At the same time, a red warning window popped up in front of Tom.

[Your link is not private, attackers may steal your information (such as passwords, communication content or credit card information)]

[Ignore the warning and continue to access/exit]

This is the firewall at work.

Seeing this scene, Tang Mu raised his head and looked at the tall and thin masked man in front of him with an inquiring look.

The tall and thin masked man obviously did not expect to encounter such an embarrassing scene.

Fortunately, he is thick-skinned enough.

He quickly said, "It's normal to have such a warning on the dark web, right? After all, there are many things in it that are not suitable for children to watch."

As he spoke, he seemed not to be afraid of Tang Mu's hesitation. A bean-sized bead of sweat slid down the masked face of the tall and thin masked man, and he provoked him in a nervous tone: "You are not so timid that you dare not even click on a link?"

"You're kidding, I'm super brave, okay?"

Tang Mu raised his chin and chose [Ignore warning and continue access].

Today I will be a lone hero.

"Good, the idiot took the bait."

Seeing that the other party really dared to click on unfamiliar links randomly, the hacker, who seemed to be of average level, laughed so hard that he choked.

The website has already given a warning.

If it were him, he would definitely not continue the visit.

But it’s okay to be a little stupid. Now it’s time to reap the fruits of your labor.

The real-world hackers rubbed their hands together in excitement, ready to obtain all of Tom's online information to profit from it.

But after he had been typing away on the computer, he felt that something was not right.

He couldn't find any information about Tom online.

There is no social media account, no email address, and no linked mobile phone number or credit card.

It's empty and doesn't look like a person living in modern society at all.

"Doesn't this person ever shop, entertain himself, or use social media to communicate with others?"

Confused, the hacker continued to dig deeper.

How could he know that Tom's identity in this mission world was the same as Jerry's.

They are all natives of the data world.

As a native, it is naturally impossible for it to have those things that only real-world netizens need.

The hacker was obviously encountering the natives of the data world for the first time and was scratching his head.

Tang Mu also encountered some minor problems.

Originally, it thought that after confirming the continued access, it and Jerry would be transferred to the dark web.

At the very least, we have to do the same as Delaman and create a means of transportation for them to ride.

But there was no response.

A few minutes passed and they were still standing there.

"Stuck?"

Tom turned his head and looked at Jerry beside him.

Jerry shrugged, not really sure what was going on.

It should be stuck...

Tom could still feel the pulling force from the link.

Since there is no response when pressing the confirmation button and no one answers, just go there yourself.

living comfortably without anybody's help.

Tang Mu thought so, and following the faint pulling force, he pulled a big hole in the network disk warehouse!

The gap was filled with green codes flowing rapidly.

Let Jerry wait there, and the skilled and brave Tom jumped in directly!

How would it know?

That link is not useless, it's just useless to them.

At this time, the poor little hacker is still worried about this.

His hands were tapping away at the keyboard.

Suddenly, something strange happened on the computer screen in front of me.

Suddenly, a crack appeared on his computer desktop, and countless source codes consisting of [0] and [1] flowed through it.

The next second, a familiar cartoon cat image jumped out and landed on the desktop taskbar at the bottom of his screen.

"Tom?!"

The hacker was a little surprised.

I was trying to hack other people's information, but it didn't work. A cartoon Tom cat appeared on my desktop!

"Am I being hacked?"

The hacker, who had no idea who the natives of the data world were, immediately thought that he had made a mistake and that the person on the other side was not an idiot who knew nothing about computers.

That's a computer hacker who's more skilled than me!

Chapter 120 Tom Cat on the Desktop

"No, there are a lot of important things in my computer, and I can't let anyone hack into it."

"I have to fight back!"

Looking at Tom Mu looking around with a confused look on his face on the desktop, the hacker decided to remove him from the computer.

I moved the mouse to open a self-checking software that I edited.

Watch the pop-up window start to scroll wildly, and quickly check your computer for vulnerabilities and viruses.

The result was nothing.

Although this hacker does not think his skills are invincible, he considers himself pretty good after so many years in the industry.

Otherwise, you won’t be able to take orders and make money on the dark web.

But the final result was that no matter how much he ran his homemade self-checking software, he did not find any abnormalities in his computer.

But looking at the Tom cat walking back and forth on the desktop in front of him, he would not believe it even if he was beaten to death if he said that his computer had not been hacked by others.

