Rebirth Online Entertainment
Chapter 449: Impenetrable, Shadow System
Chapter [-]: Impenetrable, Shadow System (for subscription)
Tang Dynasty Company, I give you a lung. 【
Aishang Reading Network]
That's right, when the Tang Dynasty company released the secret security card, they were dumbfounded when they saw this dynamic second password that was completely independent of the network.After all, didn't the Tang Dynasty company ruin all their jobs?
"Wang Lin, how are you doing?"
Among them, a boss-level figure was facing the computer, and then analyzing a security card in his hand.
"This, Mr. Lin, for the time being, we probably can't do anything about it."
Wang Lin is a technician in the hacking studio, although he is not that kind of powerful hacker.However, as long as you know more than ordinary people, such as implanting some Trojan horses, it is enough.What's more, Wang Lin still has some skills.For a second password like this, which is different from the network, Wang Lin thought about it for more than half an hour, but he couldn't come up with a solution.
"Unless the Tang Dynasty Company's second secret protection formula is stolen."
At this time, Wang Lin said.
Of course, this is even more impossible.If they have this ability, how can they be depressed.Directly hacking into the server of Tang Dynasty Company, that's all.You know, there is everything in the server of Tang Dynasty Company.As long as it can be hacked, not to mention the game account, even the various settings of the game can be stolen back.However, those who have such ability are the top hackers in the world, and it is impossible for him to stay in this account hacking studio and engage in account hacking work.
Moreover, the more powerful a hacker is, the more cautious he is, and generally he does not easily do things to hack others.After all, a mountain is still as high as another, and if you often walk by the river, your shoes will never get wet.No matter how powerful a hacker is, he came slowly like repeated thin ice.For Wang Lin, he used to be a die-hard fan of the Hacking League.However, since the Hacking League gave up its golden basin and stopped engaging in any hacking activities, Wang Lin came to this studio relying on some of the techniques he had learned in the Hacking League.
"Is there any news from other studios?"
This President Lin is obviously not reconciled.
This kind of huge profit is now all lost, and their hearts are bleeding.
Of course, they know that it is illegal or criminal for them to do so.However, things on the Internet are all high-tech crimes, and it is generally difficult for them to find criminal evidence.Even if you are suspected, since there is no evidence, there is nothing you can do about them.Moreover, such a thing, because the one who stole is a virtual item on the Internet, so far, it is difficult to convict him. If he is caught, he will simply pay a fine and it will be fine.The worst thing is to be betrayed for a few months... It can be said that it is much lighter than the real theft.
"Not for the time being. On their side, there is also research on how to break this secret security card, but it is estimated..."
Obviously, Wang Lin didn't have much confidence in breaking this secret security card.
This second password, which is completely independent of the network, cannot be cracked technically.
"Wang Lin, think about it. As the saying goes, the height of the Tao is one foot, and the height of the devil is one foot. There is nothing in the world that cannot be broken."
Mr. Lin patted Wang Lin on the shoulder, as if entrusting all the important tasks to him.
"Um……"
Wang Lin nodded heavily.
This sentence is not bad.In the world, there is really no password that cannot be broken.
Afterwards, for a few days, Wang Lin and other related hacking studios devoted themselves to researching the problem of cracking the secret security card.
a.
A bright spot flashed, and Wang Lin shouted loudly, "Yes."
"Why... Wang Lin, have you thought of a solution?"
During this week, this Boss Lin didn't enjoy his food and drink.With the increase of secret security cards, basically, they have no profit now, especially in the second half of the week, the profit per day is only around tens of dollars.Obviously, a large number of people have already bound the secret security.And those who are not bound, have no equipment on them, and have nothing to steal, so simply don't steal... They steal from big players if they want to, and they are not interested in some guys who are dressed in rags.It's just that, in this way, their studio will not be opened any longer.
After all, after recruiting so many people, they have to pay wages, and they don't know how to do things that lose money.
"Well, I thought of it."
Wang Lin was very excited, and then, he explained the principle of deciphering to Mr. Lin.
It turned out that this secret security card, although it is a second password different from the network.However, this secret security card, he is not omnipotent.The secret security card used by Tang Dynasty Company uses a coordinate-type dynamic password.Horizontal is 123456789, vertical is h.When the second password appears, the system will randomly report a coordinate.For example, 3f, the number corresponding to this 3f, is not the second password, and then it will be obvious that there are three pairs, 4g, 6b, so the six-digit password will also be displayed.
