HacKer

Chapter 205: earned a billion!

Shuangqing City is an international metropolis. As the directly under the jurisdiction of Xia Guozhong and Yang, the status of Shuangqing City is equivalent to that of the independent province.

Therefore, the Central Security Administration of the Cyber ​​Security Bureau was established in Shuangqing City!

In the Western Central Administration of the Cyber ​​Security Bureau, Ling Yuguo paid 1000 Xia Guoyuan in his notebook, through Fantasy Technology's online payment system, to the parent company of Fantasy Technology, the Swiss Union Bank's international account opened by Mi Rui Technology.

When the online payment system shows that the payment was successful, an independent display layer emerges with a 32-digit mixed string of numbers and letters. This is the authorization code for the cherry virus data recovery tool.

Each authorization code can only correspond to one machine code, that is, it can only be used on one computer device.

Ling Yuguo copied the authorization code and installed the data recovery tool in the U disk according to the operation steps provided by the Fantasy Technology official website. Then insert the USB flash drive into the computer device that needs to recover the data.

The Western General Administration tested the recovery data and was also a laptop. At the moment, on the screen of the laptop, the pink cherry blossoms fly.

When the U disk of the data recovery tool is installed, after inserting the USB interface, a text input box pops up in the flying pink cherry blossom animation, prompting to input a 32-bit authorization code.

Ling Yuguo manually entered the 32-digit mixed alphanumeric code according to the authorization code just copied, and clicked the confirmation button.

The pink cherry blossoms disappeared, Fantasy Technology’s silver infinity Mobius ring LOGO appeared, followed by a round percentage display bar, and text indicating that the data was recovering.

Due to the test notebook of the Western Central Office, there is basically no data in the hard disk. The data recovery tool only took five minutes to recover all the data.

Ling Yuguo pushed the test notebook to Kong Yi. "Kong Yi, are you looking at the data to be complete?"

Kong Yi is an expert in data encryption and data recovery. He quickly checked the data in the test notebook. This test notebook is still the test data he provided, so he is very clear about the data. After a while, he said: "The squad, the data is completely restored!"

“Recovery is complete? Is this fantasy technology company really so powerful? Or is the cherry virus created by them?” Ling Yuguo seems to be asking himself. "Yang Lin, look at this data recovery tool. Have you left any system backdoors?"

Yang Lin is an expert on virus Trojans. If the data recovery tool will leave a backdoor program, Yang Lin can basically find out!

After careful examination of the test notebook, Yang Lin shook his head: "The linger, did not find the backdoor program. I just checked the system, the system is very clean, has not been changed. In addition, the data recovery tool does not hide the behavior of networking. Mode, initially determined that it is safe!"

Ling Yuguo still does not care: "We thoroughly tested together, and the command system on the Rongcheng Military Region has also had problems. We must ensure that nothing is lost!"

Rongcheng City Taxation Bureau, Xiao Zhao rushed to the bureau overnight, with his own notebook, and a USB flash drive that has installed Fantasy Technology data recovery tool.

The director of the Inland Revenue Department personally took the lead in working overtime. Can other people not work overtime? As a result, all the staff of the entire tax bureau arrived at the tax bureau.

In the office, the tax chief looked at Xiao Zhaodao: "Xiao Zhao, have you really found a way to recover data?"

Xiaozhao nodded, and then some shouted: "Secretary, although the method is found, but this method is not free. Companies that provide data recovery need to charge a certain fee."

The tax commissioner is full of disregard: "As long as the data can be recovered, the fee will be charged!"

"Secretary, the price of data recovery is a bit expensive!" Xiao Zhao said with a dismay: "Recovery will cost 1000 yuan!"

"1000 yuan?" The tax bureau originally thought it was more expensive! I did not expect that it was only a thousand yuan! "Xiao Zhao, start to restore data! District 1000 yuan, reimbursement in our bureau!"

Xiao Zhao coughed: "The Secretary, is a computer 1000 yuan, not 1000 yuan all recovered!"

“What?” The tax director immediately called the office director and asked: “Guang Guang, how many computers are there in our bureau?”

Director Guang thought for a moment: "The Secretary has a total of 132 units! There is also a main server and an alternate server."

Xiao Zhao calculated: "One hundred and thirty-four computer equipment, a total of 134,000 yuan, the Secretary, restore?"

The tax chief bite his teeth and said: "Recover! Don't say more than 130,000, it is 1.3 million, we have to recover!"

"Understood!" Xiaozhao also knows the importance of the matter. If the information stored by the Inland Revenue Department is lost, the loss is calculated in accordance with the billion yuan!

At the same time, a large number of companies purchased data recovery services at Fantasy Technology. Some enterprises with a large number of computer equipments also attempt to purchase the one or two hundred authorization codes and then reversely calculate the generation rules of the authorization codes.

