The monitoring system was a key component of the internal network.
All they needed to do was select a computer, connect to the network with a cable, and stream the computer screen in real-time to Ruban, so the hacker could give instructions to Lucian through voice. Then, Lucian only needed to follow the instructions and input various programs on the computer.
Get more PearlsTop Up
Go to Joyread app
Then you can read more chapters. And you'll find other wonderful stories on Joyread.