Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 1361 Network Security

"So that's where the Olympus furnace comes from?"

"I have no idea."

"What is the intangible city falling from the sky?"

"I have no idea."

Although Epsilon-Rodney-Rodney-Rodney-223 asked questions one after another to the commander communication channel in the chain of command, Constantine was still disturbed. He was not sure about the process of Epsilon-Rodney-Rodney-223's pronunciation, which was the secret of every Martian sage. He did not expect that the Martian sage in front of him would have the energy to chatter while doing the dual-line work. He heard that Dr. Holden Radcliff's computer disk was running at high speed, and a large amount of data was being analyzed and processed by Epsilon-Rodney-Rodney-223's thinking enhancement device and brain.

A new mission shuts Epsilon Rodney Ra223 down.

At this time, the heavy truck was heading towards the lighthouse base, and Hefeng 1, as an advance team that set out in advance, has been in contact with the convoy. Their disguise was very good, and there was almost no such thing as being stopped by the highway patrol. Even if there were, the armed personnel hidden in the car were ready to jump out and engage in a short but fierce battle at any time.

“The Hefeng-1 signal was disturbed.”

Mars mechanic Alpha Bronze 2 communicates with Epsilon Rodney 223 alone in the chain of command instead of using the communication device on Hefeng 1. Dr. Holden Radcliffe sat down on the folding bench at the moment, and he couldn't figure out why these people were arresting him, but he could easily guess the possible reasons - either the Inhuman genome, the Life-Model Decoy project, or the Dark Book - but he didn't immediately shout out to provide all the information he knew. Experience in carrying out multiple missions made him know that if he lost his value at this time, the other party would probably not protect his life.

"The Lighthouse Base may have the ability to remotely control Hefeng One."

"Call the Safaris Triangulus-Alpha-10 to Triangulus-Alpha-17." Epsilon Rodney-Radney-Alpha-223 finally lets Constantine go. She said to Alpha-Bronze 2, "I need their floating point computing power. Let them link separately and hard link with Hefeng One. I need to use them as a springboard to launch an attack on the lighthouse base."

Alfonso Mackenzie started talking and saw the light tube above her head flashing twice.

At first he didn't care, but thought it was a problem with the lamp. He, Daisy Johnson, had been waiting here for almost ten minutes. Everyone could not maintain their attention for a long time when their nerves were very nervous. A little inconspicuous twists and turns also helped everyone to cheer up and avoid excessive tension causing fire or other accidents. But what happened next would never be considered a minor problem that needed repairs - it was calm within a few seconds after the first lamp began to flash, followed by the second lamp, and then all the lamps in the entire corridor were flickering wildly at a chaotic frequency. The drastic light changed almost made all agents feel sick.

"What happened, Agent May?" Alfonso Mackenzie asked loudly in a messy communication channel, "Have we been attacked?"

"Enemy invasion...the power system." Even Melinda May's voice became intermittent, "The computer room...restart."

"I get it." Alfonso Mackenzie narrowed her eyes and glanced around. "Daisy, I need you to command the first line of defense." He said to Daisy Johnson. "Don't defend here and retreat if you find an opportunity. Our goal is to delay the pace of enemy invasion, rather than completely destroying them. We do not have this ability, and Agent Colson does not want you to be hurt."

"What are you going to do?" Daisy Johnson asked quickly. The flashing lights above her head gave her a headache. The explosion-proof door not far away was painted with yellow and black stripes, which made her feel like she was staying in a grave. "You need it here, Mike."

"I am also needed in the computer room now. The enemy has launched a cyber attack on the power system. I must guarantee the security department." Alfonso Mackenzie weighed the shotgun axe in her hand. "Don't worry, if an invasion occurs, I will definitely come back as fast as possible. What's more, Youyou is staying on the second line of defense, and she has the ability to ensure that you can evacuate smoothly."

Elena Rodriguez is nicknamed Youyou, a slingshot, because although her ability can run and move forward at extremely fast speed, she must return to the starting point, just like a thrown yo-yo. This nickname was named by Alfonso Mackenzie, who was performing the search for the Inhuman mission at that time. When Elena Rodriguez officially joined S.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E

As soon as he heard Youyou on the second line of defense, Daisy Johnson also relaxed.

She had no idea that at this moment, a ghost composed of charge was wandering in the energy pipeline of the lighthouse base, observing their every move through the surveillance cameras everywhere, including Alfonso McKenzie's statement that she was going to the computer room and the power room, and was also seen by the ghosts in the circuit - the cybersecurity attack and defense were far more dangerous than the cybersecurity agents at the lighthouse base imagined. Epsilon Rodney-Radney-Radney-223, who had already sneaked into the base, passed through layers of firewalls, jumped into the monitoring system with independent generator sets and sandbox network systems, and grasped the defense of S.H.E.Epsilon Rodney-Radney-Radney-223, in a few seconds, saw the S.H.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E.E

This chapter is not over, please click on the next page to continue reading! The charge carries the fragmented consciousness of Epsilon Rodney 223, depicting the intelligence she needs to see in binary and sending feedback. The mobile phones used by each S.H.E.L.D. agent is a specially modified tool, which not only enables information security confrontation, but also prevents the application from sending information and operating hardware without the user's knowledge. However, such a firewall is not a problem for Epsilon Rodney 223. The computing power provided by the Safari Triangulus-Alpha-10 to Triangulus-Alpha-17, coupled with the architectural information about the chip factory design of the US Homeland Security Agency in the Mars database, all allow Epsilon Rodney 223 to drill into design vulnerabilities like a ghost and parasitize on the mobile phones used by agents of S.H.E.L.D.

Be closer to the cybersecurity department, the more Epsilon Rodney-Ray223 can see the code they used when attacking Hefeng 1. This is not visual information feedback, but an intrusion through the connection between the mobile network and the computer network, through multiple confidential Wi-Fi as a springboard.

"How is it?" Constantine asked.

"It's going well," Epsilon Rodney Ra223 said intermittently, "but the signal is not good."

At first, it was just a few wrong brackets, and the automatic prompts and corrections of the encoding software could solve the problem. But soon this error began to expand, code errors began to appear from a sporadic few, and Error warnings appeared almost every time they ran. The network security personnel who could come to SHIELD were very experienced programmers, and they could quickly find the error and correct them. They just regarded this situation as too nervous or some other reason, and did not think about the invasion. But when they called the code package, these programmers did not find that the code package they used had been replaced, just like the prions of mad cow disease attacked the human body through food. Simple code was the protein that invaded the body. Now they had allowed pathogens to enter the body and there was no chance of saving them.
Chapter completed!
Prev Index    Favorite Next