Rebirth Online Entertainment
Chapter 451: Our name is "Tang Dynasty"
Chapter [-]: Our name is "Tang Dynasty"
This time, they are going to have a big fight. 【
Aishang Reading Network]
The target is naturally the *** network that was negotiated before.
In fact, some people will say, these hackers, why don't they steal their accounts, they just sell them, why join a studio if they have nothing to do, and expose their identities instead.In fact, no matter if it was account theft or equipment theft, it was impossible for him to be so simple.The equipment you stole, game coins, account numbers, etc... he is worthless in itself.Money can only be obtained through transactions.
In other words, account hacking is the first step, and there are still a lot of procedures to follow.For example, finding buyers, selling items... This time is much more complicated than account hacking.Just like in reality, a lot of gangsters made a lot of money.However, they also dare not spend randomly.Because they can't explain the source of huge funds.Therefore, they have to launder money to turn the illegally earned money into legal... In many cases, money laundering is much more difficult than making money.
This is also the reason why these hackers want to join the organization.
For a whole week, the entire account hacking studio started a secret road to fundraising.They came into contact with a series of h sites and some small software successively, and planted a lot of Trojan horse programs on their platform.When someone downloads these videos, he may be infected with a Trojan horse.
Some people may say, isn't Tang Dynasty Antivirus out of the Cloud Security Alliance?However, websites with Trojan horses will not be certified.In this way, the network is much more secure.However, for many people to say.They want to enter the h network, regardless of whether it is poisonous or not, download it first... In this way, there are only a small number of people infected with Trojan horses.
"ok..."
Seeing a series of account passwords sent to their backstage, the people in the account hacking studio were overjoyed, as if they saw RMB.
Although not everyone knows how to plant poison, China is so big that if you don't get poisoned, he will too.Distribute all the Trojan horse programs on a large scale, even if one out of a hundred is poisoned, it is still a huge sum.Therefore, during this period of time, they will receive a steady stream of *** account numbers every day.
And, when they land in it, a series of cash coins are transferred away.
Even, Mr. Lin sighed that this was the last transaction they made.In the future, maybe, with the technical strength of Tang Dynasty Company, there will be no way for them to survive.In this way, when they stole their accounts, they wanted to give ***.com a hard time.It is to hack accounts on a large scale within the specified time, so as to achieve the purpose of suppressing the *** network.
Although this is of no benefit to them, for Mr. Lin, he really let out a bad breath.
……
***net.
"I said, brother, my ***coin..."
A reader yelled.
This reader just recharged 50 yuan last month in order to see that the Buddha is the Tao.Unexpectedly, I just logged in to *** this morning and said that I want to *** subscribe to the chapter of "Buddha is the Way", but it actually prompts that there are no *** coins.At that time, the reader was immediately taken aback.He thought to himself, "Could it be that the legendary internet theft incident happened on my own head?"
After repeated testing, the reader finally found out.
With more than 3000 *** coins, I actually directly bought the legendary Yuanbao of ***.
***, *** are all subsidiaries of Tang Dynasty Company.Therefore, their accounts are the same.
You only need to have an account of any Tang Dynasty subsidiary, and you can log in to all Tang Dynasty subsidiaries.Moreover, the account money in it is all connected.You can use *** coins to buy things on *** network, Yuan Bao of *** network, or you can use them directly as *** coins.
In the early days, such a setting, naturally, greatly facilitated many users.After all, an account is blocked, so there is no need to register every day.However, looking at it now, this passport has suddenly become the target of hackers.These hackers just took advantage of this passport principle to transfer a large amount of *** coins to Yuanbao in the *** network.Therefore, these ingots are sold to users with a large discount of 9% or 8% off... so we see.A large part of the reason why Taobao has such cheap coins in later generations is that hackers stole other people's accounts and sold them at a low price.
"Brothers, it's a tragedy, brother's coins were stolen today."
In the tt group, this reader cried to the players.
"No, silence."
"I was wondering, do you watch too many educational films?"
Some people began to gloat.
"This one……"
This reader thought about it, and even though he hadn't read it for many days, he actually downloaded a few of them a few days ago.
