Marvel: Silver Superman, Starts with Mutant Academy

Chapter 73



Chapter 73 The ending of this time, I will decide the script

As the most developed country in the world, the United States is very advanced in technology development and leads the world in the field of computers and the Internet.

Naturally, it also attaches great importance to network information security.

Especially with regard to state secrets, there is a department in the White House dedicated to information security.

In this department called Cyber Security Bureau, including many computer geniuses in the United States and even abroad, engaged in the United States Internet security defense.

When I have nothing to do, I steal other state secrets by the way.

Yes, it is so shameless.

Near noon, 18-year-old Corod was bored playing games in his seat.

As a genius who broke the White House defense official website at the age of twelve, was approached by an agent, and finally recruited into the security department, Corod works very easily every day.

Because of him, no one has been able to breach the White House of the United States for six years, and very few people will come back to make trouble after a long time.

Naturally, it seems a little boring all day long.

But today, just as he was about to get off work for lunch, a yellow exclamation mark popped up in the lower left corner of Corod’s computer, and his eyes suddenly lit up.

“After more than a year, finally someone came to attack the White House again.

Excited, Korod decisively turned off the game, and controlled his hands to crack on the keyboard.

Suddenly, on his computer, pages began to pop up and close.

A minute later, Ke Luo “593” De stopped with a smile on his face.

Because the hacker who attacked the website just now was a rookie who used ordinary broilers as a springboard. I wonder if this kind of hacking technology is outdated now.

If the other party hadn’t decisively pulled out the line and disconnected from the network, and given him another ten seconds, he would be able to lock the exact location and then counter-invade the other party’s computer.

At this time, the chief of the security section not far away came out of the office: “Korode, I just saw a network intrusion notification.

Corod shrugged: “Head, don’t worry, a rookie, I’ve been forced to cut off the power.”

Tarter gave him a thumbs up: “Good job, but next time you can lock the address of the other party and find out the identity will be better.”

“No problem, head, but I don’t think he dares to come again.

Library, Chen Tian reopened the notebook with great interest.

He simply tried to invade the internal network of the White House just now, but he was blocked.

After dozens of seconds, as the notebook was turned on, Chen Tian’s hands turned into phantoms again, and countless information flashed across the screen like a waterfall.

Even because it runs too fast, the temperature of the notebook keeps rising.

In the Cyber Security Department, Corod just stood up and was about to go to lunch when an exclamation mark popped up in the lower left corner of his computer, and he immediately raised his brows.

“Anyone else invaded?”

Saying that, Corod sat down, tapped his fingers on the keyboard a few times, and then a smile appeared on the corner of his mouth: “Interesting, it’s that person just now.”

“You can’t run this time. 99

Corod’s demeanor seemed very relaxed, after all, the rookie just didn’t hold on for even a minute.

In fact, it is normal to be able to break through several layers of protective nets and come to the point of the White House intranet, which is already a master in the hacker world.

But in Crowder’s eyes, this kind of person is still a rookie.

Sure enough, after dozens of seconds, he broke through the rookie’s last disguised broiler, ready to lock the other party’s specific IP.

but…………

“Huh! Interesting.

Corod sat up straight, his expression became serious, and the speed of typing with both hands on the keyboard became faster and faster.

Ten minutes later, Corod exhaled and wiped the sweat from his forehead.

At this time, the middle-aged white man who came behind him at an unknown time, Tarter said solemnly: “Croode, who is the person who invaded this time? How can he fight against you for so long.”

Corrod’s expression was not so relaxed this time, and he shook his head slightly: “It’s the same person just now, and it’s the same way of intrusion as before. 35

Tarter was stunned for a moment, a little puzzled: “Then you…”

“But this time, the jumping broilers on the other side increased too fast, faster than the deciphering speed of the program I weaved.

Speaking of which, Corod felt a bit of a toothache.

He never imagined that someone could decipher the IP addresses of computers in other countries around the world and pretend to be their own addresses faster than the software he designed to decipher them.

In other words, the ‘person’ who deciphered the PI addresses of computers in other countries is actually a compiled super software.

Otherwise, how can a person reach the speed of breaking hundreds of computer addresses all over the world in one second?

It seems that he has met a master and has used the most basic hacking techniques to the peak. It seems that he is using basic hacking techniques, but it is actually super coding.

It can jump to tens of thousands of IPs in one minute, disperse all over the world, break through the firewall with a large number of broilers, and finally invade the core network.

And the first test in front of him pretended to be a rookie, just to paralyze him, the second time was the real attack.

It’s just that he didn’t know why, after ten minutes of persistence, the other party suddenly dropped the line, otherwise he would be ready to apply for other defenses at the same time.

But in this way, his face of Corod was lost.

In the face of the hacker’s intrusion, I actually had to ask my colleagues for help.

Next, Corod and Tarter waited for more than ten minutes, and after confirming that the other party had completely left, they breathed a sigh of relief.

Tarter clapped his hands and looked at the other serious-looking men in the office: “Okay, everyone, let’s go to dinner, the people who invaded just now have been repelled by Corod.

