菠萝蜜视频污在菠萝蜜视频在线观看

Chapter 335 Defeated



Since Jack wasn\'t willing to let go of those that had attacked him, he had tracked their location, and found them. After finding them, he did his investigation, and found out that none of them had any good records on them.

And for that reason, even though he knew that these people were used by the Zigo government, he didn\'t care. Since none of them was a good person anyway, then, if they were let go, then they would definitely continue with what they were doing before.

Who knew if they were going to attack him another time? That was something that he wasn\'t ready to deal with. He himself was busy, and wasn\'t going to counter attack every now and then.

So, using his computer mastery skills, he easily hacked into Zigo defense system, and managed to take over the missile control system. Without even giving time for the defense system to react, he launched a medium range ballistic missile.

Even though he could take over an intercontinental ballistic missile, Jack didn\'t bother with that. Even though it was true that his company had been attacked, it was not the whole of Zigo that had attacked him.

Since he already knew about the location that all the hackers were present, and he knew that there were no any innocent lives there, then he didn\'t hold back at all.

With the launching of the medium range ballistic missile he finally turned his attention towards a new program that had suddenly appeared.

As for the consequences of launching the missile, that was something that he didn\'t even think about. Not to mention the fact that he had already done his investigation, to make sure that he didn\'t involve any innocent life, it was also a matter of whether the other side had the capabilities of finding who it was that had launched the missile.

….

Inside another building that was located in a certain city within Zigo, there was a man who was in his late twenties. Around him, there were several computers whose screens had been lit.

Different programs had already been coded, waiting for him to launch them. He was just waiting for a signal, before he can begin.

At this moment, his expression was quite stiff. Even though it was true that he was targeted by different nations, that was due to the fact that he was a threat to them.

As usual, there was no military that was willing to be able to let a threat that could destroy them to wander around easily. He himself was not considered a bad person, but, to the evil people, he was of course bad.

The thing that he did the most was to target the corrupt officials. In case they had stolen a certain amount of money, then, he would simply steal the money back from them. And after that, he would distribute that amount of money to different people whom he was sure that their conditions were not good.

With him around, many of the corrupt officials had already experienced what fear was. For that reason, in case they stole a huge amount of money from somewhere, they would make sure that they would keep it in cash, rather than depositing it in a certain account, even if it was anonymous.

With the virtual nightmare, even if they had created an account that wasn\'t linked to their name, he was able to find it and steal the money from them.

They had tried several times to hire experts to help them in protecting that money, but they had never succeeded even once.

Of course, the virtual nightmare was not just a person who was in charge of stealing the money from the corrupt officers. Instead, after stealing from them, he would go ahead and expose their secrets.

Of course, amongst these corrupt offices, there were even some presidents that were involved. For that reason, these presidents were all removed from their positions due to the crimes that they had committed.

So, the other presidents that felt insecure about their position with the presence of the virtual nightmare, had already termed him as an evil hacker. For that reason, they had tried several means to try and get him, but with his skills, he was able to evade them.

But, the virtual nightmare wasn\'t lucky during his trip to Zigo. During this time, he had come over with his family, because there was a certain business that he wanted to take care of.

As for how Andrew was able to know about his child, that was still something that the virtual nightmare had not yet figured out.

Without a choice, this time, he had accepted a mission that he would never have carried out if he had any other choice.

And even though he was sure about his skills, he had decided to make enough preparations. This was his character. It had already been almost 2 weeks since he was told to prepare himself.

He had already utilized this chance to prepare enough programs, and each one of them was top notch. And of course, he had already prepared something that could be used against Zigo, in case they went against the agreement.

"Virtual nightmare, start attacking now. Don\'t give them a chance to react, attack them with your full capabilities!" Just as he was continuing with the wait, a voice came through the intercom that was present in the room.

"I got it. And, make sure that you keep your end of the deal." Virtual nightmare replied, before he turned his attention back to the computer screens.

