419: I found you!

Any individual or group on the Internet has an IP. This is impossible to change. Su Ming changed his address three times in a row.

This caused the opponent’s attack to fail in an instant, and then he began to lurch, quietly observing these two data streams, he wanted to see how these two people would find themselves.



Su Ming was a bit playful, but Satan and the angel were a little surprised. Of course, they were only a little surprised, and then the two began to act.

They began to track Su Ming’s whereabouts through the traces left on the Internet.In just 30 seconds, the two found Su Ming again. Another person ran in front of Su Ming to intercept.

All three people are in the LAN. If you want to stay on the LAN, you have to stay somewhere. This place may be a web page or a computer.

The place where Su Ming hides is a computer. Seeing the other party so easily, he found himself. Su Ming is not surprised. He can also do this. The data on the Internet will not lie.

If you pass by somewhere, there will be residual data traces. Su Ming did not disguise or clear these data traces just now. The other party can find him. Su Ming is not surprised at all.

However, the opponent’s formation made him a little serious. One of the two data streams was blocked in the data output port of this computer, and the other was blocked in the data input port. What do they want to do? Close the door and fight the dog? Haha, just accompany you. Have fun!

Su Ming is also aggressive. Seeing the other party act like this, he feels a little uncomfortable. He feels that the other party despises himself a little – do you think that you can catch me by blocking the road?

Is it so simple? I’m not running away now, don’t you want to catch me? Then I’ll catch you guys too!

The so-called “catch” here refers to finding the real IP of the other party. Once the real IP is exposed, it means that your real address in the real world will also be exposed.

What Su Ming wants to do now is to find the real address of the two of them-the same as the real address of the shadow he found some time ago.

Su Ming started to act. He first set the target on the person behind him. As he started to attack, the two sides immediately broke out in a full-scale conflict.

Obviously, the other party was also prepared for a long time. Faced with Su Ming’s attack, this person did not shrink at all.The two used this small computer as the battlefield and began a fierce and cruel fight!

At the same time, the Northern Air Defense Command was holding an emergency meeting. The presiding officer of the meeting was Commander Lecce, who only heard him ask with a serious face: “Who can tell me what happened to the sirens that sounded just now?”

Security Minister James replied to 677 when he heard this.

“Your Excellency, the alarm is issued by a supercomputer. A hacker has just issued an application for access to the computer. According to the program we set, any unfamiliar id sends a data stream to it, and it will alarm as soon as possible.

Commander Lecce originally thought that the siren was caused by a threatening missile invading the airspace of the free country.

Hearing what James said at the moment, his hanging heart was slightly let go, but then, he thought of something, just listen to him uncertainly.

“Hacker again? James, is this hacker the one who hacked into my personal computer?”

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like