Chapter 281 Code
There was no imaginary structure behind the door, and the fake Lena had done enough work before the invasion.
Through various peripheral means, she obtained some drawings, and even collected enough information, just like a jigsaw puzzle, she summarized a huge amount of picture information one by one, and finally pieced together a diagram of the internal structure of the Rubik's Cube that she thought was relatively complete.
If you follow the patchwork map, this should be a hall with four doors leading to different functional areas.
But now, there were eight metal doors in front of her, and what was worse was that there were no signs on the doors, and she didn't know where to go.
"Damn it!" Fake Lena secretly gritted her teeth, "What's going on?!" ”
She was a little frustrated, it seemed that this time she was capsized in the gutter, and the internal structure diagram made with great effort was completely incorrect!
"Forget it!" She said to herself in her heart, "It's better to take a gamble!" ”
Her eyes fell on the third metal door, 3 was the lucky number of her zodiac sign, since she wanted to bet, she would bet on the number of her own auspicious points.
He stepped forward, picked up the black employee card and put it on the sensor, and with a bang, the door opened.
"Well, it's a big deal to spend a little more time, and you can always find the main room." She looked up at the military electronic watch on her left hand, which told her that it was 2 o'clock in the morning.
In addition to the need for special operations to work overtime, the company usually starts work at 8 o'clock in the morning, and at night the red zone is almost isolated, there are no living people in it, only the security system automatically monitors and operates, so there are still six hours to go.
She kept an eye on it, opened the PAD strapped to her forearm, pressed the scan button, and as the red laser was released, she performed a detailed scan of the structure here.
She adjusted the positioning system and turned on the recording function.
In this way, the system in the PAD can record the trajectory she has walked here, which is equivalent to the right way when she is in a hurry, and even if she finds something wrong, she can return the same way. This kind of military system is a classified high-tech application technology, which can only be used by a few developed countries at present, and most of them are used to equip special forces, so as not to use them when the environment is complex and they cannot receive GPS positioning information, so as not to cause them to get lost.
There is no light behind door 3, and in order to save time, Lena did not look for the switch of the lighting circuit, and who knows what other system will be triggered when the switch is turned on? The slightest movement may trigger an alarm.
"Doctor, you really don't need me to trap her?" Troy asked Finch puzzled by the fake Lena who was scurrying around in the Rubik's Cube like a fly on her brow.
"Didn't you want to trap her at first? Why are you asking me now? Finch said.
"I don't think she's malicious, so she doesn't have to do anything with those surveillance lines when she comes in, and I've shielded her," Troy said. ”
"How did you find out that she didn't have malicious intent?" Finch knew that the artificial intelligence system he designed back then had very strong computing power, and could use all kinds of tiny information to carry out comprehensive calculations in a unified manner, so as to predict the behavior trajectory of the other party.
A virtual electronic information screen popped up in the air, and the figure of the fake Lena appeared on the screen, and Troy controlled the monitoring probe, locked the body of the fake Lena, and scanned her whole body with different modes.
"A hand-held PAD, a BlackBerry, a ****** P99 pistol, 4 magazines, from the color of the warhead, belong to high-explosive shells; A butterfly folding knife, a small military laptop, an electronic USB flash drive......"
The fake Lena was almost see-through under the scanning of the surveillance probe, and all the things hidden in her body were listed one by one, and Troy even analyzed the threat generated by each item on the screen, and displayed them all on the screen.
It's a pity that the threat coefficient of 100 points is calculated, and the threat coefficient of the items on this intruder is pitifully small, and even the ****** P99 pistol equipped with a high-explosive warhead has a threat coefficient of only a pitiful 1, which is simply insignificant.
"Is she here to steal information?" Finch remembered that the data room was here, and maybe this guy had come in to steal the confidential files in the data room.
"No, there's only a 10% chance she'll steal the data, but ......," Troy displayed a new statistic on the screen, "and there's a 90% chance she'll come in and hack into the Sky Eye system." ”
“90%!” Finch's eyes rounded, "How did you come to this conclusion?" ”
"If it is stealing information, it is not easy to take away these large volumes of ancient books and archives in such a huge database, the easiest way is to do a quick scan or take pictures, but she does not have these devices, only a laptop computer and a USB flash drive, this USB flash drive only has a pitiful 2G, if it is to steal information, you can bring a larger capacity U disk, instead of using a 2G disk."
"Makes sense, Troy, you're getting smarter." Vinci couldn't help but feel a little proud, after all, Troy was his masterpiece.
"Just now, when she used her laptop to crack the access control code at the access control, I executed the anti-intrusion procedure." Troy said.
Finch's eyes lit up: "You hacked her laptop?" ”
"Yes, she didn't expect her laptop to be my target, and it only took me ten seconds to scan her entire hard drive." "Unfortunately, there are no valuable discoveries," Troy said. Her hard drive is full of hacking software, and the level of writing is passable, but it is still insignificant in the face of Skydome's powerful security system. ”
"You mean, you intentionally put water on her just now?" Finch said.
"Yes, she thought she had cracked the code herself, but I actually let it go on purpose. Because I found something even more interesting, I guess she's looking for me - the host room. ”
"That's right!" Finch slapped his thigh, "Your system is almost invulnerable, she can't break into it at all, and if you connect outside, the chance of breaking through the defenses is equal to zero......"
"So, it's easiest to go directly into the computer room, plug the USB flash drive with the hacking program directly into the host, and implant it into my main program." Troy said.
"Now that you know, you're letting her in?" Finch was puzzled.
"Because I'm amusing the things on her USB stick, so to speak......" Troy said: "I'm familiar with the things inside, and you're familiar with them, and I think it's very familiar, but I don't know why she brought this thing in......"
"What is it?" Finch said, "When did you hack her USB stick?" ”
"That's a wireless U disk, with a Bluetooth chip, and a battery board, which can transmit data directly through Bluetooth without plugging into the host. I booted it up while scanning my laptop and did a check, but unfortunately, I didn't have enough time and found only a small piece of code. Troy said.
"Code?" Finch's face was a little solemn and said, "Is it a virus code?" ”
"Nope." Troy said: "It's the first paragraph of the opening code of Prototype 1. ”
"Prototype One?!" Finch almost lost his voice and exclaimed.