Chapter 1489 - The world's most dangerous hacker in a hundred years!
I am Really a Superstar
Translator: Legge Editor: Legge
The global atmosphere was changing!
People were panicking!
On this day, the entire world was shrouded in the shadow of the CIH virus.
Subsequently, cybersecurity experts from around the world urgently formed a computer virus research group and began trying to crack the virusâs code. However, they made extremely slow progress on it and were unable to come up with an ad hoc solution.
âItâs not working!â
âPete, how is it going?â
âAnother machine has been scrapped!â
âDammit!â
âThis virus is too dangerous!â
âThe creator must be a lunatic!â
âHas it started to spread?â
âFortunately, not for the time being.â
âYeah, due to the virus creatorâs rules in the coding, there hasnât been any widespread transmission of the virus yet. But that doesnât mean that we can relax. We have to find out if the creator explicitly limited the spread of the virus, not that he couldnât achieve the effect. This virus is like a ticking time bomb!â
âWho could it be?â
âIt definitely originated from China!â
â¦
Korea.
The citizens also broke down.
âOur hackers have been totally wiped out?â
âAll of them got infected by a computer virus?â
âThereâs no one left at all?â
âHow the hell did that happen!â
âSuch a dangerous hacker still exists in China?ân/ô/vel/b//in dot c//om
â¦
Japan.
âIs it a Chinese person?â
âIt has to be.â
âThe many, multinational hackers attacking the Chinese Internet were inexplicably infected with a virus and wiped out while the Chinese hackers remained unaffected. It would be a wonder if it werenât them!â
âChina really is full of hidden talent.â
âThere are too many dangerous people in China!â
âYeah. There was 2 previously, and now, another one has popped out?â
â¦
China.
âHoly shit! Damn!â
âIs it really our people?â
âThis is so cool!â
âMotherfucker, Iâm getting so heated!â
âGood job! Well done getting them!â
âTheyâve been hacking us for so many days, but theyâve finally been annihilated!â
âWiped out in a single exchange? God! Thatâs so impressive!â
âWe have an ace among us! A true talent among the people!â
âDonât you guys find this to be very similar to the approach that the legendary hacker, 2, employed back then?â
âAh? It does feel like that, it really does!â
âBut 2 has already been taken into custody, no?â
âWhat do you guys mean by that? Are you sayingâ?â
â¦
Somewhere.
Chinese cybersecurity experts had gathered.
Li Weidong, who had led a team to fight back against the multinational hackers this time, was also present.
âWho was the person that helped us?â
âI donât know!â
âHe appeared so suddenly, we werenât even expecting it.â
âOld Chen, is it one of your people?â
âNo. How could the people under me have such advanced programming skills?â
âNo one knows anything at all? If it were one of our own, how could there not be any news of who it is?â
âOld Li, what do you make of this?â
Li Weidong had not spoken yet. He kept quiet for a very long time before looking up and saying in a heavy tone, âThis kind of programming technique, this style of doing things, this kind of efficiency, why do I keep thinking that it feels like someone?â
A cybersecurity expert who was in his 30s said in a startled manner, âWho?â
Li Weidong said, ââ2.â
âBut thatâs impossible!â
âFAN has already been placed under the custody of the Internet Surveillance Bureau!â
âYeah, 2âs identity has already been exposed.â
But at this moment, a youth came running in.
The youth pushed open the door and shouted, âGo and look at the Korean governmentâs website!â
Li Weidong asked, âWhat happened?â
The youth said, âGo and take a look, quick!â
â¦
Korea.
Online.
âGo and check the governmentâs website!â
âWhat?â
âOh my God!â
âHow could this be!â
â¦
Japan.
A hacker group.
âBut thatâs impossible!â
âThisâthisââ
â¦
America.
At the newly set up computer virus research group.
âSomething has happened in Korea!â
âQuick, take a look!â
All of the cybersecurity experts were dumbfounded!
â¦
An official website of the Korean government had been hacked. If it were just a normal hack, it wouldnât have mattered much. But this attack was different. Not only did the hacker leave behind a bright red five-starred flag on the website, there was also a message below it. Anyone who experienced the frightening Sino-Korean Hacker War would shiver at the sight of this message. It was a message that they wish they didnât have to remember!
âWhoever offends the mighty nation of China, however distant, shall be destroyed!
ââ2.â
It was the same flag!
It was the same font!
It was the same style!
It was the same message!
It was 2!
He had once again appeared!
With 2âs appearance, the entire world blew up again!
âItâs 2!â
âFuck! Itâs him!â
âHe has appeared again! That fellow has appeared again!â
âIs it an imposter?â
âImposter? Think about it. Other than 2, who else has the capability to create such a dangerous virus?â
âMy God! He hasnât been exposed!â
âThe Koreans have had their attention on the wrong person!â
âI knew it! How could such a legendary hacker be found so easily!â
âSo FAN and 2 are actually two different people! Thinking about it, it does seem obvious now. FAN and 2 have two absolutely different technical flairs and styles of doing things. FANâs networking skills are very good, but from the revealed intel they have on her, her programming skills seem like theyâre just run of the mill!â
âItâs over!â
â2 has returned!â
âThis godly being has been provoked out of hiding!â
The entire worldâs network technology field collapsed into panic!
The Korean hackers were dumbfounded!
The Japanese hackers were frightened!
The American hackers were also shaking with fear!
They all knew who 2 was, they all knew just how terrifying and dangerous an enemy this was. If they had known that 2 was not actually exposed and taken into custody, they would never have dared to take on China so blatantly. Who wouldnât think of the consequences before doing something like that? The scenes in Korea from the fallout of the Panda Burning Incense were still fresh in their minds!
Analyses!
Investigations!
Eventually, many research groups came to the conclusion that this person was undoubtedly 2!
There were many ways to identify a hacker: for example, through the unique styles in their programming or their technical flair.
When the confirmation of the news broke, an American hacker group immediately announced that they had no relation with the Korean hacker group that attacked China this time.
Following that, famous hacker group ONE announced that they would not âtake a single stepâ into China in the next five years.
Gradually, the hacker groups that took part in the hacking of Chinese websites also issued statements. Some Korean hackers also expressed that they had not taken part in the operation and drew a clear line from those involved!
When the Chinese people saw this, they got extremely excited!
âCool! This is so damn cool!â
âMy idol!â
â2 is so awesome!â
âThis is what you call godly!â
âWhoever offends the mighty nation of China, however distant, shall be destroyed! Good! Good! Very good!â
âOne man can hold the pass against ten thousand!â
âThis is what a hacker truly is!â
âWith 2 around, who dares come to China and bark at us!â
âMotherfucker, how domineering!â
â¦
On the same night.
The world hacker rankings, which had not had any activity for a long time, was finally seeing some change!
The worldâs most wanted hacker with the highest bounty: Still 2.
But the names on the hacker rankings 1 saw some changes. This was a ranking that took into consideration the overall technical skills of all known hackers around the world!
First: 2!
2 had reached the summit of the global hacker ranking list!
The most interesting part of this was the comment in the remarks.
2âs introduction on the global hackers ranking only consisted of one sentence:
âThe worldâs most dangerous hacker in a hundred years!â