chess piece within the organization, but the time was still short, and there was no way for the chess piece placed by Thomson to gain any information.
and. Thomson David did not intend to give a clear explanation to the mysterious hacker.
'Feel sorry! I know very little about the organization! I only know. The other party must have the world's top hackers, and the other party has huge computing resources! ’
Thomson David has already tested these two pieces of information, or at the cost of exposing his identity. Summarize relevant information.
If the organization does not have the world's top hackers and huge computing resources, how can it stop his previous attacks?
‘There are three top hackers in the world, including the mysterious Mr. M, the former fourth giant of the Angel Council, the flaming sword Raphael, and an unknown mysterious hacker. The organization controls a total of approximately 2,000 tflops of computing resources, most of which are loosely distributed computing resources. If we want to deal with the organization, in addition to three world-class hackers, we also need huge computing resources as backing. Only then can we completely defeat the organization! ’
The mysterious stranger hacker actually knows the organization so well!
Thomson David looked at the information on the screen in surprise, secretly guessing who the hacker who invaded him was and why he knew so much secret information.
'impossible! According to the news we have received, Raphael, the flaming sword and the fourth giant of the Angel Council, has died! Also, how is it possible for an organization to amass 2000tflops of computing resources? ’
Thomson David refuted the mysterious stranger hacker. The NSA National Security Agency has very extensive intelligence channels, and even the most secretive things in the hacker world have been covered to a greater or lesser extent.
‘In fact, the fourth giant of the Angel Council, the Flame Sword Raphael, faked his death, betrayed the Angel Council, and joined. As for how the organization gathered 2000tflops of computing resources, it should be that they have mastered a very advanced loosely structured distributed computing solution. They may even have discovered unknown hardware-level vulnerabilities, thus controlling a large number of computer equipment and collecting a huge amount of data. computing resources! ’
The mysterious and strange hacker sent explanatory messages, allowing Thomson David to judge the situation on his own.
Thomson David once again determined the organization and controlled 2000tflops of computing resources. Even though most of them were loosely distributed computing resources, Thomson.David had already experienced the organization and how many loosely distributed computing resources it controlled. How awesome. Therefore, Thomson David faintly retreated and did not even want to go against the organization.
However, the mysterious stranger hacker seemed to have anticipated Thomson David's thoughts and sent another message without waiting for Thomson David to reply.
‘Mr. David, we have a chance to defeat the organization! If you join forces with me, I believe my technical strength has been recognized by you, right? Secondly, regarding the issue of computing resources, I have a low-level vulnerability in the system that has not yet been announced. At the same time, I also had a hardware-level vulnerability in my possession. If nothing unexpected happens, we can also collect more than 2000tflops of loosely distributed computing resources. ’
Thomson David's face was ugly. He was the core security expert of the NSA National Security Agency, but an unknown hacker was actually discussing these things with him, which made Thomson David a little unhappy.
But the anger in his heart towards the organization overshadowed all worries. Thomson David typed on the keyboard and replied to the message.
‘We still need the help of a master of the same level! ’
Thomson David raised the final question. Since the organization has three of the world's top hackers, even if they now have two of the world's top hackers and will soon have equivalent computing resources, they still lack one of the world's top hackers. Level master.
‘I’ll take care of this! Mr. David, can we be a temporary alliance? Can we fight the organization together? ’
The mysterious and strange hacker asked, obviously wanting to get a positive answer from Thomson David.
Thomson David only hesitated for less than three seconds before making the final decision!
‘If we also have equal power, we can be a temporary alliance, we can attack the organization together, and we will definitely defeat them! ’
Thomson David really wants to defeat the organization, even if he relies on the power of other hackers, he must defeat the organization!
‘Mr. David, I now need to contact another temporary ally and wait for my news! ’
Also in New York, in another mysterious room, the leader of the Angel Council hidden in the shadows cut off the link with Thomson David, and then picked up a disposable prepaid mobile phone to dial the number.
The leader of the Angel Council, Jehovah, held the mobile phone in his right hand. After dialing the number, he waited. About thirty seconds later, the call was connected, and a man's voice came from the receiver of the mobile phone.
“Lord, what’s the matter?”
Jehovah, still a neutral voice, responded: "You win! I need your help!"
"You know the price!" the man reminded.
"Yes! I can hand Abertir over to you!" Jehovah's tone was somewhat helpless and reluctant, but he still made a decision.
The man laughed loudly, "Since you are willing to hand over Abertir, let's talk about it. What help do you need? I guess it should be very difficult, right?"
This man is clearly the mysterious man who was preparing to help Jehovah when Shi Lei and Raphael attacked him. He and Jehovah should also know each other in the real world. Otherwise, he would not have appeared in Jehovah's room in the first place.
"I need your help to attack the organization together! Moreover, I need the supercomputer resources and broiler network resources you have!" Jehovah Lion said with his mouth wide open.
The mysterious man affirmed without caring: "No problem! When?"
Abertil is the pseudo-artificial intelligence system of the Angel Council. Abertil's value is very high, at least more than 10 billion US dollars. The demands that Jehovah spoke of were nothing compared to Abertiel!
When Jehovah contacted Thomson David and the mysterious hacker to prepare for the attack, Shi Lei did not know that Shi Lei was still in North Ossetia.
The enemy has the upper hand!
.(To be continued ~^~)