He pressed one of the computer keyboards and on it, a map of Azima suddenly appeared. And after that, he began pressing the enter key, one after the other.I think you should take a look at

With each press of the keys, several programs were launched one after the other. Each and every one of them was more complex as compared to the attacks that had been launched by the group of hackers towards Azima.

Even though it was true that he wouldn\'t have wanted to do this, since he was doing it, then he was going to do it with his all might.

On the other end, Jack was just about to end the matter of hacking when suddenly, he detected that another program was launched. And, from the way that it looked, these programs were way more complex as compared to the previous ones.

His eyes narrowed when he saw that. He had never expected that the other side would not give up. Instead, after he had gotten rid of the trash, they had decided to take action with hackers finally.

But after observing the programs that have been launched, he suddenly noticed that all of them had the same style. With that, he suddenly came to a realization that all of these were launched by a single person.

This attracted his attention. During all this while, he had done several hackings but he had never met any skilled hacker as the one that he was facing right now. For that reason, this hacker had attracted his interest.

Just like always, Jack did not panic. Even though it was true that the other party was skilled in terms of hacking, as compared to him, the other party was not even considered an amateur. At most, he could be considered a beginner.

Since he had already previously created a defensive firewall, he didn\'t even bother to deal with the ones that had come over to attack. Instead, he went directly to trying to figure out where the location of the hacker was.

The moment that Jack began operating, the virtual nightmare realized it. The first thing that he came to realization with was the fact that, all his attacks were rendered useless.

And even before he could react, he suddenly detected that there was someone who was trying to infiltrate the defense system that he had set.

The virtual nightmare\'s eyes widened in surprise. This was the first time that he was encountering someone who was able to actually launch a counter attack on him.

But even so, he didn\'t panic. Instead, he turned his attention to another computer and pressed the enter key. The moment that button was pressed, another program was launched.

This was his defensive program that he had always used. And the moment that it was launched, it created a thick wall. And with the presence of the thick wall, he didn\'t believe that the other party that was attacking was going to be able to penetrate it.

The wall that have been set up was not just a matter of the size of thickness of the wall, but, there are various traps that had been laid on the wall. If anyone tried getting past the wall, they might actually find themselves being attacked.

The virtual nightmare was about to turn his attention to the programs that he had launched for attacking, when suddenly, the alarm that he had set went off.

This was the alarm system that he had set so that he could be informed in case the wall that he had set was about to be breached.

The virtual nightmare turned around and gazed at the screen of the computer that was in charge of defense incredulously. He had never expected that the defense that he had set would actually face the danger of being breached in just a matter of a few seconds.

Without hesitation, he immediately abandoned the other programs that were in charge of attacking, and focused on defense. He knew that if the other side came to know about his location, then, things were definitely going to be bad for him.

Clack! Clack! Clack!

Hurriedly, his fingers began typing. Even though the defensive firewall that he had set was quite strong, it was not his maximum limit. So, he began trying to patch the areas that were about to be breached, while at the same time trying to strengthen the whole firewall.

But soon, the virtual nightmare was struck with terror when he suddenly realized that, all actions that he was taking were useless.

The attacks that were launched by the attacking program could not be stopped at all. Had it not been for the fact that the wall that he had set up was so thick, then, it would have definitely been torn apart in just a matter of two seconds.

Sweat began forming on his forehead, as even his back was soaked in it. At this moment, his heart was not just worried about the other side that was attacking being able to breach his defenses. Instead, he was worried that with the failure of the mission, then, his son would definitely be in danger.

<Got You. Mind telling me who you are?>

Even though he had put in a lot of effort to try and prevent the wall that he had set up from being breached, the other side was so aggressive that he could do nothing to prevent it.

The moment that the firewall was breached, a set of words appeared on all the screens of the computers that were surrounding him.


Tip: You can use left, right, A and D keyboard keys to browse between chapters.