It stands to reason, generally speaking, according to such a password, because according to the coordinate method, his password is random.Therefore, even if you hack into his computer, without a security card, you still don't know his second password.Because you don't have this secret security card, you don't know what the second password he generated is, so you can't complete account hacking.
However, there is still a mountain high.
Although the password displayed by the coordinates is random, it is regular.As long as you implant the Trojan horse into his computer, slowly record his second password input method.Of course, this process is a bit long.However, after a month of slow recording and calculation through computer programs, they can complete a secret security card that is exactly the same as the user.Until then, even the second password, which is different from the network, has to be broken.
Unless, every month, he automatically changed a secret security card.However, this is obviously impossible.For ordinary players, he still doesn't have such a high awareness of safety.Even if there is, he won't do it.Because, this kind of thing is too troublesome.If you change it once a month, if you accidentally lose the original password, it will be a big trouble.
Yes, that's right, this also caused a series of troubles in later generations because of the emergence of secret security cards.
For example, if you lose your security card, even if you are yourself, you will not be able to enter the game.You can only go to the official website and unlock the secret security.However, many people often don't understand it.Or, they forgot some of the information they filled in.So, at that time, I can only stare blankly at the tuba that I have worked so hard to develop...
Of course, this phenomenon is relatively rare.Because generally speaking, for those who play games more frequently, he will not lose the password.And the one who lost the password was because he hadn't played for a long time.And once he does not play for a long time, basically, this person will not know how to play online games.Because, by this time, he has no interest in online games.
"Well done, Wang Lin, I knew you would succeed. When will you be able to finish writing the program..."
Mr. Lin was overjoyed after hearing Wang Lin's introduction.
"Because the procedure is more complicated, unlike the previous records, it will take at least half a month."
"Okay, you try to write the program out."
Mr. Lin breathed a sigh of relief.It's been a while, but it doesn't matter.As long as the program is written, then the business still has to be done.He doesn't believe it anymore, Tang Dynasty Company, what else can he do to prevent me from stealing my account.
……
Tang software.
"Ziyun, how is the shadow system done?"
Ziyun used to be a veteran of the hacker alliance, and now Chen Jiayi has led the entire hacker alliance into the right path. Since then, these hackers have used the techniques they have learned to complete one software project after another for Tang Chao Company.It can be said that the most powerful technical force of Tang Dynasty Company is the entire hacker alliance.Of course, the Honker Alliance has also joined the operating system project.But the Honker Alliance, obviously, is only here to help, and he belongs to the country, so it's okay to ask him to help, but if he wants to help Chen Jiayi all the time, even if they can help, Chen Jiayi doesn't dare to use it all the time.
Of course, Chen Jiayi didn't regard the Honker Alliance as his direct power.
More than half a month later, Chen Jiayi came directly to Tangchao Software and said to Ziyun.
He knew that the smooth operation of the secret security card, although it could temporarily prevent others from stealing the user's account.However, security cards are not a panacea.Even the general order issued by NetEase in later generations, this more powerful dynamic password, may be stolen.Therefore, to completely prevent account hacking, this shadow system is the most critical.
"Basically completed, and now it has been taken to the Galaxy computer for testing. After three days, it will be widely used."
For the shadow system, Ziyun is also quite admirable.
Moreover, Chen Jiayi has always attached great importance to this system.In order to complete the task, Ziyun and the others worked overtime and finally completed it.Fortunately, this system is not very technical.In a word, it is to create a virtual system on top of the original operating system.In other words, when players are online, the systems they use are all virtual systems. No matter what you do on the virtual system, it will not affect the stability of the real system.
Now, after half a month, it is finally completed.And, for quick deployment.This time, Ziyun handed over the testing task of the shadow system to the supercomputer, and it is much more convenient for this supercomputer with a level of [-] billion per second to complete the testing task.
From here, we can also see.Why can the major online games of Tang Dynasty Company do so well.Among them, in addition to the settings of various aspects, the supercomputer has also achieved very strong results.Without this supercomputer, it would be impossible to master the balance of each game so well.If there is no supercomputer, I am afraid that the 3 masterpiece Zhuxian ol cannot be completed so quickly.
This is another game company, if you want to be jealous, you can't be jealous.
"Ah That's good……"
Hearing what Ziyun said, Chen Jiayi breathed a sigh of relief.