"Guess so."
A lot of people in the group laughed.
"Brother, kill the virus quickly, change the password, or reinstall the system, or your future coins will be less."
"Yep."
After thinking about it, this reader immediately performed a full-disk deep antivirus. After a full-disk deep scan, he finally found several Trojan horse programs.In fact, generally speaking, Tang Dynasty Antivirus runs in the background and scans automatically.However, this scan.It is impossible for him to do a full-disk deep scan, because it takes up a lot of system resources.If a deep scan is performed automatically every day, it is estimated that a large number of users will not be able to bear it... so, these Trojan horses may survive for a few days.
In this way, naturally, when the user logs in to the account and password, everything is controlled by the hacker.
After a lot of work, finally, the system is fine, no longer threatened by viruses and Trojan horses.However, this reader was furious.Whoever it was, had their account hacked, and felt very depressed.Just after he planned to recharge a dozen yuan and read the Buddha's original teachings.Suddenly discovered that Foben is the Dao book review area, and several posts about stolen accounts suddenly appeared.
"No, so many people were stolen?"
After reading it, the poster said that the encounter was similar to that of the reader.However, this reader has been clamoring that he didn't watch station h, and he didn't download anything unclean, so why was his account stolen?Later, some friends also talked about this situation.Moreover, some readers believe that this is the hacking of the ***.
Although, this reader doesn't think ***.com will do such a thing.Moreover, ***.com is a subsidiary of Tang Dynasty Company, and its reputation has always been very good, so it is impossible to do so.Besides, doing so would not benefit them at all.However, for such a large area of hacking, I was also very depressed, and joined the army of denouncing it, asking ***.com for an explanation.
*** Editorial Department.
"what happened?"
In the ***net discussion area, there was a scolding war against ***, how could Chen Jiayi not see it?
Almost when he saw this pile of news, Chen Jiayi, who was well aware of it, immediately came to ***.com.
"Mr. Chen, in the past two days, there has been a large-scale account hacking incident on ***.com, and the readers are getting a little emotional, which led to..."
Bao Jianfeng said.
"A large number of accounts have been stolen!"
In the past, even if some game accounts were stolen, it was one by one, not a large-scale outbreak.However, this time, it actually appeared at the same time in the last two days.In this way, the impact produced is simply huge.
"The preliminary reason has been investigated. Most of the readers have been hit by a Trojan horse that is designed to steal ***.com accounts. And, in the past two days, a crazy account transfer activity has begun."
"Wow, it's actually a special fight against ***.com."
Chen Jiayi was depressed, but for a while, Chen Jiayi couldn't think of who wanted to do this.After all, Tang Dynasty Company is so big, even if there is no enmity with Tang Dynasty Company on the surface.It is estimated that, secretly, I don't know how much I hate Tang Chao Company.
"Forget it."
Now that the situation is critical, Chen Jiayi immediately ordered, "First, an official announcement should be made to explain this incident."
In the later generations, Chen Jiayi knew that some online games had large-scale account hacking.Moreover, because the authorities at that time did not carry out effective public opinion guidance, a large number of players believed that their accounts, even if they were not authorized by the game company, were their internal personnel. Otherwise, how could so many people have been stolen? account number
If ***.com does not handle this incident effectively, then the damage to ***.com is undoubtedly huge.Even, if other novel websites take the opportunity to make a big fuss in this regard, then ***.com will be in danger.
"Second, find the shooter to conduct public relations in the book review area."
This is very necessary.
If not, under the instigation of people with ulterior motives, ***.com has really become the number one enemy.Besides, for a large number of people whose numbers have been stolen, they are very emotional, and they may come up with any bad conclusions.Therefore, these gunmen can also achieve a soothing effect.
"Third, contact Tang Chao's software technology department to thoroughly investigate the matter."
This time, Chen Jiayi was really popular.
Damn it, a lot of hackers have done this before, and Chen Jia didn't bother to pursue it as soon as he considered a lot of problems in reality.Of course, it is also difficult to pursue.So, in the following time, Chen Jiayi came up with several ways to deal with it.This time, online games are blocked.Unexpectedly, the police network was actually shot.
