Since I Was a Special Soldier

Chapter 589: Hello, borrow 1

\"爱书网\" visit address

After strolling around here, I haven't found Ma Yunfei yet. Jiang Yanhai simply observes the environment nearby, confirms all the accurate information of the surrounding environment, and scans all their data directly through the scanning system.

Scanning and confirming all the surrounding environment, when passing some self-installed monitors in the middle, Jiang Yanhai approached the opponent directly and used electronic warfare programs to forcibly connect to these monitor-installed servers.

Anyway, as long as they are within range, after the connection is completed, with the ability of the electronic warfare program, there is no problem with remote control at all. It doesn't matter whether they are connected or not.

As long as they have that module, they are not connected, and the electronic warfare program can secretly connect to them. After completing all the private surveillance in the vicinity, Jiang Yanhai began to walk back to where he lived along the way.

He wants to go back and change to the same hotel as Chu Ying. For the time being, it is estimated that Ma Yunfei is not so easy to find. This guy should be very low-key.

He should be clear that although it is not as strong as the wanted person in China, it is still under the control of the governments of the four countries. The wanted person has not been cancelled at all, so he naturally does not dare to make a high profile.

So if you want to find him, you have to be patient and not anxious.

All the way back, all the private surveillance cameras were invaded one by one by the electronic warfare program, and then they were connected. By then, these were Jiang Yanhai’s "eyeliners". When the electronic warfare program was doing this, Jiang Yanhai was still doing it. Another thing.

He surreptitiously invaded the server of Nasa of the United States through various broilers, which is the National Aeronautics and Space Administration of the United States. As one of the most powerful aerospace organizations in the world, Nasa has a very scary inventory of satellites and data in all aspects.

The reason for hacking its server is not to hack it. Jiang Yanhai just wants to "borrow" a few satellites. After all, it’s really not convenient to have no signal when you’re away from home, but if you hack into a communications satellite, it’s much more convenient. NS.

There are non-military communication satellites under the name of nasa, as well as various high-precision detection satellites. Jiang Yanhai can "borrow" the data of these satellites. Don't be so stingy.

Jiang Yanhai was engaged in these "little concubines" last night, and they will provide him with powerful data support in space. Nasa's server is just an excess.

The data connection between the satellites is not difficult. The satellites are directly connected to each other, and then the communication satellites directly connect the data to their own electronic warfare programs. In this case, other data, such as synthetic aperture radar satellites, are also used. Can be called.

Although I can't control them to change orbit, the range of data scanned and photographed by the synthetic aperture radar itself is extremely huge. As long as it is within its shooting range, it is no problem to secretly control and take a few photos by myself.

You don’t even use it to synthesize directly, and pass all the data back. The synthesis of your own electronic warfare program is more efficient and even clearer.

The control of these satellites is carried out under the control of the electronic warfare program and Erdan.

But what made Jiang Yanhai a little bit surprised was that Jiang Yanhai found the super virus on the nasa server.

This thing has infected more servers in the United States than in China.

For more than two months, Jiang Yanhai has been monitoring this super virus, and he found that this super virus seems to be in a dormant state.

It is not activated, or it is just concealed, and it does not steal and transmit data, and the mutual infection is only spread by the virus itself, rather than being manipulated by someone behind it.

Could it be that the creator of the virus is no longer there? Or is it that the creators of the viruses have to abandon the manipulation of these viruses for special reasons?

But in any case, it is true that this "ghost" virus is not currently controlled. However, this matter should not be taken carelessly. All key supercomputers in the country and important servers of the military command system are installed with a firewall written by Jiang Yanhai.

Because the source code of the firewall has been handed over, the country will definitely check the permissions carefully. No matter who handed it in, it is impossible to believe such an important thing.

It is the "stealth bomb" virus. Also in surveillance, it is constantly copying relevant files and transmitting them to the old United States at a slow speed, and the content of the transmission is naturally carefully prepared and concocted.

Regardless of the past two months, it will take time to complete, and this kind of thing can't be fast.

As for whether Jiang Yanhai's program can steal things back, it depends on the follow-up. There is never a shortage of surprises in this world, right? His small program that extracts public information can accidentally extract confidential information, let alone other things.

When Jiang Yanhai returned to his hotel to check out, the first communication satellite in his hand was obtained. It was a satellite of an American civilian communication provider. It was just a cooperation with Nasa, and the two parties borrowed satellite data from each other.

It's just convenient for Jiang Yanhai, it's better for civilian use, and countless data transfers can conceal his whereabouts.

And... the communication satellites of this company have data connections with each other, and more importantly, they all use the same firewall.

"Yes, yes, I have a global communication system." Jiang Yanhai couldn't help but smile when he looked at his mobile phone.

Borrowing the opponent's communication satellites, the electronic warfare program's powerful signal capture capabilities, his mobile phone now has satellite communication available at any time.

And when necessary, I can borrow the powerful computing power of satellites. However, the intrusion speed of synthetic aperture radar satellites will be a little slower. The level of the firewall is higher. According to the current progress, it will take at least one day. It can be done.

But it doesn't matter, anyway, for the time being, Jiang Yanhai has nothing to use it.

Retired from his hotel room~www.wuxiaspot.com~ Jiang Yanhai went directly to the hotel where Chu Ying was staying, booked a room with the front desk of the hotel, and directly chose Chu Ying’s opposite door. He knew exactly what Jiang Yanhai wanted from their hotel. For a few rooms, the front desk didn't think much about it, but thought it was an old customer.

Checked in Jiang Yanhai expertly. When he reached the upper floor, Jiang Yanhai walked to the place where he was staying. When he just walked to the side of Chu Ying's room, Erdan gave him a warning directly.

In Chu Ying's next room, after someone heard the sound of the corridor, he took a pistol and stood behind the door.

Jiang Yanhai went straight to his room with his bag unchanging, opened the door, entered the room directly, and closed the door.

The scanning system scanned the entire room again without any problems. The person marked in the early warning system has returned to the room and is not at the door.

After drawing the curtains, Jiang Yanhai squinted his eyes slightly. Now Chu Ying has been stared at? The man with the gun was definitely not the one who protected Chu Ying.

Chu Ying's room is a suite, and the two bodyguards who followed Chu Ying must be in the same room as Chu Ying.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like