Three days later, the shadow system was completely completed.
It was still Pengfei.com. This time, two staff members from Tangchao Software came to Pengfei.com.
"Boss Li, hello."
"So it belongs to Tang Dynasty Company, welcome, welcome, why, is there any activity?"
For the people of Tang Dynasty Company, Pengfei.com, that is great love.To be honest, thinking about it, Pengfei.com closely followed Tang Dynasty Company and fully cooperated with various activities.This also made Tang Dynasty Company take special care of Pengfei.com.Some fixed-point activities will be held on Pengfei.com.Now that I think about it, if it weren't for the Tang Dynasty company, Pengfei.com wouldn't have the scale it is today.
At this time, Li Bo, the boss of Pengfei.com, was very happy to see the staff of Tang Dynasty Company coming.
"Come on, let's sit inside."
With that said, Li Bo was about to welcome the two employees of Tang Dynasty Company into the lounge.
"No, Mr. Li, just say it here."
The two looked at the people on Pengfei's website, and said directly, "Mr. Li must have known about the secret security card issued by our Tang Dynasty company recently."
"Hey, why don't you know, we sell secret security cards here, that's crazy."
Li Bo welcomed the secret security card issued by Tang Dynasty Company.To be honest, it is not easy for him to open this network.Although you can make some money, the bigger the network, the greater the risk.For example, there are many people with evil intentions who will plant Trojan horses on their websites, so that they have to hire specialized technical personnel to carry out corresponding inspections every time.But even so, there are nearly a thousand computers that cannot be checked. A while ago, a friend had his account stolen because of this.
Speaking of it, they were online, their accounts were hacked, and their Internet connection was really inextricably linked.Fortunately, their previous detection work has been done very well, so that large-scale hacking of accounts will not occur.If you steal a few more times, presumably a lot of people will not go to their network to surf the Internet.
Now that the secret security card is issued, it will greatly ease their work.How could they not welcome anti-theft measures like this?
"Hehe... Then congratulations to Mr. Li for getting rich."
The two smiled.
"Where, where, compared with Tang Dynasty Company, what is our point?"
They are agents at most, how can they compare with Tang Dynasty Company.
"That's thanks to Mr. Li, let's talk about business."
The two nodded, and then they got down to business.
"Mr. Li, I believe you also know. Network security has always been the number one problem in network management. Even with anti-virus software and the like, it is impossible to control these Trojan horses. If network security is not guaranteed, for the network, It was a huge blow..."
"Yes, yes, so we have hired several technicians to test the computers every day."
However, this test is also a troublesome matter.When people come to the Internet, you can't detect it.Often some computers are turned on 24 hours a day.Moreover, it is even more serious when it comes to holidays. Often, the phone is not turned off for two or three days.Because, many people are soaking all night.After they finished soaking, the next day, some people came up again, really busy.Although this made Li Bo very happy, because the busier he was, the better his business would be.However, if this continues, the more than 1000 people in the entire network will not be able to take care of them. Some computers have been implanted with Trojan horses by others, and they do not know.
It seems that it is indeed hard enough.
"However, don't worry, Mr. Li. Today, we have brought you a brand-new system, which includes your network security, and the built-in drip-free system. It can even manage nearly a thousand computers without any technicians. ?”
In this system, not all the network management platforms of the year were online.
They are all online, just a management platform, not a security software, so it doesn't play any role.
"A new system?"
"Could it be the Tang Dynasty-operating system?"
Li Bo became excited instantly.
I have long heard that Tang Dynasty Company has been secretly building an operating system.Moreover, thousands of people have been looking forward to the advent of this system.As Li Bo who opened the Internet, he naturally knew about this important event.Could it be that today, the Tang Dynasty-operating system was born?If so, it would be a big event in China.
"Um... no. The Tang Dynasty-operating system is still under development, and we don't know when it will be released. However, although what we bring to you today is not the Tang Dynasty-operating system, it is also , will surprise you.”
"Oh, what is the operation?"
"Shadow system."
After speaking, the two explained to Li Bo the characteristics of this shadow system.
After half an hour, Li Bo heard that his eyes were shining, and he kept nodding.
"Mr. Li, that is to say, with this shadow system, you can guarantee the security of your network and make it impenetrable."
……
Shanghai is still the hacking studio.
"Oh yes, finally succeeded..."
It's still a giant roar, but this roar is no longer the unwillingness and disappointment before, but excitement and excitement...