If these hackers are still tolerated or ignored, then in the future, they will intensify.Look, in later generations, the domestic market will be like this.Everyone said there was no way to control it.First, there are no laws and regulations, and second, it is difficult to find criminal evidence online.In the meantime, cyber crimes are emerging in endlessly.
Now, Chen Jiayi is annoyed when it falls on the Internet. He is taking this opportunity to restore the health of China Internet.
"By the way, how many hacks have been discovered this time?"
At this moment, Chen Jiayi asked again.
"At present, I only know that readers on some forums have posted. However, judging from the transfer of funds from ***.com accounts today, it is estimated that there are about 5000..."
"About 5000."
Not too many, not too many, 5000 is also a piece of users.
"Suspend the currency conversion function."
Such a large-scale currency conversion function is naturally very attractive to hackers. First, Chen Jiayi suspended this function.Of course, whether the future will be opened or not is temporarily unknown.However, Chen Jiayi believes that Tang Dynasty Company has the ability to restore a healthy network platform in China.In this way, at that time, it can be opened again.
"Ok."
"Also, in the past three days, all *** currency transfer records have been restored."
"This……"
file back.
Those who didn't know, thought that a small retracement was nothing, but on the contrary, it reduced the risk caused by this incident.However, as everyone knows, the reversion this time means that ***.com paid for the account theft this time, which is just compensation in disguise.
"Mr. Chen, this time, our loss of selfishness..."
"It's okay, what should be selfish has to be selfish."
Chen Jia didn't even frown.
For the sake of his reputation, he decided to do it.
"Execution is."
"Yes."
As soon as Chen Jia finished giving the order, ***.com started to act immediately.Immediately, the official notice was issued, "Recently, ***.com *** user accounts have been seriously stolen, and we are doing our best to thoroughly investigate this matter. At the same time, in order to restore the privacy of readers, we have already edited the *** coin conversion records. , A comprehensive rollback has been carried out. And, from today, the *** currency conversion function will be suspended. I hope that readers who have stolen accounts will immediately check and kill the computer security, and change the account password..."
"Wow……"
***Net, really generous.
Here are the comments from readers.
You know, this retracement is a loss of selfishness.Because, the *** coins transferred by the hackers before have been replaced with virtual items, and maybe they have been sold out.This retracement is tantamount to returning the money to the user in vain.
"See, this is ***.com, and this is Tangchao Company."
Some users began to praise ***.com.
And, he also commented in the article, "Dare to ask everyone, which company have you seen that is so responsible?"
Yes, except for ***.A lot of other game companies didn't care about account theft.
It's not that they don't want to ask, but that they can't control it.A lot of reasons are caused by individual users.No matter how much they try to control it, they can't control it.Of course, this time, the same large number of users were also operated by individuals.However, there are too many stolen hacker accounts, which have a great impact. For the reputation of hacker.com, Chen Jiayi has to do this.
"Anyway, *** is still very responsible, top one first, but, for account theft, I hope ***.com can thoroughly investigate. These hackers are really annoying. If there are more hackers like this Hacker, I'm afraid we're doomed."
These are the opinions of readers.
In fact, Bao Jianfeng had already contacted Ziyun of Tangchao Software after ***.com released the announcement that day.After Bao Jianfeng conveyed Chen Jiayi's intentions, Ziyun immediately said, "Don't worry, leave this matter to me, and promise to investigate this matter thoroughly."
Ziyun used to be a gangster, and he was also an elder of the Hacking League.
Today, although the entire hacker alliance has basically been washed away under the influence of Chen Jiayi.However, they still know a lot about hackers and the entire hacker circle.Moreover, he knew this whole bunch of hackers, how they worked.It would be best to entrust this task to him.
"Brothers, Mr. Chen told us a long time ago. As a real hacker, he does not use his own technology to invade others, let alone use his own intrusion technology to profit himself. Today, There are still many hackers in the country who are taking the road of illegally stealing other people’s belongings. Although our hacker alliance seldom cares about the hacker circle. But today, we must tell them... Hackers don’t work like this.”
