Extreme Almightiest Young Master

Chapter 452: The Computer Destroyed Itself!



Chapter 452: The Computer Destroyed Itself!

The sudden explosion left Lin Feng feeling utterly speechless. He had just hacked into the other party’s computer and even one extra minute would have been good, perhaps he could have unearthed some useful information.

But now, the unexpected explosion had destroyed everything. It’s done, he thought, still better go up and take a look. With that, Lin Feng suddenly vanished, wanting to see if there were any clues left to find.

However, when Lin Feng appeared in Ma Ming’s home, he saw nothing but charred fragments all around the room. Seeing two bodies near the wall, pierced with shards, he immediately realized what had happened. Such an explosion was man-made, as an incident like a gas explosion wouldn’t result in such severe consequences. Moreover, judging by the position of the two corpses, the explosion must have happened close to the bed, near the window—otherwise, the bodies wouldn’t have been found against the wall, riddled with fragments.

It seemed a powerful bomb had been strategically placed in the room, otherwise, it wouldn’t have been blasted to this state. The timing of this explosion was just too coincidental, severing all his leads. There was nothing of use to find, and both people were unmistakably dead, ruling out any chance of questioning them. Without a doubt, someone must have reported such a massive explosion. The police and others would soon be here. With no other choice, Lin Feng decided to leave.

Shaking his head, Lin Feng disappeared from the room and went back to where he had been using the computer. Carrying it, he strolled leisurely towards the outside of the residential area, incessantly wondering who could have sent that woman...

Meanwhile, all the lights in the residential area switched on; the crying of children and the shouting of adults suddenly turned into a chaotic chorus. Everyone was clueless as to what had just happened. The sudden tremor and loud noise scared everyone into cowering within their homes, too terrified to step outside, with many lying on the floor praying incessantly...

...

After returning home, Lin Feng greeted his parents and retreated to his room. He reflected deeply on the night’s events, and the more he thought about it, the stranger it seemed. How could the bomb have been so coincidentally timed, not exploding earlier or later, but precisely when he had hacked into the computer? What was going on? Moreover, all of Li Hong’s actions that evening clearly indicated someone was targeting him, deliberately sending Li Hong to get close and retrieve something.

Although the lead with Li Hong had gone cold because the person they sent this time was just an ordinary person skilled with knockout drugs, it would be a different story if they sent an ’assassin’ or someone of the sort next time. Anything could happen...

The recent incident with Wang Youcai served as a warning to Lin Feng. He wasn’t afraid of anything, but everyone around him were just ordinary people. If someone had a motive and was already targeting him, they would certainly investigate everyone close to him and might even threaten him using some of these people. This was something Lin Feng did not want to see happen.

Hence, Lin Feng thought it best to nip all the bad possibilities in the bud, to prevent harm coming to those around him. It was a matter of principle. The person behind Li Hong had to be drawn out. Otherwise, having such a person lurking in the shadows was something Lin Feng felt was never quite right.

What puzzled Lin Feng the most now was the identity of the person behind Li Hong. What they could possibly want from him, and their readiness to silence Li Hong so resolutely upon the slightest risk of exposure—these were not actions a typical organization or individual could decisively undertake.

Without even knowing who they were, Lin Feng, despite his willingness, had no way of dealing with them. Thus, finding a lead was crucial. His only recourse was to return to the computer he had just hacked into, and the only possible source of clues now. Although he hadn’t managed to find directly relevant information earlier, there were still other methods to trace faint signs.

With that thought, Lin Feng reopened the computer and began to sort through the data packets he had intercepted and copied during the hack. He used his specially crafted decryption software and began furiously decompressing...

After a lengthy period, he finished decrypting the data packets. Then, using other software, he sifted out the useless ones and organized the remaining packets. He managed to sort some things out, though not all data packets could be intercepted, so the sorted data could only provide very limited information.

Putting together a few disjointed words from the most critical packets, Lin Feng felt that his suspicions were correct. Within the data packets of that specific timeframe, there was a duration with only one contact, which could very well be the person behind Li Hong.

