Novel Logo Xianovel
English
EN

Xianovel

English Indonesia
  • Edit Word
Home » Hello, Mr. Major General » Chapter 1029

Hello, Mr. Major General Chapter 1029

Prev Next Table of Contents

Settings saved..

Thinking of the force back to hold Huo Shaoheng’s hand, calmly said: “you just anti programming, I give you to block these attacks. ——I’ll hold you back as long as it takes. ”

Thinking of the force back to hold Huo Shaoheng’s hand, calmly said: “you just anti programming, I give you to block these attacks. ——I’ll hold you back as long as it takes. ”

Huo Shaoheng looked at the thought deeply, “together?”

Huo Shaoheng looked at the thought deeply, “together?”

“Together!”

“Together!”

Thinking of wearing a Bluetooth headset, the central control room staff said hello, took over the command.

Thinking of wearing a Bluetooth headset, the central control room staff said hello, took over the command.

“All parties are at my command. If you keep fighting with Lan Fang, I will break through the external network and compete with them as a private hacker. ”

“All parties are at my command. If you keep fighting with Lan Fang, I will break through the external network and compete with them as a private hacker. ”

Thinking of wearing a Bluetooth headset that can change the sound, quickly entered the network system.

Thinking of wearing a Bluetooth headset that can change the sound, quickly entered the network system.

As a string of instructions are typed into the system, the mind gradually sees another world, another network world composed of data and logic.

As a string of instructions are typed into the system, the mind gradually sees another world, another network world composed of data and logic.

In this world, you can’t tell whether the other party is a person or a machine.

In this world, you can’t tell whether the other party is a person or a machine.

It doesn’t matter who gives each command, man or machine.

It doesn’t matter who gives each command, man or machine.

What matters is who these directives serve and where they are taking us.

What matters is who these directives serve and where they are taking us.

When the blue side attacked the Chinese Empire Network and captured one node after another, a powerful force suddenly rose from their occupied area.

When the blue side attacked the Chinese Empire Network and captured one node after another, a powerful force suddenly rose from their occupied area.

First of all, she went into the three districts captured by the blue side. She found that, in addition to the resistance forces of the cabinet and the military headquarters, there was also an alliance of hackers organized automatically by the civil society!

First of all, she went into the three districts captured by the blue side. She found that, in addition to the resistance forces of the cabinet and the military headquarters, there was also an alliance of hackers organized automatically by the civil society!

These people may be ordinary programmers, students, managers, or clerks in real life, but because of their interest in the network, their familiarity with computers, and their love for the country, they organize themselves to fight against external attacks when they find that the national network system is under external attack!

These people may be ordinary programmers, students, managers, or clerks in real life, but because of their interest in the network, their familiarity with computers, and their love for the country, they organize themselves to fight against external attacks when they find that the national network system is under external attack!

They immediately realized their power.

They immediately realized their power.

Although ants are small, they are superior in number and can attack elephants.

Although ants are small, they are superior in number and can attack elephants.

I have an idea in my mind.

I have an idea in my mind.

Her hands flying, crackling on the keyboard, key out a command, let the network for their own use, the first choice with the blue side of the most arrogant skeleton will face confrontation!

Her hands flying, crackling on the keyboard, key out a command, let the network for their own use, the first choice with the blue side of the most arrogant skeleton will face confrontation!

She’s going to be the first to get ahead and give a warning!

She’s going to be the first to get ahead and give a warning!

The skull club’s attack is not brilliant. The repeated mass email is actually very primitive.

The skull club’s attack is not brilliant. The repeated mass email is actually very primitive.

Thinking about it, he quickly repelled the attack of the skull and bones Association, and took advantage of the victory and pursuit, followed the other party’s attack route retrograde, and cracked the skeleton club’s back door program at one fell swoop!

Thinking about it, he quickly repelled the attack of the skull and bones Association, and took advantage of the victory and pursuit, followed the other party’s attack route retrograde, and cracked the skeleton club’s back door program at one fell swoop!