Ziyun said to a large group of hacker alliance members, that is, members of Tang Dynasty Software.
"Okay, brothers, split up."
After Ziyun spoke, a large group of former hacker alliance members started a secret search.
Not to mention Ziyun.
After ***.com released the announcement, in order to completely quell the incident and create a healthy Internet environment, Tang Dynasty Company specially held a press conference.And the theme of this press conference is only one network security.Moreover, it was hosted by Chen Jiayi himself.
"Friends, unfortunately, recently, users of our subsidiary ***.com have been hacked, and a large number of accounts have been stolen. Here, I don't want to pursue whether it is a user-operated problem, so that Infected with Trojan horses and viruses. But here, I just want to say one thing... domestic Internet security is really worrying.
Everyone must know that our Tang Dynasty company has launched two businesses before.
One is a secret security card for account protection, and the other is a shadow system for network security management.
Whether it's the secret security card or the shadow system, our Tang Dynasty company is all about creating a healthy and safe network environment.In fact, everyone has also seen that since the emergence of security cards and shadow systems, we cannot say that there are absolutely no incidents of game account hacking or online account hacking, but there are only a handful of them.
However, let us Tang Dynasty company how to defend.Some hackers are still using their technology to illegally carry out a series of stealing activities for immediate benefits.Yes, facing a large number of ordinary users, for these hackers, they have a natural advantage.With little effort, they illegally obtained a large number of online accounts.Moreover, profits are made by illegally transferring the amount in the account.
Ladies and gentlemen, those who illegally steal other people's goods, in reality, that is the crime of theft, which violates our country's criminal law.However, in this unfamiliar network.These hackers, using the technology in their hands, thought that no one knew about it, so they continued to commit crimes crazily.Until now, they are still at large.
Here, I advise those hackers to make good use of the technology in their hands and make a certain contribution to China's Internet security.If it continues like this, then I, Chen Jiayi, am here to tell you with certainty that Tang Dynasty Company... will use all its strength to crack down on Internet hacking activities.
Please believe that we can do it, because our name is Tang Dynasty. "
【
Aishang Reading Network]
This time, they are going to have a big fight. 【
Aishang Reading Network]
The target is naturally the *** network that was negotiated before.
In fact, some people will say, these hackers, why don't they steal their accounts, they just sell them, why join a studio if they have nothing to do, and expose their identities instead.In fact, no matter if it was account theft or equipment theft, it was impossible for him to be so simple.The equipment you stole, game coins, account numbers, etc... he is worthless in itself.Money can only be obtained through transactions.
In other words, account hacking is the first step, and there are still a lot of procedures to follow.For example, finding buyers, selling items... This time is much more complicated than account hacking.Just like in reality, a lot of gangsters made a lot of money.However, they also dare not spend randomly.Because they can't explain the source of huge funds.Therefore, they have to launder money to turn the illegally earned money into legal... In many cases, money laundering is much more difficult than making money.
This is also the reason why these hackers want to join the organization.
For a whole week, the entire account hacking studio started a secret road to fundraising.They came into contact with a series of h sites and some small software successively, and planted a lot of Trojan horse programs on their platform.When someone downloads these videos, he may be infected with a Trojan horse.
Some people may say, isn't Tang Dynasty Antivirus out of the Cloud Security Alliance?However, websites with Trojan horses will not be certified.In this way, the network is much more secure.However, for many people to say.They want to enter the h network, regardless of whether it is poisonous or not, download it first... In this way, there are only a small number of people infected with Trojan horses.
"ok..."
Seeing a series of account passwords sent to their backstage, the people in the account hacking studio were overjoyed, as if they saw RMB.
Although not everyone knows how to plant poison, China is so big that if you don't get poisoned, he will too.Distribute all the Trojan horse programs on a large scale, even if one out of a hundred is poisoned, it is still a huge sum.Therefore, during this period of time, they will receive a steady stream of *** account numbers every day.
And, when they land in it, a series of cash coins are transferred away.