"Secret Security Thief No. 1 is finally released."
It has to be said that although Wang Lin was not a member of the Hacking League before, he was clever since he was a child, relying on some knowledge passed down from the Hacking League, he has already built him into a technical hacker, much better than some rookie hackers .To be honest, if it weren't for this account hacking studio, he would really not do account hacking if he was given a high salary.
You must know that the entire Hacking League was rumored to have been taken on the right path by Chen Jia, and it had already been washed up in the golden basin. In the entire t class, I don't know how well it was mixed.And those who are still in the dark are all in a dark place, living an unknown world.Sometimes, Wang Lin also wanted to wash his hands and quit.It's just that every time he is tempted by money, he still insists on staying here.He secretly thought in his heart, if he earns enough 100 million, he will leave...
"Well done, Wang Lin."
Mr. Lin was very happy, and immediately said, "Get ready to act."
This action is naturally to implant account hacking Trojans into the major networks.
A website in Shanghai.
Wang Lin and Mr. Lin came forward in person, took the hacking program written by him, and opened a machine at random.
Yes, he is about to implant his secret security thief into the online platform.
And, taking advantage of the local area network, all the computers in the network are infected with this Trojan horse.
Power on and enter the system.
"One is normal."
When he was about to enter the desktop, suddenly, a picture appeared on the desktop with a few large characters written on it.
"Shadow system, enjoy a safe network life."
"Shadow system."
what?
Mr. Lin pointed to the shadow system and said.
"I don't know either, let's take a look first."
Intuition told Wang Lin that this system was obviously designed for them.
After thinking about it, Wang Lin quickly checked the computer settings, until finally he finally understood, "Damn it, virtual system."
【
Aishang Reading Network]
Tang Dynasty Company, I give you a lung. 【
Aishang Reading Network]
That's right, when the Tang Dynasty company released the secret security card, they were dumbfounded when they saw this dynamic second password that was completely independent of the network.After all, didn't the Tang Dynasty company ruin all their jobs?
"Wang Lin, how are you doing?"
Among them, a boss-level figure was facing the computer, and then analyzing a security card in his hand.
"This, Mr. Lin, for the time being, we probably can't do anything about it."
Wang Lin is a technician in the hacking studio, although he is not that kind of powerful hacker.However, as long as you know more than ordinary people, such as implanting some Trojan horses, it is enough.What's more, Wang Lin still has some skills.For a second password like this, which is different from the network, Wang Lin thought about it for more than half an hour, but he couldn't come up with a solution.
"Unless the Tang Dynasty Company's second secret protection formula is stolen."
At this time, Wang Lin said.
Of course, this is even more impossible.If they have this ability, how can they be depressed.Directly hacking into the server of Tang Dynasty Company, that's all.You know, there is everything in the server of Tang Dynasty Company.As long as it can be hacked, not to mention the game account, even the various settings of the game can be stolen back.However, those who have such ability are the top hackers in the world, and it is impossible for him to stay in this account hacking studio and engage in account hacking work.
Moreover, the more powerful a hacker is, the more cautious he is, and generally he does not easily do things to hack others.After all, a mountain is still as high as another, and if you often walk by the river, your shoes will never get wet.No matter how powerful a hacker is, he came slowly like repeated thin ice.For Wang Lin, he used to be a die-hard fan of the Hacking League.However, since the Hacking League gave up its golden basin and stopped engaging in any hacking activities, Wang Lin came to this studio relying on some of the techniques he had learned in the Hacking League.
"Is there any news from other studios?"
This President Lin is obviously not reconciled.
This kind of huge profit is now all lost, and their hearts are bleeding.
Of course, they know that it is illegal or criminal for them to do so.However, things on the Internet are all high-tech crimes, and it is generally difficult for them to find criminal evidence.Even if you are suspected, since there is no evidence, there is nothing you can do about them.Moreover, such a thing, because the one who stole is a virtual item on the Internet, so far, it is difficult to convict him. If he is caught, he will simply pay a fine and it will be fine.The worst thing is to be betrayed for a few months... It can be said that it is much lighter than the real theft.
"Not for the time being. On their side, there is also research on how to break this secret security card, but it is estimated..."
Obviously, Wang Lin didn't have much confidence in breaking this secret security card.
This second password, which is completely independent of the network, cannot be cracked technically.