Then, she released her logo target, a pink pig with a round, round, round tail!

Then, she released her logo target, a pink pig with a round, round, round tail!

“Pink pig!”

“Pink pig!”

“It’s a pink pig!”

“It’s a pink pig!”

“Here comes the pink pig!”

“Here comes the pink pig!”

“As urgent as a law! ——Pink piggy is here! The evil spirit is gone

“As urgent as a law! ——Pink piggy is here! The evil spirit is gone

The laughter and cheers on the Internet can be heard with your ears!

The laughter and cheers on the Internet can be heard with your ears!

Being beaten by the blue side, the still indomitable civil hacker alliance immediately considered the signal released and broke into the skeleton society’s intranet system.

Being beaten by the blue side, the still indomitable civil hacker alliance immediately considered the signal released and broke into the skeleton society’s intranet system.

Skeletons is one of the codes used by the US military secret laboratory, just like the pink pig.

Skeletons is one of the codes used by the US military secret laboratory, just like the pink pig.

The difference is that everyone knows that skeleton is one of the codes of the US military, but there is no exact information that pink pig is one of the codes of the Chinese imperial army.

The difference is that everyone knows that skeleton is one of the codes of the US military, but there is no exact information that pink pig is one of the codes of the Chinese imperial army.

It disappeared in the night sky half a year ago.

It disappeared in the night sky half a year ago.

Although many people suspect that this man is an internal member of the Chinese Imperial Army, no one has any clear evidence.

Although many people suspect that this man is an internal member of the Chinese Imperial Army, no one has any clear evidence.

This time, pink piggy is back in the river and still fighting for the Chinese Empire, but it is fighting with the folk hacker alliance. It seems that they are far away from the staff of the military headquarters and do not cooperate with each other.

This time, pink piggy is back in the river and still fighting for the Chinese Empire, but it is fighting with the folk hacker alliance. It seems that they are far away from the staff of the military headquarters and do not cooperate with each other.

In fact, the operation of the consideration is more appropriate to cooperate with the private hacker alliance.

In fact, the operation of the consideration is more appropriate to cooperate with the private hacker alliance.

When she appears on the network, she uses a civilian IP. Unless you are in the central control room, it is impossible to find out whether her IP is a real civil IP.

When she appears on the network, she uses a civilian IP. Unless you are in the central control room, it is impossible to find out whether her IP is a real civil IP.

At this time, the United States had not broken the central control room of the Chinese Empire, so they could only doubt it.

At this time, the United States had not broken the central control room of the Chinese Empire, so they could only doubt it.

When the “pink pig” logo is displayed, hackers all over the world are boiling!

When the “pink pig” logo is displayed, hackers all over the world are boiling!

They almost went to tell each other: the pink pig disappeared for half a year is back in the river!

They almost went to tell each other: the pink pig disappeared for half a year is back in the river!

All eyes are on the Chinese Empire Network on this war without smoke of gunpowder.

All eyes are on the Chinese Empire Network on this war without smoke of gunpowder.

“Don’t be discouraged. I’ll give you a set of code. You can attack each other’s terminal every five minutes, and occupy all the network bandwidth of the other party forcefully.”

“Don’t be discouraged. I’ll give you a set of code. You can attack each other’s terminal every five minutes, and occupy all the network bandwidth of the other party forcefully.”

In consideration of this, use the voice changing headset to contact the hacker alliance in the third district.

In consideration of this, use the voice changing headset to contact the hacker alliance in the third district.

Gradually, they joined more and more people, whether hackers or not, as long as they can use computers and send instructions with DOS, they all join in.

Gradually, they joined more and more people, whether hackers or not, as long as they can use computers and send instructions with DOS, they all join in.

Many people have great power. At this time, the power of the group finally appears!

Many people have great power. At this time, the power of the group finally appears!

When many spontaneous hackers helped to attack the terminal network of the secret laboratory in the United States, he hid himself. He tried to imitate the other party’s four lines of instructions with prolog, wrote a string of code, and sneaked in through the back door of the skull and bones Association, and made a circle in the other party’s intranet.Her program is not mature, and the other party’s understanding of intelligent programming is more mature than them.

