Just as the National Intelligence Agency of the Southern Dynasty is divided into three intelligence departments: domestic, international and Northern Dynasties, so is the core of the qingwatai website. However, all the information is filtered and purified before it is put here. Of course, only the president knows the password. %&*";

however, the website defense of Tsing wa Tai is very distinctive. If the Pentagon that Suk invaded before is packed in three layers, then the Tsing wa Tai can be described as pleated, three layers inside and three layers outside. It's very pleasant to package.

Suk's mood is a little excited. After all, he can fight with so many experts, but he is lost. However, he is assigned to the corresponding task, such as a firefighter. Where there is trouble, he will go to supplement immediately.

However, Suk, who has been awarded the hacker technology proficiency (Advanced) award, has no way to serve the country. In the discussion group, ice has made detailed arrangements for the next division of labor.

A total of six people, divided into three groups, one group for sharp knife, cut defense, straight forward, one group for destruction, create loopholes everywhere to capture the host, the remaining group is Suk and a person code 43, just responsible for rescue and disaster relief.

Holding their chin, using only one hand to control the keyboard and staring at the screen, these people are really powerful. If they don't get advanced rewards, they are really not opponents. Even their offensive thinking is very advanced, but now! ha-ha! For a while, Suk has even seen several fatal loopholes ignored by these peers.

But I'm sorry to mess with it. If I mess with ice's plan, I'm a sinner. But it's interesting to say that the website defense of the Southern Dynasties is really deep. In such a short time, Suk can count that he has invaded the fourth defense wall.

Although the other side has begun to organize a wave of counterattack, trying to cut off the network information flow of ice and others, but how can they be inferior to others, and gradually retreat, so that Suk really has nothing to do. I ^

in the office hall of Wang'an in the Southern Dynasties, Pu Zhengxing's fingers are fast tapping on the keyboard, and a layer of sweat has appeared on his forehead, which directly seeps into his eyes along the eyebrow bone. The sour feeling makes him feel very uncomfortable, but he can't find time to wipe a handful of sweat. The small lunch box has been knocked over by him, and the delicious pickles are scattered.

When the hard disk was running overloaded, there was a toothache sound. Suddenly, the screen went black, and there was no response. Park Zhengxing punched the keyboard with his fist. The next moment he stood up and went to another computer to fight.

This is the fifth computer that has been trapped. One third of the computers in the office hall can't be turned on. The section chief on duty looks anxiously at the bad scene, because he is only an administrative official, and he only knows a little about these technologies, and is completely at a loss.

Seeing that park Zhengxing's computer was also hacked, he couldn't control his mood any more. He yelled to the Secretary behind him: "hurry up! Please ask George to come here

George Howard, the leading Hacker Expert in the United States, once successfully intruded into the air defense command system, which directly threatened the national security of the United States. Later, he cracked the central computer password of the Federal Bureau of investigation, and even went around the major websites, specialized in ransacking various programs and data.

According to the estimation of the Federal Bureau of investigation, George Howard has already exceeded 600 million US dollars. That's why the Bureau of investigation has been closely deployed to arrest him at the cost of two years, while waiting for him is up to 50 years' imprisonment.

But then the cyber warrior program created by the United States rescued George and was absorbed into the program together with him. There were also some other hackers who worked for the National Security Bureau and were the most secret cyber force.

George was sent to the Southern Dynasties for a recent small-scale joint military exercise to monitor and evaluate the cyber war between the two countries. However, as a cyber expert, he was naturally invited to the cyber security section of the intelligence agency to guide his work.

In the same office building, there are senior apartment rooms specially applied for by George. One is a small office in the United States, and the other is that you can enter the hall for monitoring at any time.

At this time, George Howard was wearing an apron and humming an unknown tune. A large piece of tender steak on the pan was emitting a strong aroma.

To be honest, George has no choice but to come to South Korea this time. As a westerner, he really can't see these people eating with relish with some pickled turnips and cabbages, and even has deep disdain in his heart.

Human beings should eat meat. As the steak gradually takes shape, a large amount of saliva has been secreted in the mouth. Just at this time, a sudden telephone rang.

George, who wanted to wait until delicious food was on the table before answering the phone, frowned as the phone rang: "Hello! If there's nothing wrong with you, you're dead! "

"Mr. George, I'm Jin Yitai, the chief on duty of the network security class. Now we are being attacked by a group of hackers. The situation is very critical. Please help us a lot!" The voice on the other end of the phone sounds very urgent. The English with poor pronunciation always expresses his meaning."Hackers? oh Wait a minute, I'll go downstairs! " If George can take his attention away from the delicious food, the only possibility is the Internet. When he hears that there is a strong opponent, he will not care about the steak. He mentions his special computer and runs out directly.

Hard disk overload rotation, followed by a click, stopped, the computer screen then a dark, another computer was destroyed, this is the seventh computer.

George didn't even look at the abnormality there. He quickly connected to the network, opened his own special program kit, and a smile came out from the corner of his mouth: "it seems that the opponent's strength is good!"

In Yanjing, the dark room is full of computer screen flashing fluorescence, and his face is serious, but his eyes are very excited. He is about to get the final authority, and he can get the list of potential personnel. At this time, he encounters a strong counterattack.

"Damn it All of a sudden, ice jumped up in a fit of rage, quickly pressed the power off button, pulled out all the computer network cables, turned pale, and looked at the man who had been standing behind him: "boss!"

The man with national character face didn't speak. Just now, he was standing behind ice all the time. He knew the strength he met at a glance, and even he didn't get any benefits. On the contrary, the man almost reached Yanjing along the path of broiler, and ice's decision to unplug the network cable was completely correct.

"Ha ha! One of them has been solved! " George Howard, with his sea blue eyes, was very charming. Although he had just touched the path of three broilers across Asia and Europe, the other person responded in time and cut off the contact directly.

But fortunately, one left, and the other five left! Take your time! Thinking of this, George put the target on another hacker who rushed in front of him.