"Wang Lin, think about it. As the saying goes, the height of the Tao is one foot, and the height of the devil is one foot. There is nothing in the world that cannot be broken."
Mr. Lin patted Wang Lin on the shoulder, as if entrusting all the important tasks to him.
"Um……"
Wang Lin nodded heavily.
This sentence is not bad.In the world, there is really no password that cannot be broken.
Afterwards, for a few days, Wang Lin and other related hacking studios devoted themselves to researching the problem of cracking the secret security card.
a.
A bright spot flashed, and Wang Lin shouted loudly, "Yes."
"Why... Wang Lin, have you thought of a solution?"
During this week, this Boss Lin didn't enjoy his food and drink.With the increase of secret security cards, basically, they have no profit now, especially in the second half of the week, the profit per day is only around tens of dollars.Obviously, a large number of people have already bound the secret security.And those who are not bound, have no equipment on them, and have nothing to steal, so simply don't steal... They steal from big players if they want to, and they are not interested in some guys who are dressed in rags.It's just that, in this way, their studio will not be opened any longer.
After all, after recruiting so many people, they have to pay wages, and they don't know how to do things that lose money.
"Well, I thought of it."
Wang Lin was very excited, and then, he explained the principle of deciphering to Mr. Lin.
It turned out that this secret security card, although it is a second password different from the network.However, this secret security card, he is not omnipotent.The secret security card used by Tang Dynasty Company uses a coordinate-type dynamic password.Horizontal is 123456789, vertical is h.When the second password appears, the system will randomly report a coordinate.For example, 3f, the number corresponding to this 3f, is not the second password, and then it will be obvious that there are three pairs, 4g, 6b, so the six-digit password will also be displayed.
It stands to reason, generally speaking, according to such a password, because according to the coordinate method, his password is random.Therefore, even if you hack into his computer, without a security card, you still don't know his second password.Because you don't have this secret security card, you don't know what the second password he generated is, so you can't complete account hacking.
However, there is still a mountain high.
Although the password displayed by the coordinates is random, it is regular.As long as you implant the Trojan horse into his computer, slowly record his second password input method.Of course, this process is a bit long.However, after a month of slow recording and calculation through computer programs, they can complete a secret security card that is exactly the same as the user.Until then, even the second password, which is different from the network, has to be broken.
Unless, every month, he automatically changed a secret security card.However, this is obviously impossible.For ordinary players, he still doesn't have such a high awareness of safety.Even if there is, he won't do it.Because, this kind of thing is too troublesome.If you change it once a month, if you accidentally lose the original password, it will be a big trouble.
Yes, that's right, this also caused a series of troubles in later generations because of the emergence of secret security cards.
For example, if you lose your security card, even if you are yourself, you will not be able to enter the game.You can only go to the official website and unlock the secret security.However, many people often don't understand it.Or, they forgot some of the information they filled in.So, at that time, I can only stare blankly at the tuba that I have worked so hard to develop...
Of course, this phenomenon is relatively rare.Because generally speaking, for those who play games more frequently, he will not lose the password.And the one who lost the password was because he hadn't played for a long time.And once he does not play for a long time, basically, this person will not know how to play online games.Because, by this time, he has no interest in online games.
"Well done, Wang Lin, I knew you would succeed. When will you be able to finish writing the program..."
Mr. Lin was overjoyed after hearing Wang Lin's introduction.
"Because the procedure is more complicated, unlike the previous records, it will take at least half a month."
"Okay, you try to write the program out."
Mr. Lin breathed a sigh of relief.It's been a while, but it doesn't matter.As long as the program is written, then the business still has to be done.He doesn't believe it anymore, Tang Dynasty Company, what else can he do to prevent me from stealing my account.
……
Tang software.
"Ziyun, how is the shadow system done?"
Ziyun used to be a veteran of the hacker alliance, and now Chen Jiayi has led the entire hacker alliance into the right path. Since then, these hackers have used the techniques they have learned to complete one software project after another for Tang Chao Company.It can be said that the most powerful technical force of Tang Dynasty Company is the entire hacker alliance.Of course, the Honker Alliance has also joined the operating system project.But the Honker Alliance, obviously, is only here to help, and he belongs to the country, so it's okay to ask him to help, but if he wants to help Chen Jiayi all the time, even if they can help, Chen Jiayi doesn't dare to use it all the time.
Of course, Chen Jiayi didn't regard the Honker Alliance as his direct power.
