Rebirth of the Super Banking System

Chapter 227: People who shouldn't mess with

Enter the command room.

Tang Qing has been frowning, he doesn't know how things will develop today.

If the talk collapses, it will mean that I can no longer rely on this arbitrage method to make money in the future. This is my main source of income now, and it will definitely hurt him if he loses it.

If the talks are ‘harmonious’ and the other party acquiesces to his kind of transaction in the future, even if there is a limit on the amount, everyone is happy.

but.

No matter what the final result is, he has to show his strength to the other party, so that the other party will not dare to have any crooked minds in the future, otherwise nothing can be reached.

‘Food’ is not qualified to negotiate terms, and they cannot even decide on life or death.

"Tang Yi, take down this website, the address is..." Tang Qing, who had decided, said an address and a redirect method.

"Yes, commander in command." Tang Yi replied, turning around and uploading the task to Xiao Er, then dismantling and distributing it.

Although Tang Yi also understands, he is not a technician, but a commander. This kind of thing only needs to move his lips. Xiao Er formulates and dismantles and distributes tasks according to the process. Tang Yi is responsible for supervising whether the tasks are reasonable and complete. Leave the rest to the intelligence analysts. Otherwise, he won't be busy alone.

In the past, special anonymous browsers were used to surf the Internet outside, but they are not needed from the command room. Not to mention that no one can find the address, even if it is released to the outside world, relying on the strength of these analysts who are proficient in binary computers, It is not easy to track down their addresses.

After receiving the task.

Dozens of intelligence analysts immediately turned into computer masters and joined forces to invade the website. It is very high, but it is actually very simple. It is nothing more than using various vulnerabilities in eb to obtain permissions.

In order to make it easier to "friendly" access to the outside world in the future, some analysts have studied Microsoft's system and major development languages ​​early on, constantly testing and discovering new useful vulnerabilities.

Otherwise, how did you "share" the data and information of several national police stations and various agencies? The vulnerabilities they have found so far are varied, as many as hundreds.

And these loopholes come in handy right now. But because it is not certain which vulnerabilities can be used, an analyst tests several.

Because they are usually too well prepared, coupled with these people's ‘natural’ ‘talent’ for this kind of information processing.

In just three minutes, analysts got the administrator rights of the website server, and then. . . A larger-scale invasion has begun, not only the network server, but also the computers and various communication devices over there, such as routers and switches and all networked devices.

After control, all the information that can be found is extracted.

. . . . . .

Africa.

That huge basement.

A bunch of people huddled together.

The person in charge of the organization here and the supervisor watched by Jack, waiting for his good news.

They knew that Tang Qing's transaction time was concentrated at this point, so when the first transfer order of 60 million euros was issued, the bank blocked the money.

They were waiting for Tang Qing, who was anxious, to contact them, and then tracked Tang Qing's location to see if they could confirm the other party's information. In Jack's view, this kind of thing was very simple.

They also considered that if Tang Qing didn’t want the 60 million euros to “run away”, this situation is not impossible. After all, a huge amount of nearly 20 billion U.S. dollars would be transferred in such a short period of time, and 60 million euros would be transferred. It's not too strange to just be drenched.

Of course, they still have a fluke mentality, betting that Tang Qing cares about this little money and will contact them. If they really don't care, they will have nothing to lose, and they can still get so much money in vain.

They are not afraid that someone will dare to trouble them. Behind them are the shadows of major banks. It is not an exaggeration to say that they are doing dirty work for them. With the **** of this group of people, the U.S. government may not be able to move them. .

But you still have to live up to your face, you can't always dangle under people's eyelids, otherwise they won't come to this kind of place.

Just when a group of people happily waited for the fish to take the bait.

Jack, who had been staring at the computer screen, suddenly sat upright and yelled: "OH, MYGOD."

His face was full of surprise, as if he had seen a ghost.

"What's the matter with Jack, have you found the position of the other party." The supervisor said happily.

"Boss, we're done." Jack said with a wry smile. At the same time, he put his hands on the keyboard away and leaned weakly on the chair.

"What do you mean, which bank is the other party?" The supervisor said curiously, anyway, he couldn't understand the six screens that were just installed in front of Jack.

He thought he had tracked down which bank account, but he was not afraid. He would apologize if he misunderstood. At the same time, he secretly scolded the messenger for being nosy.

But Jack's next sentence made him feel like falling into an ice cellar. "Boss, I mean, our server here was compromised." Jack said with an ugly face.

"What, it's compromised, how can this be possible? We have all kinds of security software installed here, how can it be compromised, it only takes a few minutes ~ www.wuxiaspot.com~ even if the world's first hacker team comes, it is useless? The alarm didn't go off either." The supervisor refused to communicate.

This news was too horrible. He didn't believe it. After so many years, they have encountered countless cyber attacks, but no one can enter. They have spent a lot of money to hire a lot of companies, experts and even hacker teams to improve their Defense system. It is much stronger than those firewalls on the market.

"Boss, that's right. I wrote a small humble software and put it in the code of the server and computer. It is useless, mainly to count the number and status of users with various permissions. Now all servers and routers and switches here, Computers have already added a super user, remember to add, there must be only one super user for those devices, and he can forcibly add another one. This is... not scientific at all," Jack slowly explained. Although he didn't want to believe it, this completely illogical thing happened.

When the supervisor heard that the matter was overwhelming, he hurriedly said: "That will tell people to cut off the network as soon as possible."

Jack shook his head with a wry smile and said, "It's useless, it's too late. With the internet speed here, all customer information in the database will be copied in just one minute, and it's useless if it's broken."

"What do you do then." The supervisor was gone, and in one minute, he ran to the tightly protected computer room for more than one minute.

Jack spread out his hand and said helplessly: "Let’s tell the situation above, we can’t handle it. Now I guess I don’t have the authority to do useful operations. Look, our super user accounts have all been deleted. Other low-level permissions. All the accounts are gone, boss, we may have provoked people who shouldn’t be provoked.”

ps: Mobile phone code words, thinking and logic are particularly unaccustomed, if you feel bad, please forgive me.

Recommended reading for the new book Founding Dao Ji by the mysterious writer An Xiulan

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like