Ye Hai wasn't very skilled in hacking techniques, which is why his computer was easily invaded without him noticing. However, he didn't mind; his exceptional learning ability would allow him to quickly become a powerful hacker.
Ye Hai didn't alert his security software—after all, there wasn't anything particularly important on his computer apart from some books and simple documents. He first browsed through some specialized hacking websites, then bought dozens of professional books online on topics like assembly language programming, encryption and decryption techniques, trojan and worm technologies, and knowledge on intrusion and prevention, among others, in a wide variety of categories.
Because the knowledge of the internet is extremely complex, most hacker groups are categorized, with each member specializing in a certain area, making them more proficient than other members in that field. However, Ye Hai was different. His remarkable learning ability enabled him to master all aspects of hacking. After spending six hours reading over a hundred professional books, he grasped various hacking techniques and felt confident that his skills were among the best on Earth. Though he didn't believe they were the absolute best, he recognized that many advanced technologies and smart hacking groups surpassed him; despite his extensive knowledge and skills, he wouldn't stand a chance against them, particularly in terms of hardware.
After half an hour of coding, Ye Hai created a firewall, a trojan, and a virus. Upon activating the firewall, he was surprised to discover another trojan program lurking within his system. This trojan was well-hidden, reflecting top-notch hacking skills—unlike the previous one, which was merely professional-level.
Ye Hai's eyes narrowed as his fingers flew across the keyboard. After half an hour, he finally tracked down the source of the trojan after overcoming various obstacles. "SHIELD?" Ye Hai exclaimed, momentarily taken aback, then he chuckled, "So I've been monitored by SHIELD. No wonder their hacking skills are so impressive."
After saying this, he uploaded the virus he had created and quickly exited, disappearing without a trace. He then searched for the source of the first trojan software, which went smoothly, and within a minute, he found the culprit.
Ye Hai smirked; he recognized the person—it was his boss, Norman Osborn. "Norman Osborn has invaded my computer? It seems he's detected something."
Ye Hai's brows furrowed slightly; his biggest concern was Osborn, the big boss, because all his research was being conducted in the Osborn industrial building, and there was a possibility that this man was monitoring him closely, potentially viewing all his research.
Upon realizing this, Ye Hai immediately launched an attack, silently infiltrating Norman Osborn's computer and checking all linked devices. He even accessed the surveillance equipment within the Osborn building and repeated this process several times before finally exiting.
Sighing in relief, Ye Hai noted that Osborn had not discovered his genetic fusion and mutant research. This was because the surveillance system had alerted Osborn due to noticeable records of Ye Hai deleting experiment data, raising his suspicion. However, he seemed to believe that no one could break through such scientific obstacles in a short time, so he did not delve deeply into it; he merely used his hacking techniques to check Ye Hai's computer for anything hidden.
This technique was something Norman often used—his hacking software had been purchased from one of Earth's top hacking groups, reportedly ranked in the top ten globally. Their intrusion software was capable of penetrating even the U.S. government's systems, though they rarely used it for their own protection.
Norman kept a close watch on his top-performing scientists using this software, effectively without detection. This time, Ye Hai's outstanding performance piqued Norman's interest, and following his usual procedure, he similarly hacked into Ye Hai's computer. After browsing through Ye Hai's files without finding anything suspicious, he noticed that this young man was quite studious, as his computer contained many professional books.
"No wonder he could assist Connor in perfecting the transformation rate formula at such a young age," Norman mused.
As a successful entrepreneur and renowned scientist, he always appreciated diligent and inquisitive young individuals.
Suddenly, his computer emitted an alarm. Someone had either hacked in or a virus was disrupting the system.
Norman reacted swiftly, cutting off the internet connection, but the alarm continued. A video suddenly popped up, filling the entire screen.
"Oh yeah!"
A blonde woman, completely naked, was riding on top of a man, energetically moving up and down—an aesthetically pleasing scene, though it would have been perfect if the blonde woman wasn't his secretary and lover.
"What the hell, that little wretch!" Norman shouted in anger.
For more chapters: (l)(i)(n)(k)(t)(r).(e)(e) / (c)(l)(o)(u)(d)(r)(u)(n)(t)(L)