When many spontaneous hackers helped to attack the terminal network of the secret laboratory in the United States, he hid himself. He tried to imitate the other party’s four lines of instructions with prolog, wrote a string of code, and sneaked in through the back door of the skull and bones Association, and made a circle in the other party’s intranet.Her program is not mature, and the other party’s understanding of intelligent programming is more mature than them.

Soon, she was found.

Soon, she was found.

Before being intercepted, he released his “pink pig” logo again, and took a screen capture to send it to a forum where hackers gathered.

Before being intercepted, he released his “pink pig” logo again, and took a screen capture to send it to a forum where hackers gathered.

“Brothers and sisters, do skeletons who want to go to the United States have a wave?” Think about it in the forum to leave the other side’s back door port and crack password.

“Brothers and sisters, do skeletons who want to go to the United States have a wave?” Think about it in the forum to leave the other side’s back door port and crack password.

This news set off a huge wave on the World Hacker forum.

This news set off a huge wave on the World Hacker forum.

American skeleton Association back door port and crack password!

American skeleton Association back door port and crack password!

How many people are begging for money outside!

How many people are begging for money outside!

Actually was “pink piggy” so easy to give up!

Actually was “pink piggy” so easy to give up!

This opportunity is so rare!

This opportunity is so rare!

As we all know, now that the back door port and the password are open, the skeleton will change the password immediately after learning.

As we all know, now that the back door port and the password are open, the skeleton will change the password immediately after learning.

So they have a very short time gap to use.

So they have a very short time gap to use.

Therefore, without saying a word, we all launched a general attack on the US military skeleton society terminal!

Therefore, without saying a word, we all launched a general attack on the US military skeleton society terminal!

The volume and quality of this attack is not comparable to that of the civil hacker alliance in the three regions of the Chinese Empire.

The volume and quality of this attack is not comparable to that of the civil hacker alliance in the three regions of the Chinese Empire.

The United States attacks other countries’ network systems all the time, looking for loopholes in other countries’ networks. Similarly, other countries are also interested in American network systems and loopholes.

The United States attacks other countries’ network systems all the time, looking for loopholes in other countries’ networks. Similarly, other countries are also interested in American network systems and loopholes.

The contest never stops.

The contest never stops.

When the U.S. military secret laboratory staff found that their network suddenly crowded, even a simple command is difficult to send out, only then realized what the problem was.

When the U.S. military secret laboratory staff found that their network suddenly crowded, even a simple command is difficult to send out, only then realized what the problem was.

“Pink piggy again?”

“Pink piggy again?”

“Is it really in the Chinese Empire?”

“Is it really in the Chinese Empire?”

“I said last time that pink piggy should be an insider of the Chinese Empire. Don’t you believe it?! I don’t want to see who gets the best of it! ”

“I said last time that pink piggy should be an insider of the Chinese Empire. Don’t you believe it?! I don’t want to see who gets the best of it! ”

“It is true that this pink pig is an insider of the Chinese Empire, but the question is whether he is a member of the government, the military or the people, which is the key.”

“It is true that this pink pig is an insider of the Chinese Empire, but the question is whether he is a member of the government, the military or the people, which is the key.”

“What’s the matter? If it’s non-governmental people, you still want to recruit them? ”

“What’s the matter? If it’s non-governmental people, you still want to recruit them? ”

“Of course.” “I’m not aiming at anyone, but compared with pink pigs, all of you are rubbish!” said the head of the US military secret laboratory

“Of course.” “I’m not aiming at anyone, but compared with pink pigs, all of you are rubbish!” said the head of the US military secret laboratory

Everyone looked at their leader with the dog’s expression.

Everyone looked at their leader with the dog’s expression.

Have you said that about your subordinates?!

Have you said that about your subordinates?!

“FXXK! Can’t bear it

“FXXK! Can’t bear it

“Fight with him!”