After peeling away the layers, an IP address emerged. Seeing this IP address, Lin Feng smiled. With this, things would be much easier.

Thinking of this, Lin Feng began to use hacking techniques to infiltrate this IP address. After passing through multiple checkpoints and analyzing the vulnerabilities of the other party’s computer, what Lin Feng didn’t expect was when his custom software scanned the other party’s 791 port, their computer suddenly went offline...

All of Lin Feng’s efforts had been in vain, and despite not giving in and repeatedly attacking this IP address, the other party’s computer never came back online. With no other choice, Lin Feng finally shut down his computer. By now, he could guess that the other party hadn’t just turned off their machine, but rather, their computer had a self-destruct program that would activate if any signals attempted to find vulnerabilities in other ports, ensuring the total concealment of their information.

This incident reminded Lin Feng of something. After the events in Lin Family Village, he tried to investigate the person behind Bi Huihuang by using Bi Huihuang’s cellphone number. He found a number that wasn’t frequently used, but when he tried to locate it, he found he didn’t have sufficient authorization.

However, he found another location linked to this number for internet access, and at that time, he followed this IP address and tried to breach it. The same thing that happened tonight occurred then—when he scanned port 791, the other machine became impossible to find, as if it had sunk into the deep sea.

More importantly, just like tonight, as soon as the software scanned port 791, the other party went offline immediately, suggesting that the protection systems on both computers were the same self-destruct systems. This meant that the person behind Bi Huihuang and the one behind Li Hong must have a peculiar relationship, or to say, the person behind Bi Huihuang and Li Hong might actually be the same individual!

At this point, things were somewhat clear, although the reason why the person behind the scenes sent Li Hong over and why they severed all ties so abruptly remained unknown. But such matters couldn’t be left to their whims. Lin Feng felt that for the sake of his family and friends, he couldn’t let this puppet master go. He needed to think carefully about how to eradicate this adversary working against him from the shadows.

With this thought, Lin Feng closed his eyes, his mind racing with ideas...

...

Lin Feng didn’t know that at the very moment he lost contact with that computer, a commotion had already erupted on the other side of the ocean.

Jack was in his office handling other matters when he suddenly heard a loud bang—the machine he used to communicate with all his informants had burnt out. Seeing this, Jack immediately understood what it meant; it meant that a hacker had detected a problem and tried to access the desired information on his computer.

What the hacker didn’t anticipate was that Jack’s computer employed both active and passive defense systems. Although the surface defenses weren’t easy to breach, the passive self-destruct system was far more crucial. If it detected an attack on an uncommon port, the computer would certainly self-destruct, severing the network connection and frying its own hard drive.

Jack wasn’t worried about losing any data because all important files were saved in a separate external storage space; the destruction of the computer’s hard drive didn’t matter much, and at most, it meant getting a new computer.

But suddenly, Jack realized, wasn’t this exactly what the boss had anticipated? What if... if there hadn’t been a self-destruct system on the computer, then... then...

Heavens, everything was exactly as the boss had predicted. Such a thing had truly happened! No, he had to inform the boss! With this thought, Jack’s face broke out in cold sweat as he ran back to Max Dorrell’s office.

"Boss! My computer was attacked by a hacker! It’s self-destructed, but all the data is still there, this... what’s going on? Could it really be as you said, that Lin Feng is targeting my computer? If it weren’t for the computer undergoing that top-level modification last time and having a passive self-destruct program added to it, we would have been in serious trouble this time!"

Jack rushed into Max Dorrell’s office in a panic, immediately reporting the specifics of what had happened. The situation was really dangerous; thankfully the computer was one that the boss had a top-tier hacker tamper with. Otherwise, this incident could have been irreparable. If that information had leaked, even just a part of it, the consequences would be too severe for anyone to bear—unimaginable, as if the sky itself was falling!

Fortunately, when they were dealing with Cloud Fund some time ago, Max Dorrell had hired several world-class hackers to crack the Cloud Management System. While they were free, he had a few key computers modified, otherwise, the disaster that occurred today would have been irrevocable.


Tip: You can use left, right, A and D keyboard keys to browse between chapters.