Hello, Mr. Major General

The first thousand and thirty chapters

In the secret laboratory, which was decorated very post-modern, the staff who had been busy for an hour all relaxed.

They sat awkwardly in their seats, almost holding a can of Coke, enjoying the aftermath of the war.

Although the final fortress of the Special Operations Department was not breached, many nodes of the Huaxia Empire intranet, including the website of the Special Operations Department branch, as well as the websites of the Cabinet and Parliament, were breached by them.

Now, it is indeed time to appreciate your trophy!

The person in charge of the secret laboratory of the US military pressed the "start" button with joy.

Yellow document packages appeared on the huge screen of the secret laboratory. As the graphics were turned and decompressed, documents were revealed before them.

Just when they were about to open the first decompressed file, the file package suddenly exploded like a dynamite package!

Just as fireworks suddenly bloomed on their display screens, all the data suddenly became horizontal and vertical lines!

The edges of the lines were shining with dark golden light, like mocking eyes, flashing and flashing, rotating and rolling, combined into various patterns, really exactly the same as their Independence Day firework party!

Everyone was stunned by this incident. For a moment, the entire secret laboratory was stunned. There was no one to speak for a long time, and the whole room was as quiet as the end of the world.

In the end, the person in charge reacted first.

"WTF! What happened?" he yelled wildly, "Who received the file package?!"

"...Stop! Don't open the file anymore! All the data received this time will be sent to the detection mailbox to filter the virus!"

A senior engineer suddenly realized something and stared at the Troy.exe executable program in a file package with fear, "There is a Trojan horse! Trojan horse!"

In ancient Greek legends, the Greeks could not beat Troy.

Later, a Greek commander thought of a way.

He let people build a huge wooden horse, which has an empty belly and can hide people.

He hid the Greek warrior in the belly of the wooden horse and placed it outside Troy, where the others hid secretly.

Troy, who had been under siege for a long time, couldn't see the Greeks anymore, thinking that the Greeks had retired, they dragged the wooden horses placed outside their city into the city as trophies.

At night, when the Trojans were all asleep, the Greeks hiding in the belly of the Trojan took the advantage of the night to slaughter the Trojans and take the city of Troy.

Since then, the Trojan horse has become synonymous with self-citing foreign enemies and self-sustaining.

Gu Nianzhi temporarily grabbed the modified Trojan horse virus using the same principle.

Because when the Americans retreated, they downloaded as much of the system information and content of the China Empire Network as possible. Gu Nianzhi took this opportunity to disguise her Trojan horse program as key system information and stuffed them into theirs. Download the package.

"What? There is a Trojan horse virus?!"

This person's greeting was still a step late.

When everyone woke up, the Troy.exe file had been executed.

It is not a smart program, it does not program twice, and it does not hide latency.

It will only faithfully execute the command the programmer gave it: obliterate all content data!

After these people in the secret laboratory withdrew, they did not expect them to "bring in" a huge "trojan horse"!

The computer used to play system files was connected to the host. At this moment, when countless fireworks were released on the huge screen, their system was crashing and their hard disk was wiped out!

In less than a second, all the file packages downloaded and brought back from the China Empire Network were deleted cleanly, and then developed to all the computers connected to the host!

"Shut down! Forced shutdown!"

"Oh! No! ShXt! ShXt! ShXt! ShXt!"

The head of the U.S. Army’s secret laboratory grabbed his little hair, roaring like a bereaved concubine,

The person in charge's howl finally awakened the dumbfounded staff.

They quickly mobilized, shutting down, shutting down, powering off, some people pulling out the network cable, and even smashing the host with a hammer!

Because that Troy.exe is too powerful, it is not complicated, nor smart, it only has one function, that is, delete!

When a simple and clear program, in a powerful computer, it is extremely fast and easy to delete data day by day, perfect interpretation of the word "virus", it is lightning-like infection and intrusion of data.

UI.

The program is the same, so the processing speed of the computer's CPU is the most critical data indicator that determines the quality of the computer.

But at this time, the faster the CPU can only speed up the deletion of Troy.exe.

When the speed at which they shut down cannot keep up with the speed at which the computer is infected, they have to come hard, smash the host, and cause physical damage to prevent this program from invading the cloud system from the hard disk. That would be deadly!

The circuit system of the laboratory was also affected. The ceiling lights were on and off, illuminating the entire post-modern decorated secret laboratory like a doomsday catastrophe.

Countless expensive equipment was destroyed, and the data of many years of hard work was also deleted without a trace.

If there is a backup, the problem is that their secret laboratory is the most confidential in the United States. This is the base for many server backups of the US military!

They can only watch the storage devices of the backup base be destroyed and the data deleted!

Just when they were exhausted and thought they had finally stopped the Trojan horse program from running, a bright halo suddenly appeared on the large screen on the wall.

A cute pink piglet walked out of the aperture, rolled at them twice, then turned around, turned his back to them, revealing a short tail on the fat little ass and shook it.

Then the aperture gradually narrowed, and the pink and tender piglet disappeared into the aperture.

"WTF! Pink Piglet again!"

The person in charge of the secret laboratory let out an earth-shattering wailing, completely devoid of the mood and momentum that he had just wanted to solicit the "Pink Pig".

He rushed out of the laboratory, grabbed the base phone, and dialed the CIA without thinking.

"I want the head of the'Pink Pig'! I want to catch him to the United States! Bring him to justice! I want to shoot him personally! I want to cut off his skin and make a thangka! Each of you has an office Hang one!"

He yelled hysterically: "I don't care what method you use! I want you to catch the'Pink Pig'! Extradited back to the United States! No matter what country he is! No matter where he is! No one has ever taken advantage of me! Without paying the price!"

The person in charge of the secret laboratory of the US military is also an unborn genius. He has led a number of top-secret experiments by the US military that cannot be made public, and provided countless technical support for the US military, the US Central Intelligence Agency and the FBI.

He is arrogant and arrogant, even disdainful of his name, calling himself Mr. X, without a surname, no name, only a code name.

He loves the United States and has sworn since the day he joined the U.S. military that he will spend his entire life loyal to the United States and the U.S. military.

In this world, only the United States is the number one blue star superpower, and he only allows the United States to be the number one power.

Only he can abuse others, not others abuse him.

If someone abuses him, then this person must not exist in this world.

He does not allow such people to exist!

On the other end of the phone is the Director of the Central Intelligence Agency, one of the most powerful people in the United States.

When he learned of the devastating blow to the military's secret laboratory, he was frightened.

He shot the case in a rage: "The China Empire deceived so much! How dare to launch a cyber attack on our country! What a shame! -on-them!"

When he said this, he completely ignored that this cyber warfare was initiated by his secret military laboratory.

Because for him, the invasion of other countries’ networks by secret laboratories of the US military is "U.S. military daily" and beyond reproach, and other countries need to respect the "U.S. military daily."

But being counter-killed by others is treason!

Violation of international law!

Violation of international morality and standards!

A war of public opinion must be launched around the world to denounce the brazen "hegemonic" country China Empire!

The director of the US Central Intelligence Agency put down the phone and immediately called his right-hand man over, "You immediately contact our people and let them do it. Also, immediately call the White House and tell the president that I want to see him immediately and let him Do not tweet for 24 hours!"

This is the first one.Three shifts today.

Remind you of the monthly and recommended tickets!

At one o'clock in the afternoon, the monthly ticket is 2400 plus more.

The third one at seven o'clock in the evening.

muah!