“Fight with him!”

These stimulated military laboratory staff once again engaged in the crazy attack on the Chinese Empire.

These stimulated military laboratory staff once again engaged in the crazy attack on the Chinese Empire.

This time, though, he has won precious time for Huo Shaoheng.

This time, though, he has won precious time for Huo Shaoheng.

Huo Shaoheng finally cut off the logic link of the four lines of instructions, turning it from an intelligent program that can carry out logical analysis and secondary programming by itself into a common source code.

Huo Shaoheng finally cut off the logic link of the four lines of instructions, turning it from an intelligent program that can carry out logical analysis and secondary programming by itself into a common source code.

Stripped of the intelligent system of this program, you can see what the source code behind it is doing.

Stripped of the intelligent system of this program, you can see what the source code behind it is doing.

Huo Shaoheng nervously browses the source code, at the same time, according to the source code, he looks for what the four instructions have done, the hidden data, and the misleading direction in the system.

Huo Shaoheng nervously browses the source code, at the same time, according to the source code, he looks for what the four instructions have done, the hidden data, and the misleading direction in the system.

At this time, I have been wandering in all 27 districts of the Chinese Empire and returned.

At this time, I have been wandering in all 27 districts of the Chinese Empire and returned.

After understanding the situation that each district is attacked by the blue dot or even captured, he has an idea.

After understanding the situation that each district is attacked by the blue dot or even captured, he has an idea.

Her slender fingers were flying like butterfly wings, and soon she gave orders one by one, starting from zone one, setting obstacles for those invading blue dots.

Her slender fingers were flying like butterfly wings, and soon she gave orders one by one, starting from zone one, setting obstacles for those invading blue dots.

One by one, they leave traces without hesitation to erase, just like her devourer. Exe, every intruder, can only be used to strengthen her appetite!

One by one, they leave traces without hesitation to erase, just like her devourer. Exe, every intruder, can only be used to strengthen her appetite!

Those who don’t beat me will only make me stronger!

Those who don’t beat me will only make me stronger!

……

……

The secret laboratory on the other side of the ocean just changed the back door port and reset the password of the skull and bones club, and then beat back the first wave of network attack.

The secret laboratory on the other side of the ocean just changed the back door port and reset the password of the skull and bones club, and then beat back the first wave of network attack.

But soon, they found out that after the first blow, they were facing the second one!

But soon, they found out that after the first blow, they were facing the second one!

“Report! We’ve lost a lot of data! ”

“Report! We’ve lost a lot of data! ”

“Report! There is a phagocytosis program in the first district of the Chinese Empire

“Report! There is a phagocytosis program in the first district of the Chinese Empire

“Report! Request evacuation! ”

“Report! Request evacuation! ”

“Report! Request evacuation! ”

“Report! Request evacuation! ”

“If we don’t withdraw now, we can’t get all the information we have!”

“If we don’t withdraw now, we can’t get all the information we have!”

The head of the U.S. military secret laboratory kicked the computer desk, “fxxk! Pull-back! Pull-back!”

The head of the U.S. military secret laboratory kicked the computer desk, “fxxk! Pull-back! Pull-back!”

Just as the U.S. military retreats, we are thinking about it together Troy.exe Package it, disguise it with an intelligent program, and put it in the information data collected by the blue retreating people.

Just as the U.S. military retreats, we are thinking about it together Troy.exe Package it, disguise it with an intelligent program, and put it in the information data collected by the blue retreating people.

This small program is called Trojan horse program. It’s just a small virus program that you can grab on the Internet.

This small program is called Trojan horse program. It’s just a small virus program that you can grab on the Internet.

It’s not very useful. It will only wipe out all the data that the US military seized from the Chinese imperial network this time, and erase all the hard disk data of the other party!

It’s not very useful. It will only wipe out all the data that the US military seized from the Chinese imperial network this time, and erase all the hard disk data of the other party!