Even, Mr. Lin sighed that this was the last transaction they made.In the future, maybe, with the technical strength of Tang Dynasty Company, there will be no way for them to survive.In this way, when they stole their accounts, they wanted to give ***.com a hard time.It is to hack accounts on a large scale within the specified time, so as to achieve the purpose of suppressing the *** network.
Although this is of no benefit to them, for Mr. Lin, he really let out a bad breath.
……
***net.
"I said, brother, my ***coin..."
A reader yelled.
This reader just recharged 50 yuan last month in order to see that the Buddha is the Tao.Unexpectedly, I just logged in to *** this morning and said that I want to *** subscribe to the chapter of "Buddha is the Way", but it actually prompts that there are no *** coins.At that time, the reader was immediately taken aback.He thought to himself, "Could it be that the legendary internet theft incident happened on my own head?"
After repeated testing, the reader finally found out.
With more than 3000 *** coins, I actually directly bought the legendary Yuanbao of ***.
***, *** are all subsidiaries of Tang Dynasty Company.Therefore, their accounts are the same.
You only need to have an account of any Tang Dynasty subsidiary, and you can log in to all Tang Dynasty subsidiaries.Moreover, the account money in it is all connected.You can use *** coins to buy things on *** network, Yuan Bao of *** network, or you can use them directly as *** coins.
In the early days, such a setting, naturally, greatly facilitated many users.After all, an account is blocked, so there is no need to register every day.However, looking at it now, this passport has suddenly become the target of hackers.These hackers just took advantage of this passport principle to transfer a large amount of *** coins to Yuanbao in the *** network.Therefore, these ingots are sold to users with a large discount of 9% or 8% off... so we see.A large part of the reason why Taobao has such cheap coins in later generations is that hackers stole other people's accounts and sold them at a low price.
"Brothers, it's a tragedy, brother's coins were stolen today."
In the tt group, this reader cried to the players.
"No, silence."
"I was wondering, do you watch too many educational films?"
Some people began to gloat.
"This one……"
This reader thought about it, and even though he hadn't read it for many days, he actually downloaded a few of them a few days ago.
"Guess so."
A lot of people in the group laughed.
"Brother, kill the virus quickly, change the password, or reinstall the system, or your future coins will be less."
"Yep."
After thinking about it, this reader immediately performed a full-disk deep antivirus. After a full-disk deep scan, he finally found several Trojan horse programs.In fact, generally speaking, Tang Dynasty Antivirus runs in the background and scans automatically.However, this scan.It is impossible for him to do a full-disk deep scan, because it takes up a lot of system resources.If a deep scan is performed automatically every day, it is estimated that a large number of users will not be able to bear it... so, these Trojan horses may survive for a few days.
In this way, naturally, when the user logs in to the account and password, everything is controlled by the hacker.
After a lot of work, finally, the system is fine, no longer threatened by viruses and Trojan horses.However, this reader was furious.Whoever it was, had their account hacked, and felt very depressed.Just after he planned to recharge a dozen yuan and read the Buddha's original teachings.Suddenly discovered that Foben is the Dao book review area, and several posts about stolen accounts suddenly appeared.
"No, so many people were stolen?"
After reading it, the poster said that the encounter was similar to that of the reader.However, this reader has been clamoring that he didn't watch station h, and he didn't download anything unclean, so why was his account stolen?Later, some friends also talked about this situation.Moreover, some readers believe that this is the hacking of the ***.
Although, this reader doesn't think ***.com will do such a thing.Moreover, ***.com is a subsidiary of Tang Dynasty Company, and its reputation has always been very good, so it is impossible to do so.Besides, doing so would not benefit them at all.However, for such a large area of hacking, I was also very depressed, and joined the army of denouncing it, asking ***.com for an explanation.
*** Editorial Department.
"what happened?"
In the ***net discussion area, there was a scolding war against ***, how could Chen Jiayi not see it?
Almost when he saw this pile of news, Chen Jiayi, who was well aware of it, immediately came to ***.com.
"Mr. Chen, in the past two days, there has been a large-scale account hacking incident on ***.com, and the readers are getting a little emotional, which led to..."
Bao Jianfeng said.
