Chapter 452: Chapter 452: The Computer Destroyed Itself!
The sudden explosion left Lin Feng feeling utterly speechless. He had just hacked into the other party’s computer and even one extra minute would have been good, perhaps he could have unearthed so useful information.
But now, the unexpected explosion had destroyed everything. It’s done, he thought, still better go up and take a look. With that, Lin Feng suddenly vanished, wanting to see if there were any clues left to find.
However, when Lin Feng appeared in Ma Ming’s ho, he saw nothing but charred fragnts all around the room. Seeing two bodies near the wall, pierced with shards, he imdiately realized what had happened. Such an explosion was man-made, as an incident like a gas explosion wouldn’t result in such severe consequences. Moreover, judging by the position of the two corpses, the explosion must have happened close to the bed, near the window—otherwise, the bodies wouldn’t have been found against the wall, riddled with fragnts.
It seed a powerful bomb had been strategically placed in the room, otherwise, it wouldn’t have been blasted to this state. The timing of this explosion was just too coincidental, severing all his leads. There was nothing of use to find, and both people were unmistakably dead, ruling out any chance of questioning them. Without a doubt, soone must have reported such a massive explosion. The police and others would soon be here. With no other choice, Lin Feng decided to leave.
Shaking his head, Lin Feng disappeared from the room and went back to where he had been using the computer. Carrying it, he strolled leisurely towards the outside of the residential area, incessantly wondering who could have sent that woman...
anwhile, all the lights in the residential area switched on; the crying of children and the shouting of adults suddenly turned into a chaotic chorus. Everyone was clueless as to what had just happened. The sudden tremor and loud noise scared everyone into cowering within their hos, too terrified to step outside, with many lying on the floor praying incessantly...
...
After returning ho, Lin Feng greeted his parents and retreated to his room. He reflected deeply on the night’s events, and the more he thought about it, the stranger it seed. How could the bomb have been so coincidentally tid, not exploding earlier or later, but precisely when he had hacked into the computer? What was going on? Moreover, all of Li Hong’s actions that evening clearly indicated soone was targeting him, deliberately sending Li Hong to get close and retrieve sothing.
Although the lead with Li Hong had gone cold because the person they sent this ti was just an ordinary person skilled with knockout drugs, it would be a different story if they sent an ’assassin’ or soone of the sort next ti. Anything could happen...
The recent incident with Wang Youcai served as a warning to Lin Feng. He wasn’t afraid of anything, but everyone around him were just ordinary people. If soone had a motive and was already targeting him, they would certainly investigate everyone close to him and might even threaten him using so of these people. This was sothing Lin Feng did not want to see happen.
Hence, Lin Feng thought it best to nip all the bad possibilities in the bud, to prevent harm coming to those around him. It was a matter of principle. The person behind Li Hong had to be drawn out. Otherwise, having such a person lurking in the shadows was sothing Lin Feng felt was never quite right.
What puzzled Lin Feng the most now was the identity of the person behind Li Hong. What they could possibly want from him, and their readiness to silence Li Hong so resolutely upon the slightest risk of exposure—these were not actions a typical organization or individual could decisively undertake.
Without even knowing who they were, Lin Feng, despite his willingness, had no way of dealing with them. Thus, finding a lead was crucial. His only recourse was to return to the computer he had just hacked into, and the only possible source of clues now. Although he hadn’t managed to find directly relevant information earlier, there were still other thods to trace faint signs.
With that thought, Lin Feng reopened the computer and began to sort through the data packets he had intercepted and copied during the hack. He used his specially crafted decryption software and began furiously decompressing...
After a lengthy period, he finished decrypting the data packets. Then, using other software, he sifted out the useless ones and organized the remaining packets. He managed to sort so things out, though not all data packets could be intercepted, so the sorted data could only provide very limited information.
Putting together a few disjointed words from the most critical packets, Lin Feng felt that his suspicions were correct. Within the data packets of that specific tifra, there was a duration with only one contact, which could very well be the person behind Li Hong.
After peeling away the layers, an IP address erged. Seeing this IP address, Lin Feng smiled. With this, things would be much easier.