More than half a month later, Chen Jiayi came directly to Tangchao Software and said to Ziyun.
He knew that the smooth operation of the secret security card, although it could temporarily prevent others from stealing the user's account.However, security cards are not a panacea.Even the general order issued by NetEase in later generations, this more powerful dynamic password, may be stolen.Therefore, to completely prevent account hacking, this shadow system is the most critical.
"Basically completed, and now it has been taken to the Galaxy computer for testing. After three days, it will be widely used."
For the shadow system, Ziyun is also quite admirable.
Moreover, Chen Jiayi has always attached great importance to this system.In order to complete the task, Ziyun and the others worked overtime and finally completed it.Fortunately, this system is not very technical.In a word, it is to create a virtual system on top of the original operating system.In other words, when players are online, the systems they use are all virtual systems. No matter what you do on the virtual system, it will not affect the stability of the real system.
Now, after half a month, it is finally completed.And, for quick deployment.This time, Ziyun handed over the testing task of the shadow system to the supercomputer, and it is much more convenient for this supercomputer with a level of [-] billion per second to complete the testing task.
From here, we can also see.Why can the major online games of Tang Dynasty Company do so well.Among them, in addition to the settings of various aspects, the supercomputer has also achieved very strong results.Without this supercomputer, it would be impossible to master the balance of each game so well.If there is no supercomputer, I am afraid that the 3 masterpiece Zhuxian ol cannot be completed so quickly.
This is another game company, if you want to be jealous, you can't be jealous.
"Ah That's good……"
Hearing what Ziyun said, Chen Jiayi breathed a sigh of relief.
Three days later, the shadow system was completely completed.
It was still Pengfei.com. This time, two staff members from Tangchao Software came to Pengfei.com.
"Boss Li, hello."
"So it belongs to Tang Dynasty Company, welcome, welcome, why, is there any activity?"
For the people of Tang Dynasty Company, Pengfei.com, that is great love.To be honest, thinking about it, Pengfei.com closely followed Tang Dynasty Company and fully cooperated with various activities.This also made Tang Dynasty Company take special care of Pengfei.com.Some fixed-point activities will be held on Pengfei.com.Now that I think about it, if it weren't for the Tang Dynasty company, Pengfei.com wouldn't have the scale it is today.
At this time, Li Bo, the boss of Pengfei.com, was very happy to see the staff of Tang Dynasty Company coming.
"Come on, let's sit inside."
With that said, Li Bo was about to welcome the two employees of Tang Dynasty Company into the lounge.
"No, Mr. Li, just say it here."
The two looked at the people on Pengfei's website, and said directly, "Mr. Li must have known about the secret security card issued by our Tang Dynasty company recently."
"Hey, why don't you know, we sell secret security cards here, that's crazy."
Li Bo welcomed the secret security card issued by Tang Dynasty Company.To be honest, it is not easy for him to open this network.Although you can make some money, the bigger the network, the greater the risk.For example, there are many people with evil intentions who will plant Trojan horses on their websites, so that they have to hire specialized technical personnel to carry out corresponding inspections every time.But even so, there are nearly a thousand computers that cannot be checked. A while ago, a friend had his account stolen because of this.
Speaking of it, they were online, their accounts were hacked, and their Internet connection was really inextricably linked.Fortunately, their previous detection work has been done very well, so that large-scale hacking of accounts will not occur.If you steal a few more times, presumably a lot of people will not go to their network to surf the Internet.
Now that the secret security card is issued, it will greatly ease their work.How could they not welcome anti-theft measures like this?
"Hehe... Then congratulations to Mr. Li for getting rich."
The two smiled.
"Where, where, compared with Tang Dynasty Company, what is our point?"
They are agents at most, how can they compare with Tang Dynasty Company.
"That's thanks to Mr. Li, let's talk about business."
The two nodded, and then they got down to business.
"Mr. Li, I believe you also know. Network security has always been the number one problem in network management. Even with anti-virus software and the like, it is impossible to control these Trojan horses. If network security is not guaranteed, for the network, It was a huge blow..."
"Yes, yes, so we have hired several technicians to test the computers every day."
However, this test is also a troublesome matter.When people come to the Internet, you can't detect it.Often some computers are turned on 24 hours a day.Moreover, it is even more serious when it comes to holidays. Often, the phone is not turned off for two or three days.Because, many people are soaking all night.After they finished soaking, the next day, some people came up again, really busy.Although this made Li Bo very happy, because the busier he was, the better his business would be.However, if this continues, the more than 1000 people in the entire network will not be able to take care of them. Some computers have been implanted with Trojan horses by others, and they do not know.