However, the authorization code designed by Shi Lei is completely a randomly generated string of 32-digit numbers and letters, and there is no semi-regularity at all. After each 32-bit string is generated, the corresponding authorization code is stored in the database of the first server.

When the authorization code is used and the data recovery tool is activated, it will automatically connect to the database of the first server for automatic comparison. The data recovery tool will be activated if there is a corresponding authorization code.

So no matter who tries to sneak a sneak peek, how to calculate the rules of the generation of authorization code, can not be made into a tool such as the authorization code generator!

On the side of Jingyayuan, Shi Lei always observes the official website of Fantasy Technology to prevent malicious blackouts and prevent malicious tracing by some people.

When the time was close to 0:00 am, Shi Lei inquired about the international account of Swiss Union Bank and Mi Rui Technology and found that it had already earned more than 30 million Xia Guoyuan!

A computer 1000 yuan, more than 30 million yuan, just more than 30,000 computer equipment!

Shi Lei believes that as time goes by, there will definitely be more and more money. However, there is also a concern in Shi Lei’s heart. In this cherry virus disaster, Fantasy Technology has caught too much!

This is not a good thing for fantasy technology!

In case one is mistaken by others, Fantasy Technology is the maker of the cherry virus, and the impact on fantasy technology is very bad!

After thinking about it, Shi Lei gave up washing and sleeping, but opened the programming software and prepared to write a cherry killer!

The cherry killer is also a computer virus, but unlike other computer viruses, the cherry killer will only look for the cherry virus in the Internet, and then strongly remove the cherry virus.

When they are on the Internet and cannot find the cherry virus, they will begin to clear themselves.

After half of the writing, Shi Lei hangs a notice on the official website of Fantasy Technology, indicating that Fantasy Technology is trying to completely eliminate the cherry virus.

Time is close to the early morning... Shi Lei still does not go to sleep. Instead, continue to write the cherry killer, as well as the official website of the maintenance fantasy technology.

The official website of Fantasy Technology has been maliciously attacked on and off. If there is no defense of Shi Lei, I am afraid it will be compromised. It’s a pity that the meteor firewall can’t be used.

The meteorite firewall is on the black list of the Wonsan country, and the cherry virus is developed by the Wonsan national powder cherry. In case the Wasang Foreign Affairs International Intelligence Bureau has discovered the meteorite firewall, Shi Lei will be unlucky!

An all-night time, Shi Lei finally completed the development of the cherry killer. Log in to UBS and check out the bank account of Mirly Technology.

On the display, the available balance of the bank account shows a long list of numbers!

Looking at this long list of numbers, Shi Lei was shocked!

He repeated it several times and finally confirmed that there were a total of nine figures before the decimal point!

Xia Guoyuan: 103,223,000.00!

One hundred and thirty-three hundred and twenty-two thousand and twenty-three thousand yuan!

"100 million!" Shi Lei patted his face hard and muttered to himself: "Don't you have an all-nighter, can't I see it?"

Rushed into the bathroom, Shi Lei wet his head with cold water, and confirmed in the mirror that he was awake, and returned to the No. 1 server!

Again on the screen, the number of available balances, it really is nine digits, more than 100 million yuan!

"Ha ha ha ha ha!" Shi Lei laughed, coldly said: "Pink cherry, powder cherry, I should not ask you to eat? Or is it a share?"

Wozang State, Pink Cherry is analyzing the data recovery tool developed by Fantasy Technology. He deliberately exchanged 1,000 yen for the Japanese currency, and purchased an authorization code to check the recovery effect of the data recovery tool.

From the results of the test, the pink cherry blossoms were hit hard!

"Who is behind the people of Fantasy Technology? Who is it? Completely interpreted the cherry blossom tree gene blueprint of the cherry blossom virus!" Pink cherry blossoms frowned and could not believe the facts at hand. When he was preparing to invade Fantasy Technology, the computer's firewall suddenly issued an alarm!

In the Western Central Administration of the Cyber ​​Security Bureau, after a night of struggle, Ling Yuguo and Ding Qiudun, and Yang Lin, the three people jointly analyzed the data recovery tool for the cherry virus, and repeatedly confirmed that the data recovery tool did not have any back door, and immediately went to Rongcheng Military Region. A solution was provided and the situation was reported to the CNS.

CNS has investigated all the information about Fantasy Technology, first of all to find Mi Rui Technology. Due to legal issues in the Cayman Islands, CNS was unable to investigate the specific situation of Mi Rui Technology, and finally had to return to the domestic investigation.

Fantasy Technology registered in Shuangqing City, they quickly found Shi Lei’s body

Shi Lei is looking at the international accounts of UBS, more than 100 million yuan, idiots, but he immediately thought of an important issue.

Fantasy Technology has earned so much, I am afraid that the domestic CNS, and the four major cybersecurity bureaus, have to check his old bottom, right? .

(To be continued. If you like this work, you are welcome to come to the astronomical registered member to recommend this work, your support is my greatest motivation.)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like