LATEST UPDATES

Published at 1st of March 2022 07:29:29 PM


Chapter 565

If audio player doesn't work, press Stop then Play button again




After wandering around here, Ma Yunfei has not been found yet. Jiang Yanhai simply observes the environment nearby, determines all the accurate information of the surrounding environment, and scans all their data directly through the scanning system.

Scan and confirm all the surrounding environment. When passing some self installed monitoring in the middle, Jiang Yanhai directly approached the other party and began to forcibly connect these installed monitoring servers with electronic warfare programs.

Anyway, as long as they are within the scope, after the connection is completed, there is no problem with the ability of electronic warfare procedures and remote control. It doesn't matter whether they are connected or not.

As long as they have that module, they don't connect. Electronic warfare programs can connect them secretly. After finishing all the private monitoring nearby, Jiang Yanhai began to walk back to his place all the way.

He wants to go back and change to the same hotel as Chu Ying. For the time being, it is estimated that Ma Yunfei is not so easy to find. This guy should be very low-key.

He should know that although it is not as powerful as the domestic wanted for him in China, it is still the scope controlled by the governments of the four countries. The wanted for him has not been cancelled at all. Naturally, he dare not make a high profile.

So if you want to find him, you have to be patient and not in a hurry.

All the way back, all encountered private surveillance cameras are all invaded by electronic warfare procedures, and then connected, then these are Jiang Yanhai's "EyeLiner", in the electronic warfare program to do these things, Jiang Yanhai is still doing another thing.

He secretly invaded NASA's servers in the United States through various broilers, that is, NASA. As one of the most powerful Aerospace organizations in the world, NASA has a terrible inventory of satellites and data in all aspects.

The reason for invading its server is not to invade it. Jiang Yanhai just wants to "borrow" a few satellites. After all, it's really inconvenient to go out without a signal, but it's much more convenient to invade a communication satellite.

NASA has non military communication satellites and various high-precision detection satellites. Jiang Yanhai can "borrow" the data of these satellites. Don't be so stingy.

Jiang Yanhai was engaged in these "concubines" last night. They will provide strong data support for themselves in space. NASA's server is just an excess.

The data connection between satellites is not difficult. The satellites are directly networked with each other, and then the communication satellites directly connect the data with their own EW programs. In this way, some other data, such as the data of synthetic aperture radar satellites, can also be called.

Although I can't control them to change their orbits, the data range scanned and photographed by synthetic aperture radar itself is extremely huge. As long as it is within its shooting range, I can secretly control and take a few photos.

Even do not use it to synthesize directly, and transfer all data back. The efficiency of their own EW program synthesis is higher and even clearer.

The control of these satellites is carried out under the control of electronic warfare procedures and two eggs.

However, to Jiang Yanhai's slight surprise, Jiang Yanhai found the super virus in NASA's server.

This thing infects more servers in the United States than in China.

Over the past two months, Jiang Yanhai has been monitoring the super virus. He found that the super virus seems to be in a dormant state.

It is not activated, or it is just hidden, does not steal and transmit data, and the mutual infection is only the self transmission of the virus, rather than being manipulated behind its back.

Does it mean that the maker of the virus is gone? Or do virus producers have to give up the control of these viruses for special reasons?

But anyway, it is true that the "ghost" virus is not controlled at present. However, we should not be careless about this. All key supercomputers and important servers of the military command system in China have installed firewalls written by Jiang Yanhai.

Because the source code of the firewall has been handed over, the state will certainly carefully check the permission setting. No matter who handed it in, it is impossible to fully believe such an important thing.

The "stealth bomb" virus is also under monitoring. It is constantly copying relevant files at a slow speed and transmitting them to the United States, and the transmitted content is naturally carefully prepared and processed.

Don't look at the past two months. It still takes time to complete. This kind of thing can't be fast.

As for whether Jiang Yanhai's program can steal things back, it depends on the follow-up. There will never be a lack of surprises in the world, will there? He a small program to pick up public information can accidentally pick up confidential information, let alone others.

When Jiang Yanhai returned to his hotel to check out, he got the first communication satellite in his hand. It was the satellite of an American civil communication provider. It was just a cooperation with NASA and the two sides borrowed satellite data from each other.

It is just convenient for Jiang Yanhai. It is better for civil use. Countless data transmission can cover up his whereabouts.

And... The company's communication satellites have data connections with each other. More importantly, they use the same firewall.

"Yes, yes, I have a global communication system." Jiang Yanhai couldn't help laughing at his mobile phone.

Using the other party's communication satellite and the powerful signal capture ability of electronic warfare program, his mobile phone now has satellite communication at any time.

When necessary, you can also borrow the powerful computing power of the satellite. However, the intrusion speed of synthetic aperture radar satellite is a little slower, and the level of firewall is higher. According to the current progress, it will take at least one day to complete it.

But it doesn't matter. Anyway, Jiang Yanhai doesn't have anything to use it for the time being.

After returning his hotel room, Jiang Yanhai went directly to the hotel where Chu Ying stayed. He booked a room with the front desk of the hotel and directly chose Chu Ying's opposite door. For Jiang Yanhai's accurate knowledge of the number of rooms in their hotel, the front desk didn't think much, but thought it was an old customer.

Skillfully check in Jiang Yanhai. On the upper floor, Jiang Yanhai went to his place of accommodation. Just when he came to Chu Ying's room, Er Dan gave him a direct warning.

In Chu Ying's next room, after someone heard the sound of the corridor, he stood behind the door with a pistol.

Jiang Yan went directly to his room with his bag on his back. He opened the door, entered the room directly and closed the door.

The scanning system scans the whole room without any problem. The person marked in the early warning system has returned to the room and is not at the door.

After pulling the curtain, Jiang Yanhai narrowed his eyes slightly. Now Chu Ying has been stared at? The man with the gun is definitely not the one who protects Chu Ying.

Chu Ying's room is a suite. The two bodyguards who follow Chu Ying must be in the same room with Chu Ying.




Please report us if you find any errors so we can fix it asap!


COMMENTS