Chapter 680

The "devourer. Exe" is like a pathfinder, carrying her to the central control system of the German Federal intelligence agency.

She roamed the intranet, nervously searching for the information she wanted.

When she fled that night, four Chinese Americans died in the woods near the bar.

In consideration of this, there are two bad people who should be impostors, while the other two are members of the real special operations department of the Chinese Empire.

She felt the diamond stud on her ear, hesitated for a moment, but still didn't take it off.

This is the only contact she has with Huo Shao. She knows that it is still dangerous, but she doesn't want to take it down.

She wants to go into the uls internal network and find information reports about the four dead.

That morning, when the blonde landlady told her about the tragedy in the woods, she thought that the case would spread in Germany again. After all, even the landlady of a bar knew

But then I didn't see any news on the Internet, as if she had imagined what happened that night.

She now understood that the boss's wife knew so well that it was not a household name, but simply because she was in the company of Lars, and I'm afraid she was also an intelligence officer of the federal intelligence agency.

Tell her, probably also want to get some news from her.

It's a pity that she didn't know why the Chinese Empire sent people here, so she didn't have a chance to disclose the secret.

He shrugged and continued to search through the internal network of the German Federal intelligence agency.

From the perspective of website architecture, the website of the German Federal intelligence agency is divided into eight major systems.

Bureau 1 is the collection of intelligence personnel, and Lars is the director.

He dug out an encrypted file of the first Bureau. The password was very simple, because I didn't know that idiot intelligence personnel specially created a TXT file, which exists with the encrypted file. The txt file is called password.txt ……

There are a variety of passwords, dealing with various encrypted files.

So, to open this name password.txt You have the key to open all encrypted files.

Smooth open this encrypted file, the thought of the Leng for a moment.

This document is actually a summary of the list of intelligence personnel, including the intelligence personnel of the German Federal intelligence agency who are lurking in various countries

She also saw a list of people lurking inside the Chinese Empire!

It's true that there's no place to look for when you're out of your shoes. It's easy to get here.

Think of it without hesitation to upload to their own cloud account.

2 bureaus manage signals; 3 bureaus do intelligence analysis; 4 bureaus have added the most difficult password, which is not in the password file of brain damage.

Taking a look at the introduction outside, she found that the fourth bureau is the management of the federal intelligence agency, all of which are some bureaucrats. She is also too lazy to look at it. She does not bother to crack the code, so she ignores it.

Bureau 5 is responsible for international counter-terrorism and bureau 6 is responsible for technical support (the technical personnel monitoring her should be from bureau 6).

In consideration of this, I drew a pig's head and stored it in the encrypted file of 6 bureaus

Bureau 7 is responsible for training intelligence personnel. She is not interested in the training measures, but she carefully selects several files here and uploads them to the cloud system, thinking that Huo Shao should be interested.

The last one is the eight bureau, which is responsible for anti espionage activities.

The spirit of concern was so strong that her intuition about the death of the four Chinese Americans should be here.

Click in the mouse, a folder to find, a photo to see.

Three hours later, she was almost blind and finally found the folder related to the death of the four Chinese Americans!

Click in. There are not only various photos of the scene, photos from all angles of the dead, but also reports and analysis of the federal intelligence agency.

After a rough look at it, they found that they had also discussed whether to use the documents on the dead Chinese to send diplomatic notes to the Chinese Empire, asking why they sent personnel from their intelligence agencies to Germany!

Later, it was vetoed. The man had no name, and there was only a code name "g" in the document.

The "g" said: first of all, those documents are fake. If they don't know, they can only use these fake documents to interrogate the Ministry of foreign affairs of the Chinese Empire, and they can only make themselves self defeating and make the other party realize that they are in their hands

Suddenly, I saw my name in these top secret documents, and I trembled nervously. The mouse almost couldn't grasp it.

Her heart was pounding out of her throat.

It's easy to download these files to the cloud.

But at this time, the network suddenly slowed down, and her upload was still after half of it.

My heart sank.

Did anyone find out?Look at the watch. It's been four hours.

She is too greedy, the first invasion of each other's intranet, stayed too long, leaving too many traces.

She knew that she did this very rough, if Zhao Liangze knew, he would certainly scold her to death.

But this opportunity was so rare that she did not want to give up the opportunity to help Huo Shao and the special operations department to find out all the secrets of the German Federal intelligence agency.

As time goes by, I think about the flying of ten fingers and write acceleration program constantly.

Ten minutes later, her upload was still in a standstill, and the alert system in her program was already activated.

This shows that the other party may have found that there is a problem with monitoring and that outsiders have entered the internal network.

What to do?

If she gives up this time, maybe she will never have a chance to come in again.

Moreover, if alser and they also have computer heroes, it is possible to find her here

To give up or to continue is a fatal question.

In this minute of fighting between man and nature, he finally made a decision.

Be a big one!

Let these arrogant white people know that rabbits will bite when they are in a hurry!

If you don't bite, you will be killed if you are ill!

Thinking of the closed eyes, holding the mouse to start the phagocyte program's ultimate system.

After a while, she let go of her mouse and watched her program begin to wreak havoc on the German Federal intelligence agency's intranet.

……

At this time, in the central control room of the German Federal intelligence agency, the sound of the alarm sounded continuously, resounding throughout the entire base, which had just turned white.

"Come on! Come on! Foreign invasion

"Where? Where? "

"Intranet! You idiot! The Intranet has been broken

"Activate the emergency system! Pursue the intruder! Be sure to trace back to the IP where the program originated! "

Seeing that the situation is becoming more and more urgent, their best software engineers are still on their way, but it is too late.

Without final measures, all their secrets will be destroyed.

This is more than the federal intelligence agency's top commander is the enemy mole.

Because it means that all the top secret information that the FBI has had since the Gestapo period could be exposed!

The Germans in the central control room looked at each other, pale, shivering, and did not know how to face the situation.

"It's too late! Don't go after IP! Cut off the power! Cut off the power immediately

At the moment when the switchboard power is cut off, the "devourer. Exe" that cares about is intensified and the final attack breaks out.

It incarnates into tens of thousands of small programs, like phagocytizing bacteria white blood cells, breaking up into parts, and its speed becomes very fast. In the internal network of the federal intelligence agency, like locusts, it devours all the documents, whether encrypted or not, whether it is system files or information files, devours the packages and shrinks them, and then forwards them to the external mail like lightning Box.

The number of them is so large and the speed is so fast that in the process of gradually cutting off the power supply of the whole machine, all the phagocytic procedures have been completed, and finally the self destruction program has been started.

When lainz was eagerly called by Lars to stand in front of the huge mainframe of the federal intelligence agency's central control system, he only saw a bright aperture on the screen. A lovely pink pig came out of the aperture and rolled at them twice. Then he turned around and turned his back to reveal a short tail on his fat little butt Shake, and then the aperture gradually narrowed, powder tender piglet disappeared in the aperture.

Boom!

ALSS hit the host with a heavy blow, and his eyes were ready to crack that 's going too far! Don't let me catch who did it

This is the third shift.

To remind you of the recommended vote Oh!

The next three shifts should be a monthly ticket of 1500.

Tomorrow's first should be 8:00 in the morning, parents don't need to refresh too early.

O(∩_ ∩)O~。。

www.novelhold.com , the fastest update of the webnovel!