Thinking of this, Lin Feng began to use hacking techniques to infiltrate this IP address. After passing through multiple checkpoints and analyzing the vulnerabilities of the other party’s computer, what Lin Feng didn’t expect was when his custom software scanned the other party’s 791 port, their computer suddenly went offline...
All of Lin Feng’s efforts had been in vain, and despite not giving in and repeatedly attacking this IP address, the other party’s computer never ca back online. With no other choice, Lin Feng finally shut down his computer. By now, he could guess that the other party hadn’t just turned off their machine, but rather, their computer had a self-destruct program that would activate if any signals attempted to find vulnerabilities in other ports, ensuring the total concealnt of their information.
This incident reminded Lin Feng of sothing. After the events in Lin Family Village, he tried to investigate the person behind Bi Huihuang by using Bi Huihuang’s cellphone number. He found a number that wasn’t frequently used, but when he tried to locate it, he found he didn’t have sufficient authorization.
However, he found another location linked to this number for internet access, and at that ti, he followed this IP address and tried to breach it. The sa thing that happened tonight occurred then—when he scanned port 791, the other machine beca impossible to find, as if it had sunk into the deep sea.
More importantly, just like tonight, as soon as the software scanned port 791, the other party went offline imdiately, suggesting that the protection systems on both computers were the sa self-destruct systems. This ant that the person behind Bi Huihuang and the one behind Li Hong must have a peculiar relationship, or to say, the person behind Bi Huihuang and Li Hong might actually be the sa individual!
At this point, things were sowhat clear, although the reason why the person behind the scenes sent Li Hong over and why they severed all ties so abruptly remained unknown. But such matters couldn’t be left to their whims. Lin Feng felt that for the sake of his family and friends, he couldn’t let this puppet master go. He needed to think carefully about how to eradicate this adversary working against him from the shadows.
With this thought, Lin Feng closed his eyes, his mind racing with ideas...
...
Lin Feng didn’t know that at the very mont he lost contact with that computer, a commotion had already erupted on the other side of the ocean.
Jack was in his office handling other matters when he suddenly heard a loud bang—the machine he used to communicate with all his informants had burnt out. Seeing this, Jack imdiately understood what it ant; it ant that a hacker had detected a problem and tried to access the desired information on his computer.
What the hacker didn’t anticipate was that Jack’s computer employed both active and passive defense systems. Although the surface defenses weren’t easy to breach, the passive self-destruct system was far more crucial. If it detected an attack on an uncommon port, the computer would certainly self-destruct, severing the network connection and frying its own hard drive.
Jack wasn’t worried about losing any data because all important files were saved in a separate external storage space; the destruction of the computer’s hard drive didn’t matter much, and at most, it ant getting a new computer.
But suddenly, Jack realized, wasn’t this exactly what the boss had anticipated? What if... if there hadn’t been a self-destruct system on the computer, then... then...
Heavens, everything was exactly as the boss had predicted. Such a thing had truly happened! No, he had to inform the boss! With this thought, Jack’s face broke out in cold sweat as he ran back to Max Dorrell’s office.
"Boss! My computer was attacked by a hacker! It’s self-destructed, but all the data is still there, this... what’s going on? Could it really be as you said, that Lin Feng is targeting my computer? If it weren’t for the computer undergoing that top-level modification last ti and having a passive self-destruct program added to it, we would have been in serious trouble this ti!"
Jack rushed into Max Dorrell’s office in a panic, imdiately reporting the specifics of what had happened. The situation was really dangerous; thankfully the computer was one that the boss had a top-tier hacker tamper with. Otherwise, this incident could have been irreparable. If that information had leaked, even just a part of it, the consequences would be too severe for anyone to bear—unimaginable, as if the sky itself was falling!
Fortunately, when they were dealing with Cloud Fund so ti ago, Max Dorrell had hired several world-class hackers to crack the Cloud Managent System. While they were free, he had a few key computers modified, otherwise, the disaster that occurred today would have been irrevocable.
Reviews
All reviews (0)