Home > urban > ReincarnationMulti skilled Goddess Is So Beautiful > CH 31

ReincarnationMulti skilled Goddess Is So Beautiful CH 31

Author:Prosperity Every Year Category:urban Update time:2023-01-01 12:17:11

-

Zi Yi did not give a hoot about the chaos going on at the He clan.

After she spilled the news, she continued tracking those hackers.

Zi Yi had effortlessly cracked through those hackers security and gotten what she wanted without revealing her tracks, she found the challenge absolutely unsatisfying.

She suddenly recalled something that the hackers had mentioned and her lips curved into a smile.

Since I have nothing better to do, I might as well find out if Lu Groups firewall is as powerful as they say.

She picked up the bounty mission for cracking Lu Groups second firewall and her fingers started tapping swiftly on the keyboard.

Codes kept running across her monitor.

Five minutes later, she effortlessly went through Lu Groups first line of defense.

No one had detected her presence.

Zi Yi touched her chin as she contemplated, “If no one is around to witness it, does it mean I wont get the bounty reward”

She decided to notify Lu Groups IT department altogether, before she started hacking the second firewall to be safe.

The moment the second firewall appeared, a confusing maze appeared on her screen.

“I see.

Its a maze firewall.

The ancient people certainly were smart.”

1

Zi Yi sighed at how ingenious it was before she left for a drink halfway.

She was oblivious to the major commotion she had caused in the hacking circles and Lu Groups IT department.

[Damn it! Who the hell was that How could she hack Lu Group so blatantly]

[I am surprised that I cant even tell when she hacked into Lu Groups first firewall.]

[Who was she I was unable to find any information about her!]

[Do you think its the Prince of Hacking]

[How can that be The Prince of Hacking isnt as arrogant as her.]

[Id like to see if she is capable of hacking through Lu Groups second firewall.]

[I am certain she will fail.

So many people in the hacking circle have attempted it but none of us have succeeded.

How could she possibly win on her own]

Meanwhile, at Lu Groups IT department.

“Damn it! This hacker was simply too arrogant.

How could she blatantly notify us she is hacking our second firewall” An employee from the IT department ate a bread roll as he looked at the words on the screen and almost coughed the crumbs out.

Another employee of the IT department said solemnly, “She has already gotten past our first line of defense undetected.

We have to notify the boss.”

“What is there to report Its just a little hacker.

Let me show her how it is done.”

30 minutes later.

In the invisible online world, more and more hackers gathered at Lu Group to watch the show.

An invisible war was going on and it was increasingly becoming violent.

In the end, the employees of the IT department all broke into a cold sweat and looked stressed.

The first employees voice trembled as he spoke, “This cant go on.

The hacker is very powerful, so we need to talk to the boss.”

At 1:30 am, Lu Jingye arrived at Lu Groups IT department.

Most of the people from the department were present.

At 1:30 am, a cartoon fairy appeared on all the IT departments monitors and their second firewall was officially hacked.

1

The specialists who had fought against the intruder felt as though they had nearly died.

They were slumped in their seats and failed to compose themselves for a long time.

“Mr Lu, what should we do”

Lu Jingye remained expressionless and his eyes were cold.

“Track her.”

At this moment, a row of words appeared on his screen.

-

List
Set up
Set up
Reading topic
font style
YaHei Song typeface regular script Cartoon
font style
Small moderate Too large Oversized
Save settings
Restore default
Phone
Mobile
Scan the code to get the link and open it with the browser
Bookshelf synchronization, anytime, anywhere, mobile phone reading
Collection
Source
Review
Feedback
Chapter error
Current chapter
Error reporting content
Submit
Add < Pre chapter Chapter list Next chapter > Error reporting