"A large number of accounts have been stolen!"
In the past, even if some game accounts were stolen, it was one by one, not a large-scale outbreak.However, this time, it actually appeared at the same time in the last two days.In this way, the impact produced is simply huge.
"The preliminary reason has been investigated. Most of the readers have been hit by a Trojan horse that is designed to steal ***.com accounts. And, in the past two days, a crazy account transfer activity has begun."
"Wow, it's actually a special fight against ***.com."
Chen Jiayi was depressed, but for a while, Chen Jiayi couldn't think of who wanted to do this.After all, Tang Dynasty Company is so big, even if there is no enmity with Tang Dynasty Company on the surface.It is estimated that, secretly, I don't know how much I hate Tang Chao Company.
"Forget it."
Now that the situation is critical, Chen Jiayi immediately ordered, "First, an official announcement should be made to explain this incident."
In the later generations, Chen Jiayi knew that some online games had large-scale account hacking.Moreover, because the authorities at that time did not carry out effective public opinion guidance, a large number of players believed that their accounts, even if they were not authorized by the game company, were their internal personnel. Otherwise, how could so many people have been stolen? account number
If ***.com does not handle this incident effectively, then the damage to ***.com is undoubtedly huge.Even, if other novel websites take the opportunity to make a big fuss in this regard, then ***.com will be in danger.
"Second, find the shooter to conduct public relations in the book review area."
This is very necessary.
If not, under the instigation of people with ulterior motives, ***.com has really become the number one enemy.Besides, for a large number of people whose numbers have been stolen, they are very emotional, and they may come up with any bad conclusions.Therefore, these gunmen can also achieve a soothing effect.
"Third, contact Tang Chao's software technology department to thoroughly investigate the matter."
This time, Chen Jiayi was really popular.
Damn it, a lot of hackers have done this before, and Chen Jia didn't bother to pursue it as soon as he considered a lot of problems in reality.Of course, it is also difficult to pursue.So, in the following time, Chen Jiayi came up with several ways to deal with it.This time, online games are blocked.Unexpectedly, the police network was actually shot.
If these hackers are still tolerated or ignored, then in the future, they will intensify.Look, in later generations, the domestic market will be like this.Everyone said there was no way to control it.First, there are no laws and regulations, and second, it is difficult to find criminal evidence online.In the meantime, cyber crimes are emerging in endlessly.
Now, Chen Jiayi is annoyed when it falls on the Internet. He is taking this opportunity to restore the health of China Internet.
"By the way, how many hacks have been discovered this time?"
At this moment, Chen Jiayi asked again.
"At present, I only know that readers on some forums have posted. However, judging from the transfer of funds from ***.com accounts today, it is estimated that there are about 5000..."
"About 5000."
Not too many, not too many, 5000 is also a piece of users.
"Suspend the currency conversion function."
Such a large-scale currency conversion function is naturally very attractive to hackers. First, Chen Jiayi suspended this function.Of course, whether the future will be opened or not is temporarily unknown.However, Chen Jiayi believes that Tang Dynasty Company has the ability to restore a healthy network platform in China.In this way, at that time, it can be opened again.
"Ok."
"Also, in the past three days, all *** currency transfer records have been restored."
"This……"
file back.
Those who didn't know, thought that a small retracement was nothing, but on the contrary, it reduced the risk caused by this incident.However, as everyone knows, the reversion this time means that ***.com paid for the account theft this time, which is just compensation in disguise.
"Mr. Chen, this time, our loss of selfishness..."
"It's okay, what should be selfish has to be selfish."
Chen Jia didn't even frown.
For the sake of his reputation, he decided to do it.
"Execution is."
"Yes."
As soon as Chen Jia finished giving the order, ***.com started to act immediately.Immediately, the official notice was issued, "Recently, ***.com *** user accounts have been seriously stolen, and we are doing our best to thoroughly investigate this matter. At the same time, in order to restore the privacy of readers, we have already edited the *** coin conversion records. , A comprehensive rollback has been carried out. And, from today, the *** currency conversion function will be suspended. I hope that readers who have stolen accounts will immediately check and kill the computer security, and change the account password..."
