The global atmosphere was changing!

People were panicking!

On this day, the entire world was shrouded in the shadow of the CIH virus.

Subsequently, cybersecurity experts from around the world urgently formed a computer virus research group and began trying to crack the virus"s code. However, they made extremely slow progress on it and were unable to come up with an ad hoc solution.

"It"s not working!"

"Pete, how is it going?"

"Another machine has been sc.r.a.pped!"

"Dammit!"

"This virus is too dangerous!"

"The creator must be a lunatic!"

"Has it started to spread?"

"Fortunately, not for the time being."

"Yeah, due to the virus creator"s rules in the coding, there hasn"t been any widespread transmission of the virus yet. But that doesn"t mean that we can relax. We have to find out if the creator explicitly limited the spread of the virus, not that he couldn"t achieve the effect. This virus is like a ticking time bomb!"

"Who could it be?"

"It definitely originated from China!"

Korea.

The citizens also broke down.

"Our hackers have been totally wiped out?"

"All of them got infected by a computer virus?"

"There"s no one left at all?"

"How the h.e.l.l did that happen!"

"Such a dangerous hacker still exists in China?"

j.a.pan.

"Is it a Chinese person?"

"It has to be."

"The many, multinational hackers attacking the Chinese Internet were inexplicably infected with a virus and wiped out while the Chinese hackers remained unaffected. It would be a wonder if it weren"t them!"

"China really is full of hidden talent."

"There are too many dangerous people in China!"

"Yeah. There was 2 previously, and now, another one has popped out?"

China.

"Holy s.h.i.+t! d.a.m.n!"

"Is it really our people?"

"This is so cool!"

"Motherf.u.c.ker, I"m getting so heated!"

"Good job! Well done getting them!"

"They"ve been hacking us for so many days, but they"ve finally been annihilated!"

"Wiped out in a single exchange? G.o.d! That"s so impressive!"

"We have an ace among us! A true talent among the people!"

"Don"t you guys find this to be very similar to the approach that the legendary hacker, 2, employed back then?"

"Ah? It does feel like that, it really does!"

"But 2 has already been taken into custody, no?"

"What do you guys mean by that? Are you saying—?"

Somewhere.

Chinese cybersecurity experts had gathered.

Li Weidong, who had led a team to fight back against the multinational hackers this time, was also present.

"Who was the person that helped us?"

"I don"t know!"

"He appeared so suddenly, we weren"t even expecting it."


"Old Chen, is it one of your people?"

"No. How could the people under me have such advanced programming skills?"

"No one knows anything at all? If it were one of our own, how could there not be any news of who it is?"

"Old Li, what do you make of this?"

Li Weidong had not spoken yet. He kept quiet for a very long time before looking up and saying in a heavy tone, "This kind of programming technique, this style of doing things, this kind of efficiency, why do I keep thinking that it feels like someone?"

A cybersecurity expert who was in his 30s said in a startled manner, "Who?"

Li Weidong said, "—2."

"But that"s impossible!"

"FAN has already been placed under the custody of the Internet Surveillance Bureau!"

"Yeah, 2"s ident.i.ty has already been exposed."

But at this moment, a youth came running in.

The youth pushed open the door and shouted, "Go and look at the Korean government"s website!"

Li Weidong asked, "What happened?"

The youth said, "Go and take a look, quick!"

Korea.

Online.

"Go and check the government"s website!"

"What?"

"Oh my G.o.d!"

"How could this be!"

j.a.pan.

A hacker group.

"But that"s impossible!"

"This—this—"

America.

At the newly set up computer virus research group.

"Something has happened in Korea!"

"Quick, take a look!"

All of the cybersecurity experts were dumbfounded!

An official website of the Korean government had been hacked. If it were just a normal hack, it wouldn"t have mattered much. But this attack was different. Not only did the hacker leave behind a bright red five-starred flag on the website, there was also a message below it. Anyone who experienced the frightening Sino-Korean Hacker War would s.h.i.+ver at the sight of this message. It was a message that they wish they didn"t have to remember!

"Whoever offends the mighty nation of China, however distant, shall be destroyed!

"—2."

It was the same flag!

It was the same font!

It was the same style!

It was the same message!

It was 2!

He had once again appeared!

With 2"s appearance, the entire world blew up again!

"It"s 2!"

"f.u.c.k! It"s him!"

"He has appeared again! That fellow has appeared again!"

"Is it an imposter?"

"Imposter? Think about it. Other than 2, who else has the capability to create such a dangerous virus?"

"My G.o.d! He hasn"t been exposed!"

"The Koreans have had their attention on the wrong person!"

"I knew it! How could such a legendary hacker be found so easily!"

"So FAN and 2 are actually two different people! Thinking about it, it does seem obvious now. FAN and 2 have two absolutely different technical flairs and styles of doing things. FAN"s networking skills are very good, but from the revealed intel they have on her, her programming skills seem like they"re just run of the mill!"

"It"s over!"

"2 has returned!"

"This G.o.dly being has been provoked out of hiding!"

The entire world"s network technology field collapsed into panic!

The Korean hackers were dumbfounded!

The j.a.panese hackers were frightened!

The American hackers were also shaking with fear!

They all knew who 2 was, they all knew just how terrifying and dangerous an enemy this was. If they had known that 2 was not actually exposed and taken into custody, they would never have dared to take on China so blatantly. Who wouldn"t think of the consequences before doing something like that? The scenes in Korea from the fallout of the Panda Burning Incense were still fresh in their minds!

a.n.a.lyses!

Investigations!

Eventually, many research groups came to the conclusion that this person was undoubtedly 2!

There were many ways to identify a hacker: for example, through the unique styles in their programming or their technical flair.

When the confirmation of the news broke, an American hacker group immediately announced that they had no relation with the Korean hacker group that attacked China this time.

Following that, famous hacker group ONE announced that they would not "take a single step" into China in the next five years.

Gradually, the hacker groups that took part in the hacking of Chinese websites also issued statements. Some Korean hackers also expressed that they had not taken part in the operation and drew a clear line from those involved!

When the Chinese people saw this, they got extremely excited!

"Cool! This is so d.a.m.n cool!"

"My idol!"

"2 is so awesome!"

"This is what you call G.o.dly!"

"Whoever offends the mighty nation of China, however distant, shall be destroyed! Good! Good! Very good!"

"One man can hold the pa.s.s against ten thousand!"

"This is what a hacker truly is!"

"With 2 around, who dares come to China and bark at us!"

"Motherf.u.c.ker, how domineering!"

On the same night.

The world hacker rankings, which had not had any activity for a long time, was finally seeing some change!

The world"s most wanted hacker with the highest bounty: Still 2.

But the names on the hacker rankings saw some changes. This was a ranking that took into consideration the overall technical skills of all known hackers around the world!

First: 2!

2 had reached the summit of the global hacker ranking list!

The most interesting part of this was the comment in the remarks.

2"s introduction on the global hackers ranking only consisted of one sentence:

"The world"s most dangerous hacker in a hundred years!"Check out Chapter 449

© 2024 www.topnovel.cc