An hour later, the frenzied cyber attack finally stopped.In the central control room of the headquarters of the special operations department, the staff did not dare to take it lightly. They were still staring at their own territory nervously and constantly scanning the network with software for fear of “time bombs” left by the other side.

An hour later, the frenzied cyber attack finally stopped.In the central control room of the headquarters of the special operations department, the staff did not dare to take it lightly. They were still staring at their own territory nervously and constantly scanning the network with software for fear of “time bombs” left by the other side.

She believes that the best defense is attack, so her strategy perfectly implements this principle.

She believes that the best defense is attack, so her strategy perfectly implements this principle.

When you raise a butcher’s knife to someone else, you’ll also reveal your deadly heart.

When you raise a butcher’s knife to someone else, you’ll also reveal your deadly heart.

In the secret laboratory of the U.S. military, the laboratory staff in white coats outside the military uniform took tissue to wipe their sweat, and said with fear: “fortunately, we withdrew early. This time, the harvest is still a lot. ——Let’s enjoy the most mysterious intranet system of the Chinese Empire

In the secret laboratory of the U.S. military, the laboratory staff in white coats outside the military uniform took tissue to wipe their sweat, and said with fear: “fortunately, we withdrew early. This time, the harvest is still a lot. ——Let’s enjoy the most mysterious intranet system of the Chinese Empire

This is the third shift. It’s three o’clock today.

This is the third shift. It’s three o’clock today.

Remind relatives of the monthly and recommended tickets Oh!

Remind relatives of the monthly and recommended tickets Oh!

My dear, Mada!

My dear, Mada!

www.novelhold.com , the fastest update of the webnovel!

www.novelhold.com , the fastest update of the webnovel!

Prev Next Table of Contents

More Action Novels

  1. 10,000 Years In A Cultivation Sect: I Obtained A Powerful Technique From The Start
    No ratings yet. - 1 K views
  2. 108 Maidens of Destiny
    No ratings yet. - 1.6 K views
  3. 12 Hours After
    No ratings yet. - 419 views
  4. 21st Century Archmage
    No ratings yet. - 455 views
  5. 7 Killers
    No ratings yet. - 21 views
View more »

Popular Today

  1. Ferocious Boss: Hubby, Let’s Get Married (5 K views today)
  2. My Dangerous Billionaire Husband (2.9 K views today)
  3. Goodnight Kiss from My Rumored Husband (2.8 K views today)
  4. Godly Stay-Home Dad (2.7 K views today)
  5. Full Marks Hidden Marriage: Pick Up a Son, Get a Free Husband (2.6 K views today)
View more »

New Novels

  1. TESTING NOVEL (11 months ago)
  2. [Nightmare] (1 year ago)
  3. test novel (1 year ago)
  4. Reincarnated With The Strongest System (2 years ago)
  5. Zenith Online: Rebirth of the Strongest Player (2 years ago)
View more »

Recently Updated

  1. Zenith Online: Rebirth of the Strongest Player: Chapter 592
  2. test novel: Chapter 1
  3. WIFE-SPOILING MANIAC: Be Gentle with the arrogant prince charming: Chapter 1693
  4. President, I love being a father!: Chapter 1625
  5. Reincarnated With The Strongest System: Chapter 1474 Two Million Words Of Gratitude [FIN]
  • arrow_back_ios
  • toc
  • miscellaneous_services
  • all_inclusive
  • arrow_forward_ios
close

Settings


Font
  • Default
  • Arial
  • Nunito
  • Merriweather
  • Fira Sans
  • Segoe UI
  • Verdana
  • Tahoma
Background
Size refresh
  • remove
  • 16
  • add
Line Height
Glossary

Chapters


Login

Login


Register forget password
Report
Add Glossary (Hello, Mr. Major General)


Replacer
No Original Term Replace With Case Sensitive Hapus





Category Daily Rank Forget Genre Glossary Glossary Page Latest Update Library login Lost Password New Novel Novel-List Profile Register Sample Page Search Upcoming
Copyright © 2025 - Xianovel
Login Register