Chapter 1030

In the post-modern secret laboratory, the staff who have been busy for an hour just relax.

They sit in their seats, almost every one can of coke, enjoy the aftertaste of the war.

Although they did not break the last fortress of the special operations department, many nodes of the Chinese Empire intranet, including the websites of the special operations division, as well as the websites of the cabinet and parliament, were broken by them.

Now, it's really time to appreciate your booty!

The head of the U.S. military secret laboratory pressed the "start" button happily.

One by one, yellow file packages appear on the large screen of the secret laboratory. As the graphics are flipped and decompressed, a file is exposed to them.

Just as they were about to open the first decompressed file, the package exploded like a dynamite!

As fireworks burst out on their screens, all the data suddenly became lines!

lines as like as two peas, a gleam of eyes, a gleam of eyes, a swirling, rolling, and a combination of various designs, exactly like their fireworks day on independence day.

Everyone was stunned by the accident. For a moment, the whole secret laboratory was stunned. No one spoke for a long time. The room was as quiet as the end of the world.

Finally, it was the person in charge who responded first.

“WTF! What happened? " He yelled, "who's the bag that came in?"

“…… Stop it! Do not continue to open files! All the data received this time are sent to the detection mailbox filtering virus! "

A senior engineer suddenly realizes something and stares at a file bag with fear Troy.exe Execute the program, "there is a Trojan horse! Trojan horse

In ancient Greek legend, the Greeks have been unable to defeat Troy.

Later, a Greek commander-in-chief thought of a way.

He let people build a huge Trojan horse, the Trojan horse's stomach is empty, can hide people.

He hid the Greek warriors in the belly of the Trojan horse and put them outside Troy. The others hid secretly.

Troy, who had been besieged for a long time, could not see the Greeks. He thought that the Greeks had withdrawn, so he dragged these Trojan horses outside their city as booty to the city.

In the evening, when the Trojans were sleeping, the Greeks hiding in the Trojan horse's belly took advantage of the night to kill the Trojans and seize the city of Troy.

Since then, Trojan horse has become the pronoun of attracting foreign enemies and suffering from itself.

Think of the temporary capture of modified Trojan horse virus, is the same principle.

Because when the American network attack retreated, they downloaded as much system information and content as possible of the Chinese Empire Network. Their concern is to take advantage of this opportunity to disguise her Trojan horse program as key system information and insert it into their download package.

"What? Have Trojan horse virus

The man's greeting was still a little late.

When you wake up, Troy.exe The file has started execution.

It's not an intelligent program, it doesn't reprogram, it doesn't hide.

It will only faithfully execute the programmer's command to it: erase all content data!

After these people in the secret laboratory retreated, they did not expect them to "bring in" a huge "Trojan horse"!

The computer used to play system files is connected to the host computer. At this moment, when countless fireworks are released on the super large screen, their system is collapsing and their hard disk is erased!

In less than a second, all the packages downloaded from China imperial network were deleted, and then developed to all computers connected to the host computer!

"Shut down! Forced shutdown! "

“Oh! No! ShXt! ShXt! ShXt! ShXt!”

The head of the U.S. secret laboratory grabbed his little hair and growled, "turn off all computers! Power off if you can't turn it off! power failure! Labor would rather smash all the computers than let this thing continue to rage! ——Did you forget the German Federal intelligence agency? "

The roar of the person in charge finally woke up the stunned staff.

They quickly mobilized, shut down the power off, the power off, and some people pull out the network cable, and even smash the host with a hammer!

Because of that Troy.exe It's too powerful, it's not complicated, it's not intelligent, there's only one function, it's delete!

When a simple and clear program, in a powerful computer, that is incomparably fast, deleting data, deleting the day and the earth, the perfect interpretation of the word "virus", it is lightning like infectious and invasive data.

The only martial arts in the world are fast.

The program is also the same, so the processing speed of the computer CPU is the most critical data index to determine the quality of the computer.

But at this time, the faster the CPU, the faster the acceleration Troy.exe The deletion speed of.When they can't shut down the computer as fast as the computer is infected, they have to come to the hard one, smash the host, and do physical damage, so as to prevent the program from invading the cloud system from the hard disk, that's killing the dog!

The circuit system of the laboratory was also affected. The ceiling lamp was on, which made the whole post-modern decorated secret laboratory look like a disaster of doomsday.

Countless expensive devices have been destroyed, and the data that we have worked hard for many years have also been deleted.

If there is a backup, but the problem is, their secret laboratory is the most confidential in the United States, and this is the base of many server backup of the U.S. military!

They can only watch the storage devices of the backup base destroyed and the data deleted!

Just when they were so exhausted that they thought they had finally stopped the Trojan horse program from running, a bright aperture suddenly appeared on the large screen on the wall.

A lovely pink pig came out of the aperture, rolled two times at them, then turned around, turned his back to them, showed a short tail on his fat little butt and wagged it.

Then the aperture gradually narrowed, and the pink piglet disappeared in the aperture.

“WTF! Pink pig again

The person in charge of the secret laboratory sent out a burst of earth shaking wail, completely without the mood and momentum to recruit "pink pig" just now.

He rushed out of the lab, grabbed the base's phone, and without thinking about it, called the CIA.

"I want the head of pink pig! I'm going to get him to America! bring to justice! I'm going to shoot him myself! I will cut off his skin and make a Thangka! One for each of you in your office! "

He cried hysterically, "I don't care what you do! I want you to catch pink pig! Extradite to the United States! No matter what nationality he is! No matter where he is! No one ever! Can take advantage of me without paying the price

The head of the U.S. secret laboratory is also a genius. He leads a number of top secret experiments that cannot be made public, and provides numerous technical support for the US military, the CIA and the FBI.

He is arrogant and aloof. He disdains to use his name. He calls himself Mr. X. he has no surname, no first name, only code name.

He loved the United States and vowed from the day he joined the US Army that he would devote his life to the United States and the United States.

In this world, only the United States is the blue star's first superpower, and he only allows the United States to be the first power.

Only he can abuse others, not others.

If someone else abused him, he must not exist in this world.

He doesn't allow such people to exist!

On the other end of the phone is the director of the CIA, one of the most powerful people in the United States.

When he learned of the devastating blow to the military's secret laboratory, he was shocked and angry.

"The Chinese Empire has been deceiving people too much," he said! Dare to launch a cyber attack on our country! What a shame! Shame-on-them!”

When he said this, he completely ignored that the cyber war was started by his own secret military laboratory.

For him, the US military's secret laboratory invades the network of other countries, which is "the daily life of the US military", which is beyond reproach, and needs other countries to respect the "daily life of the US military".

But being killed by others is treacherous!

Violation of international law!

Violation of international morality and norms!

We must launch a public opinion war in the world to denounce the cheeky "hegemonic" country, the Chinese Empire!

The director of the CIA put down the phone and immediately called his right-hand assistant. "You can contact our people immediately and let them do it. Also, call the white house right away and tell the president that I want to see him right away and ask him not to tweet for 24 hours! "

This is the first change. It's three o'clock today.

Remind relatives of the monthly and recommended tickets Oh!

1 p.m. monthly ticket 2400 plus watch.

It's the third watch at seven in the evening.

Mamda!

www.novelhold.com , the fastest update of the webnovel!