You have a new Amazon product recommendation

Chapter 284 Code


There was no imaginary structure behind the door, and the fake Lena had done enough work before the invasion.

Through various peripheral means, she obtained some drawings, and even collected enough information, just like a jigsaw puzzle, she summarized a huge amount of picture information one by one, and finally pieced together a diagram of the internal structure of the Rubik's Cube that she thought was relatively complete.

If you follow the patchwork map, this should be a hall with four doors leading to different functional areas.

But now, there were eight metal doors in front of her, and what was worse was that there were no signs on the doors, and she didn't know where to go.

"Damn" Fake Lena gritted her teeth secretly, "What's going on" She was a little frustrated, it seemed that this time she was capsized in the gutter, and the internal structure diagram that she had spent a lot of effort to make was completely incorrect "Forget it," she said to herself in her heart, "it's better to gamble" Her eyes fell on the third metal door, 3 was the lucky number of her zodiac sign, since she wanted to bet, she would bet on the number of her own auspicious points.

He stepped forward, picked up the black employee card and put it on the sensor, and with a dripping sound, the door opened.

"Well, it's a big deal to spend a little more time, and you can always find the main room."

She looked up at the military electronic watch on her left hand, which told her that it was 2 o'clock in the morning.

In addition to the need for special operations to work overtime, the company usually starts work at 8 o'clock in the morning, and at night the red zone is almost isolated, there are no living people in it, only the security system automatically monitors and operates, so there are still six hours to go.

She kept an eye on it, opened the AD strapped to her forearm, pressed the scan button, and as the red laser was released, she performed a detailed scan of the structure here.

She adjusted the positioning system and turned on the recording function.

In this way, the system in AD can record her activity here, which is equivalent to noting the way she came, and even if there is something wrong, she can return the same way.

This kind of military system is a confidential high-tech application technology, which can only be used by a small number of countries, and most of them are used to equip special forces, so as not to use them when the environment is complex and they cannot receive GS positioning information, so as not to cause them to get lost.

There is no light behind the No. 3 door, in order to save time, the fake Lena did not look for the switch of the lighting circuit, and who knows what other systems will touch after turning on the switch, as long as there is a little movement, I am afraid that the alarm will be triggered.

"Doctor, you really don't need me to trap her," Troy asked Finch, puzzled as she scurried around the Rubik's Cube with her brow on her brow and flies.

"Didn't you want to trap her at first, why are you asking me now," Finch said.

"I don't think she's malicious, so she doesn't have to do anything with those surveillance lines when she comes in, and I've shielded her," Troy said. ” "How did you analyze that she was not malicious" Finch knew that the artificial intelligence system he designed back then had very strong computing power, and could use all kinds of tiny information to carry out comprehensive calculations in a unified manner, so as to predict the trajectory of the other party's behavior, if broadly speaking, Troy has a certain ability to predict the future.

A virtual electronic information screen popped up in the air, and the figure of the fake Lena appeared on the screen, and Troy controlled the monitoring probe, locked the body of the fake Lena, and scanned her whole body with different modes.

"A hand-held AD, a BlackBerry, a 99 pistol, 4 magazines, from the color of the warhead, belong to high-explosive shells; A butterfly folding knife, a small military laptop, an electronic USB flash drive" The fake Lena was almost see-through under the scanning of the surveillance probe, and all the things hidden in her body were listed one by one, and Troy even analyzed the threat generated by each item on the screen, and displayed them all on the screen.

It's a pity that the threat coefficient of 1oo points is calculated, and the threat coefficient of the items on this intruder is pitifully small, even the 99 pistol equipped with a high-explosive warhead has a threat coefficient of only a pitiful 1, which is simply insignificant.

"Could it be that she's here to steal the data" Finch remembered that the data room was here, maybe this guy had come in to steal the confidential files in the data room.

"No, there's only a 1o chance she'll steal the data, but," Troy showed a new stat on the screen, "and there's a 9o chance she'll come in and hack into the Sky Eye system." ” "9o" Finch's eyes rounded, "How did you come to this conclusion?"

"If it is stealing information, it is not easy to take away these large volumes of ancient books and archives in such a huge database, the easiest way is to do a quick scan or take pictures, but she does not have these equipment, only a laptop computer and a USB flash drive, this USB flash drive only has a pitiful 2G, if it is to steal information, you can bring a larger capacity of the USB flash drive, instead of using a 2G disk."

"Makes sense, Troy, you're getting smarter."

Vinci couldn't help but feel a little proud, after all, Troy was his masterpiece.

"Just now, when she used her laptop to crack the access control code at the access control, I executed the anti-intrusion procedure."

Troy said.

Finch's eyes lit up: "You hacked her laptop" "Yes, she didn't expect her laptop to be my target, and it only took me ten seconds to scan her entire hard drive."

Troy said, "Unfortunately, there is nothing of value in the present.

Her hard drive is full of hacking software, and the level of writing is passable, but it is still insignificant in the face of Skydome's powerful security system. ” "You mean, you deliberately put water on her just now," Finch said.

"Yes, she thought she had cracked the code herself, but I actually let it go on purpose.

Because I showed something more interesting, I guess she's looking for my host room. ” "That's right," Finch slapped his thigh, "your system is almost invulnerable, she can't hack into it at all, and if it's wired outside, the chances of breaking through the defenses are equal to zero" "Therefore, it is the easiest way to go directly to the computer room, plug the USB flash drive with the hacking program directly into the host, and implant it into my main program."

Troy said.

"Now that you know, you're letting her in," Finch was puzzled.

"Because I find it interesting to have something in her USB stick, so to speak," Troy said, "I know the stuff inside, and you are familiar with it, and I think it's very familiar, but I don't know why she brought it in."

"What is it," Finch said, "when did you hack into her USB drive?"

"That's a wireless USB flash drive, which comes with a Bluetooth chip, and has a battery board, so you can transmit data directly through Bluetooth without plugging in the host.

I started it up while scanning my laptop and did a check, but unfortunately, I didn't have enough time and only showed up a small piece of code.

Troy said.

"Code" Finch's face was a little solemn, and he said, "It's a virus code" "Nope."

Troy said, "It's the opening code of the first paragraph of Starwind 1. ” "Starwind No. 1," Finch almost exclaimed

.

: