(Don’t click yet, this chapter will be completed as soon as possible. If you have already clicked, remember to refresh and read again)
The organization's information cannot be viewed on computers outside the organization, otherwise the Night Baron virus that has long been hidden in the information will activate and destroy all the information.
However, precisely because I knew this, after I retrieved the data yesterday, I turned to the remote controller Pisco's computer to analyze the data——
Since Pisco's computer itself is a computer within the organization, it can check the organization's information. In addition, Xiaoai used that computer to find the information of APTX4869 yesterday. Through this method of digging deeper, Gao Yuan quickly He retrieved all the information about APTX4869 that could be obtained from the organization system, and then transferred it to the storage. This is how Xiao Ai is sorting out the information now.
However, in addition, there is a lot of other information...
At that time, I had already hacked into the organization's system, so I just accepted whoever came and took whatever I could. I easily got a lot of unknown information from the system.
However, immediately, the system administrator within the organization should have discovered such a bold behavior of his, and then the permissions of the Pisco computer were revoked, and he could no longer use that computer to view the data.
Now, I have a bunch of information about the organization in my hand, just like the information I got from Professor Hirota Masami. If the threat of the "Night Baron Virus" cannot be completely resolved, I will not be able to check that information at all. content inside.
……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ……………………………………………………………………………………………………………………………… ………………………………(End of this chapter)