It seems that it is indeed hard enough.
"However, don't worry, Mr. Li. Today, we have brought you a brand-new system, which includes your network security, and the built-in drip-free system. It can even manage nearly a thousand computers without any technicians. ?”
In this system, not all the network management platforms of the year were online.
They are all online, just a management platform, not a security software, so it doesn't play any role.
"A new system?"
"Could it be the Tang Dynasty-operating system?"
Li Bo became excited instantly.
I have long heard that Tang Dynasty Company has been secretly building an operating system.Moreover, thousands of people have been looking forward to the advent of this system.As Li Bo who opened the Internet, he naturally knew about this important event.Could it be that today, the Tang Dynasty-operating system was born?If so, it would be a big event in China.
"Um... no. The Tang Dynasty-operating system is still under development, and we don't know when it will be released. However, although what we bring to you today is not the Tang Dynasty-operating system, it is also , will surprise you.”
"Oh, what is the operation?"
"Shadow system."
After speaking, the two explained to Li Bo the characteristics of this shadow system.
After half an hour, Li Bo heard that his eyes were shining, and he kept nodding.
"Mr. Li, that is to say, with this shadow system, you can guarantee the security of your network and make it impenetrable."
……
Shanghai is still the hacking studio.
"Oh yes, finally succeeded..."
It's still a giant roar, but this roar is no longer the unwillingness and disappointment before, but excitement and excitement...
"Secret Security Thief No. 1 is finally released."
It has to be said that although Wang Lin was not a member of the Hacking League before, he was clever since he was a child, relying on some knowledge passed down from the Hacking League, he has already built him into a technical hacker, much better than some rookie hackers .To be honest, if it weren't for this account hacking studio, he would really not do account hacking if he was given a high salary.
You must know that the entire Hacking League was rumored to have been taken on the right path by Chen Jia, and it had already been washed up in the golden basin. In the entire t class, I don't know how well it was mixed.And those who are still in the dark are all in a dark place, living an unknown world.Sometimes, Wang Lin also wanted to wash his hands and quit.It's just that every time he is tempted by money, he still insists on staying here.He secretly thought in his heart, if he earns enough 100 million, he will leave...
"Well done, Wang Lin."
Mr. Lin was very happy, and immediately said, "Get ready to act."
This action is naturally to implant account hacking Trojans into the major networks.
A website in Shanghai.
Wang Lin and Mr. Lin came forward in person, took the hacking program written by him, and opened a machine at random.
Yes, he is about to implant his secret security thief into the online platform.
And, taking advantage of the local area network, all the computers in the network are infected with this Trojan horse.
Power on and enter the system.
"One is normal."
When he was about to enter the desktop, suddenly, a picture appeared on the desktop with a few large characters written on it.
"Shadow system, enjoy a safe network life."
"Shadow system."
what?
Mr. Lin pointed to the shadow system and said.
"I don't know either, let's take a look first."
Intuition told Wang Lin that this system was obviously designed for them.
After thinking about it, Wang Lin quickly checked the computer settings, until finally he finally understood, "Damn it, virtual system."
【
Aishang Reading Network]
You'll Also Like
-
Divine Seal: I am the Demon God Emperor's beloved granddaughter
Chapter 306 1 days ago -
Summer Kiss
Chapter 218 1 days ago -
After being fed to top-tier orcs, I became the darling of the entire intergalactic world.
Chapter 489 1 days ago -
After the frail beauty went to the countryside, she went crazy with scientific research.
Chapter 378 1 days ago -
The Qi Cultivation Emperor Who Snatches Brides, do you think you're funny?
Chapter 249 1 days ago -
Marriage Seduction Addiction
Chapter 302 1 days ago -
I became a civil servant in the underworld and became an internet sensation in both the mortal and s
Chapter 217 1 days ago -
Variety shows are crazy but don't cause internal conflict; I'm proud to drive others crazy
Chapter 428 1 days ago -
The aloof beauty always has weak legs; the crazy boss is too ruthless.
Chapter 182 1 days ago -
The wicked mother-in-law doesn't try to whitewash herself; she only abuses her awful children.
Chapter 702 1 days ago