It is obvious that your computer has been hacked, but you cannot find any virus or vulnerability in your computer. What does this mean?

It only means that the enemy’s technical capabilities are much stronger than ours!

The little hacker broke out in a cold sweat at the thought of this possibility.

He quickly bent down and unplugged his network cable!

Physically disconnect your computer from the Internet.

Although the virus that has already entered your computer cannot be eliminated along with the Internet disconnection, it can at least minimize the loss.

Moreover, without the remote attack from the unknown hacker behind it, it was just a single virus isolated and helpless in his own computer, so it would not be a big problem to solve it.

The hacker thought so until he saw Tom on the computer screen looking around, then walking to the left side of the computer screen, picking up a donut icon, putting it in his mouth and taking a big bite!

The donut icon is the self-checking software made by the little hacker himself.

As Tang Mu took a bite, the software window that was scrolling and checking itself suddenly froze!

Looking at this scene, the little hacker was stunned, and his worldview was strongly impacted.

Little did they know that Tang Mu was also full of questions at this moment.

The operating logic of the data world is obviously completely different from that of the real world.

After clicking on the unknown link in the network disk warehouse and coming here, Tang Mu originally regarded this place as the so-called dark web.

But as it observed the surrounding environment, it realized that compared to the dark web, this place was more like a private computer of a private user.

The desktop taskbar under your feet, the classic Microsoft green lawn desktop behind you, and the various icons neatly arranged on the desktop can all prove this.

Tom is not stupid either.

When I was in the online storage warehouse, I found that there was something wrong with the tall and thin masked man.

But out of confidence in his own abilities, Tang Mu didn't care what the other party was trying to do.

What's more, the "Dark Web" that person mentioned also gave Tang Mu an idea.

A lot of information that cannot be collected on the surface web is indeed easier to find on the dark web.

Combining all these thoughts together, Tang Mu decided to stay put, waiting to see what the tall and thin masked man was up to.

But look at the current situation.

He seemed to have come to his private computer, and the donut-like software was still scanning it, making Tom feel uncomfortable.

Combining what happened before, Tang Mu guessed that he might have encountered a hacker or a cyber scammer with certain technical skills.

Anyway, he is not a good person.

Thinking of this, Tang Mu also planned to teach the little hacker a lesson, and then force him to hand over the real entrance to the dark web.

Yes.

Even though I was tricked by that little hacker, that link was not a link to the dark web.

But Tom has indeed become interested in the dark web, and he has no intention of giving up this way of finding Tom.

Thinking about these questions, Tang Mu naturally walked to the left side of the computer screen and ate the donut self-examination software icon that made him uncomfortable as a dessert.

As the self-checking software stopped running, the feeling of being rubbed against the hair disappeared.

Although I can't see what the hacker in the real world looks like at this moment.

But Tom could roughly judge the little hacker's mood from the trembling mouse arrow in the sky.

"hiss--!"

Taking a deep breath, the little hacker forced himself to calm down.

He gritted his teeth and controlled the mouse to click on Tang Mu, wanting to see if there would be any other reaction.

The result surprised the little hacker.

The mouse can actually have a physical effect on Tom.

Every time the hacker clicked on Tom Mu with the mouse, Tom Mu felt as if his itch was tickled. He would immediately shrink his neck, clamp his legs together, close his eyes, and couldn't help laughing!

That feeling was exactly the same as when he played QQ Pets ten years ago.

But Tom is not a QQ pet.

Seeing the mouse coming over again, Tang Mu waved his hand to turn it off.

I turned my head and saw the Google icon next to it.

Tang Mu kicked the icon without thinking.

The Google Chrome page opened automatically. Tang Mu jumped into the browser page and quickly typed the two Chinese characters "light sword" in the search bar.

The page jumped, and the new page that was refreshed was all text links, and there was nothing that Tang Mu wanted.

So Tang Mu used those text links as a springboard, just like playing the game "If You're a Man, Go to the 100th Floor", and quickly jumped from the bottom of the page to the top of the webpage, and stretched out his claws to tap the "Picture" option.

Refresh the page again.

This time, what is displayed on Google Chrome are pictures related to "Star Wars".

In addition to pictures of lightsabers in various colors, there are also more stills and posters of Star Wars crew members holding lightsabers.

Tom was quite familiar with some of them. He had met them on the set before. Tom and Jerry even stole their Millennium Falcon.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like