Chapter 560 Hello, Borrow It (12500 Monthly Ticket Plus More!)
After strolling around here, I haven't found Ma Yunfei yet, so Jiang Yanhai simply observed the environment nearby, determined all the precise information about the surrounding environment, and scanned all their data directly through the scanning system.
Scanning all the surrounding environments to confirm, when passing by some monitors installed by himself, Jiang Yanhai directly approached the other party, and began to forcibly connect to these installed monitors with the electronic warfare program.
Anyway, as long as they are within range, it is fine. After the connection is completed, with the ability of electronic warfare programs, there is no problem with remote control. It is not important whether they are connected to the Internet or not.
As long as they have that module, they are not connected, and the electronic warfare program can secretly connect them. After getting all the private surveillance in the vicinity, Jiang Yanhai started walking back to where he lived.
He wants to go back and change to another hotel, to the same hotel as Chu Ying. For the time being, it is estimated that Ma Yunfei is not so easy to find. This guy should be very low-key.
He should be clear that although this place is not as powerful as the wanted of him in China, it is still controlled by the governments of the four countries.
So if you want to find him, you have to be patient and not in a hurry.
All the way back, all the private surveillance cameras encountered were invaded by the electronic warfare program one by one, and then connected. At that time, these were Jiang Yanhai's "eyeliners". When the electronic warfare program was doing this, Jiang Yanhai was still doing it. Another thing.
He secretly invaded the old American NASA server through various broilers, that is, the old American National Aeronautics and Space Administration. As one of the most powerful aerospace organizations in the world, NASA has quite a terrifying inventory of satellites and data in various aspects.
The reason for hacking its server was not to hack it, Jiang Yanhai just wanted to "borrow" a few satellites. After all, it's really inconvenient to have no signal when you are away from home, but if you hack a communication satellite, it will be much more convenient. .
NASA has non-military communication satellites and various high-precision detection satellites. Jiang Yanhai can "borrow" the data of these satellites. Don't be so stingy.
Jiang Yanhai was working on these "little concubines" last night. They will provide him with strong data support in space. NASA's servers are just an overkill.
The data connection between satellites is not difficult. The satellites are directly networked with each other, and then the communication satellites directly connect the data with their own electronic warfare programs. In this case, some other data, such as synthetic aperture radar satellites, are also available. ready to call.
Although it is said that I cannot control them to change their orbits, the range of data scanned by the synthetic aperture radar itself is extremely huge. As long as it is within its shooting range, it is still no problem to secretly control and take a few photos by myself.
You don't even use it to directly synthesize, pass all the data back, and your own electronic warfare program synthesis is more efficient and even clearer.
The control of these satellites is carried out under the control of electronic warfare programs and Erdan.
However, Jiang Yanhai was a little surprised that in the NASA server, Jiang Yanhai actually found that super virus again.
The number of servers infected by this thing in the United States is much higher than that in China.
For more than two months, Jiang Yanhai has been monitoring this super virus, and he found that this super virus seems to be in a dormant state.
It is not activated, or it is just hidden, and it does not steal and transmit data, and the mutual infection is only self-spreading by the virus, rather than being manipulated behind the scenes.
Could it be that the creator of the virus is no longer there? Or do virus producers have to give up the control of these viruses for special reasons?
But in any case, it is true that this "ghost" virus is currently not controlled. However, this matter should not be taken lightly. All key supercomputers in China and important servers in the military command system have installed firewalls written by Jiang Yanhai.
Because the source code of the firewall has been handed over, the country will definitely check carefully in terms of permission settings. No matter who handed over such an important thing, it is impossible to completely believe it.
It is the "stealth bomb" virus, which is also under monitoring. It is constantly copying relevant files at a slow speed and transmitting them to Laomei, and the content of the transmission is naturally carefully prepared and concocted.
Don't look at the past two months, it still takes time to complete, this kind of thing can't be fast.
As for whether Jiang Yanhai's program can steal something back, it depends on the follow-up. The world will never lack surprises, right? Even a small program of his to extract public information can accidentally extract confidential information, not to mention other things.
When Jiang Yanhai returned to his hotel to check out, he got the first communication satellite in his hand. It was a satellite of an American civil communication provider, but it was only in cooperation with NASA, and the two sides borrowed satellite data from each other.
It happened to be convenient for Jiang Yanhai, better for civilian use, and countless data transfers could cover up his whereabouts.
And...the company's communications satellites have data connections to each other, and more importantly, they all use the same firewall.
"Yes, yes, I now have a global communication system." Jiang Yanhai looked at his mobile phone and couldn't help laughing.
Borrowing the other party's communication satellite, the electronic warfare program has a strong ability to capture signals, and his mobile phone now has satellite communication available at any time.
And when necessary, you can also borrow the powerful computing power of the satellite, but the intrusion speed of the synthetic aperture radar satellite will be slower, and the level of the firewall is higher. According to the current progress, it will take at least a day to can get it done.
But it doesn't matter, anyway, Jiang Yanhai has nothing to use it for the time being.
After checking out of his hotel room, Jiang Yanhai went directly to the hotel where Chu Ying was staying, booked a room with the front desk of the hotel, and directly chose Chu Ying's door. I didn't think much about it, I just thought it was an old customer.
He checked in Jiang Yanhai proficiently, and when he reached the upper floor, Jiang Yanhai walked to his accommodation, and when he just walked to Chu Ying's room, Erdan gave him a direct warning.
In the next room of Chu Ying, someone stood behind the door with a pistol after hearing the sound in the corridor.
Jiang Yanhai went straight to his room with his bag on his back, opened the door, entered the room directly, and closed the door.
The scanning system scans the entire room without any problems. The person marked in the early warning system has returned to the room and is no longer at the door.
After drawing the curtains, Jiang Yanhai squinted slightly, now that Chu Ying has been targeted? The person with the gun was definitely not the one to protect Chu Ying.
Chu Ying's room was a suite, and the two bodyguards who followed Chu Ying must be in the same room as Chu Ying.