“West, the computer is broken.””

In the library, Clarice looked at Chen Tian with some doubts, where his notebook was smoking black smoke.

Chen Tian’s eyes glowed with transparent light, and he glanced at the laptop computer and nodded: “It’s because the temperature of the motherboard heats up too fast, the heat dissipation can’t keep up, and the CPU circuit flashes and spontaneously ignites.”

“Oh.” Clarice rolled her eyes.

“It’s broken, it’s broken, Clarice, let’s go to dinner first.”

“In the afternoon, I went to the underground base and asked Mr. Orolo to borrow the main computer of the base.

After having lunch in the dining hall, Chen Tian went to Orolo and borrowed the main computer under the pretext of inquiring some information.

For Chen Tian, the current Storm is very trusting, and agreed without thinking.

At 2 o’clock in the afternoon, the United States Department of Cyber Security suddenly looked solemn and sat up straight: “Head, that person is indeed here again.”

“Is it coming. 35

Tarter in the back looked sharply: “This time, when you join forces, you must lock the identity of this person and find it out. 99

As the head of the network security department, Tarter was very cautious and felt that the two attacks in the morning were definitely not a coincidence, so he had already prepared for the attack in the afternoon.

And on the grounds of national security, Corod was persuaded to accept other people’s assistance.

“Take it easy.

“Leave it to us.

The young people around looked relaxed one by one.

Although they are not geniuses at the level of Corod, they can enter the Security Information Department, and each of them has amazing strength in computer software.

A few were even similar to Kroode, who were once the top hackers in the world, and were finally recruited by the United States.

At the moment everyone was sitting in front of their respective computers, with huge amounts of display screens in front of them, already connected to the department’s supercomputers…

But after more than ten minutes, everyone, including Corod, was sweating profusely, looking at the screen in front of countless information waterfalls in disbelief.

They were breached the firewall.

The torrent of millions of broilers that broke out at that moment directly broke through the blockade they compiled.

No one could have imagined that the White House Intranet, which had not been breached for six years, actually missed it today and was hacked by an unknown hacker using the oldest method.

Tarter was the first to react and shouted: “Quick, disconnect the network and disconnect!”

Corod shook his head in frustration: “It’s useless, head, the other party actually bypassed us when they first invaded.

“Korode, how is that possible?” A hacker member didn’t believe it, because they didn’t find any trace of being breached.

Corod said calmly: “Because the other party’s technique is to use tens of millions of broilers as a cover to attract our attention and consume the computing power of the host.

“And he himself used a disguised code to bypass the firewall and enter the intranet with the instructions we issued.”

“It’s just that the other party only browsed ordinary information on the intranet after entering, and did not download those military secrets, so the alarm was not triggered.”5

“This…” Corode’s words made everyone stunned.

Which hackers attack inside and outside, the purpose is not those military and scientific research secrets?

Never heard of anyone hacking the United States White House intranet just to browse general information.

Definitely, these ordinary information are also classified as the secrets of political dignitaries, but they do not have the top scientific research technology, and the military secret level is high.

At this time, Corod sighed: “Look, the other party has retreated.”

As his voice fell, those information waterfalls on the big screen disappeared at a speed visible to the naked eye, and finally returned to the normal web page.

No one cares about the chaos of the White House Cyber Security Department. In the underground base, Chen Tian sat in front of the main control computer and thoughtfully recalled the information he had just browsed.

Chen Tian’s eyes narrowed slightly: “Twelve first-generation Sentry units have been debugged and shipped from Trask Industries to Devil Island at six in the morning.

Having said that, Chen Tian doubled down on the computer and found out where Trask Industries is located.

Then, relying on hacking technology, he broke through the Elementary level firewall, and went in and browsed quietly.

4.0 “The Sentinel laboratory is not in Trask Industries, but in a large military facility in Mifang. It is very troublesome to destroy it.”5

“Sure enough, the United States takes the Sentry program very seriously.

Sitting on the chair, Chen Tian pondered for a long time, then removed some search traces on the computer, got up and left.

He already got the news he wanted.

The next step is to think about the most favorable choice in the next Mutant attack.

According to the plot, Wolverine, who goes out next, will find Jean and want her to go back with him, but is seriously injured and unconscious by a random blow from Magneto.

At the same time, Magneto used Multiple Man to attract the official attention of the United States.

I attacked Devil Island with all my strength, tearing apart the Golden Gate Bridge and descending domineering.

When Magneto led the attack to take advantage, the awakened Wolverine led the X-Men to arrive.

In the final battle, Magneto was hit by a potion bullet and lost his super ability, and Jean went berserk again, killing countless soldiers and Mutants and was killed by Wolverine.

But this ending is not good for him as a ‘Mutant’.

Because there is no Magneto target, some people will focus on the school or him.

So this time the ending needs to follow his script.

PS: The fourth update is completed, and there are more in the back. Brothers who like it remember to vote for flowers.


Tip: You can use left, right, A and D keyboard keys to browse between chapters.