Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 8 Turtles Enter the Internet

After staying for a while, Feng Xiaotian began to act. He was already very familiar with computer knowledge. What he had to do now was to try to find foreign network interfaces through his own technology.

Half an hour later, Feng Xiaotian finally found a feasible path, but he was a little hesitant because the only path belonged to the military. Feng Xiaotian was only fourteen years old. If this matter was discovered by the military, how could he bear the consequences?

After hesitating for a long time, he finally overcame the fear of curiosity. Feng Xiaotian operated the computer and sneaked into the military system. The system was very quiet. Today is New Year's Eve, and there were probably not many people on duty, so Feng Xiaotian succeeded. He easily controlled a military computer through remote commands, and then issued a port access application to the International Internet through this computer.

In fact, this system of the military is just for testing. This is a military-civilian cooperation project to detect possible problems in the connection between the country's network and the international Internet. Feng Xiaotian successfully became the first civilian detector without knowing it.

After all, there is military participation, so all the network configurations are relatively good. Not long after Feng Xiaotian issued the application, the computer showed that he had successfully connected to the Internet. Feng Xiaotian suppressed his inner excitement and finally entered the International Internet.

At this moment, Professor Vincent, as the main person in charge of the National Computer Security Center in Seattle, USA, does his job every day. What is his main job? It is very simple, it is to deal with threats that appear at any time on the Internet.

It is now 9:30 in the morning in the United States. Professor Vincent sat in a spacious and bright office, drinking coffee leisurely. He was holding a newspaper in his hand, which contained a very eye-catching title: "Hackers reappear! Causing significant losses!"

Below the title, the newspaper made a detailed report: "At 3 o'clock yesterday afternoon, a hacker hacked into the internal network of General Electric, causing the company to shut down for four hours. According to a relevant person in charge of General Electric, the hacker's behavior has caused the company to lose nearly 8 million US dollars. General Electric issued a statement to severely condemn the hacker's behavior and will assist relevant departments in tracing the whereabouts of the hacker."

Professor Vincent took a sip of coffee and his face looked very calm. He knew about this yesterday. It was with his help that General Electric finally returned to normal. The hacker that appeared yesterday was quite powerful. Professor Vincent's team took more than an hour to crack the virus software implanted by the other party. As for the whereabouts of the hacker, only genius knew where he had gone.

Professor Vincent put down the newspaper and shook his head with a wry smile. The current network security situation is getting worse and worse. Most computer experts are hiding among the people. Few people will join the national security department for work. In this way, his work is getting harder and harder. In the past, there was still time to go out to see the scenery and other things, but now, the things that need to be handled every day make him feel overwhelmed. Professor Vincent has been in the security center for more than a month and has not returned home. If this continues, I don’t know if his wife will file for divorce from him.

Professor Vincent sat on the chair and stretched his waist comfortably. It was rare to have such leisurely time like today. He wanted to take this opportunity to relax. Just when he was enjoying this leisure, his secretary hurried in. She only heard her report to Professor Vincent: "Professor, we have just detected the Internet signal from China. The other party has entered the Internet through that only port. What should you do about this matter?"

Professor Vinson was stunned when he heard this and said, "Did the Chinese people enter the Internet? Didn't their test time be between 10 am and 3 pm? Why did they run out at this time?"

As Professor Vincent got up and followed the secretary to the monitoring room, where there were eight huge supercomputers. At this moment, a staff member was sitting in front of a computer screen, staring at the situation on it. Professor Vincent came to the person and asked, "Rocky, what's the situation?"

Rocky replied, "This guy has been wandering around since he entered the Internet, as if he was looking for something."

Professor Vinson stopped talking when he heard this. He stared at the computer screen tightly. After a few minutes, he smiled and said, "It seems that this guy is familiar with the Internet. After all, he is a Chinese. He will naturally make a fuss when he sees such a magical online world. Don't worry about him. As long as he doesn't do anything out of line, just follow him."

After saying that, Professor Vincent turned around and walked out. In his opinion, this person from a backward country was completely a terrifying person. If he could pose a threat to the security of the Internet, it would be as unrealistic as a fairy tale of 1,000 nights. Therefore, Professor Vincent did not make any moves on this and allowed this guy to rush around the Internet.

This person who wanders around the Internet is naturally Feng Xiaotian. As Professor Vincent said, Feng Xiaotian is a rustic guy at this moment. Everything on the Internet is so novel and there are all kinds of information. Feng Xiaotian is like a sponge, constantly absorbing information that is useful to him. Whenever he sees something he is interested in, he will stop and think carefully.

Originally, Feng Xiaotian wanted to learn some related computer knowledge on the Internet because he wanted to create an artificial intelligence system. But now, he has long forgotten this ideal. Just as he continued to browse various information, a news on the Internet attracted his attention, which was a piece of news about hackers.

Feng Xiaotian also has a certain understanding of the term hacker and probably knows what these people do. To be honest, he is a hacker to some extent because he enters the international network by controlling the military computer. Any unauthorized entry is called an illegal invasion, and those who control computers to complete illegal invasion can be called a hacker.

Feng Xiaotian looked at the news about hackers. This news was the one that Professor Vincent had read. Compared with Professor Vincent, Feng Xiaotian reads it more carefully and has more ideas.

There is no perfect thing in the world, so the computer operating system is naturally the same. Real computer experts usually gain control of other computers by looking for system vulnerabilities.
Chapter completed!
Prev Index    Favorite Next