"Wow……"
***Net, really generous.
Here are the comments from readers.
You know, this retracement is a loss of selfishness.Because, the *** coins transferred by the hackers before have been replaced with virtual items, and maybe they have been sold out.This retracement is tantamount to returning the money to the user in vain.
"See, this is ***.com, and this is Tangchao Company."
Some users began to praise ***.com.
And, he also commented in the article, "Dare to ask everyone, which company have you seen that is so responsible?"
Yes, except for ***.A lot of other game companies didn't care about account theft.
It's not that they don't want to ask, but that they can't control it.A lot of reasons are caused by individual users.No matter how much they try to control it, they can't control it.Of course, this time, the same large number of users were also operated by individuals.However, there are too many stolen hacker accounts, which have a great impact. For the reputation of hacker.com, Chen Jiayi has to do this.
"Anyway, *** is still very responsible, top one first, but, for account theft, I hope ***.com can thoroughly investigate. These hackers are really annoying. If there are more hackers like this Hacker, I'm afraid we're doomed."
These are the opinions of readers.
In fact, Bao Jianfeng had already contacted Ziyun of Tangchao Software after ***.com released the announcement that day.After Bao Jianfeng conveyed Chen Jiayi's intentions, Ziyun immediately said, "Don't worry, leave this matter to me, and promise to investigate this matter thoroughly."
Ziyun used to be a gangster, and he was also an elder of the Hacking League.
Today, although the entire hacker alliance has basically been washed away under the influence of Chen Jiayi.However, they still know a lot about hackers and the entire hacker circle.Moreover, he knew this whole bunch of hackers, how they worked.It would be best to entrust this task to him.
"Brothers, Mr. Chen told us a long time ago. As a real hacker, he does not use his own technology to invade others, let alone use his own intrusion technology to profit himself. Today, There are still many hackers in the country who are taking the road of illegally stealing other people’s belongings. Although our hacker alliance seldom cares about the hacker circle. But today, we must tell them... Hackers don’t work like this.”
Ziyun said to a large group of hacker alliance members, that is, members of Tang Dynasty Software.
"Okay, brothers, split up."
After Ziyun spoke, a large group of former hacker alliance members started a secret search.
Not to mention Ziyun.
After ***.com released the announcement, in order to completely quell the incident and create a healthy Internet environment, Tang Dynasty Company specially held a press conference.And the theme of this press conference is only one network security.Moreover, it was hosted by Chen Jiayi himself.
"Friends, unfortunately, recently, users of our subsidiary ***.com have been hacked, and a large number of accounts have been stolen. Here, I don't want to pursue whether it is a user-operated problem, so that Infected with Trojan horses and viruses. But here, I just want to say one thing... domestic Internet security is really worrying.
Everyone must know that our Tang Dynasty company has launched two businesses before.
One is a secret security card for account protection, and the other is a shadow system for network security management.
Whether it's the secret security card or the shadow system, our Tang Dynasty company is all about creating a healthy and safe network environment.In fact, everyone has also seen that since the emergence of security cards and shadow systems, we cannot say that there are absolutely no incidents of game account hacking or online account hacking, but there are only a handful of them.
However, let us Tang Dynasty company how to defend.Some hackers are still using their technology to illegally carry out a series of stealing activities for immediate benefits.Yes, facing a large number of ordinary users, for these hackers, they have a natural advantage.With little effort, they illegally obtained a large number of online accounts.Moreover, profits are made by illegally transferring the amount in the account.
Ladies and gentlemen, those who illegally steal other people's goods, in reality, that is the crime of theft, which violates our country's criminal law.However, in this unfamiliar network.These hackers, using the technology in their hands, thought that no one knew about it, so they continued to commit crimes crazily.Until now, they are still at large.
Here, I advise those hackers to make good use of the technology in their hands and make a certain contribution to China's Internet security.If it continues like this, then I, Chen Jiayi, am here to tell you with certainty that Tang Dynasty Company... will use all its strength to crack down on Internet hacking activities.
Please believe that we can do it, because our name is Tang Dynasty. "
【
Aishang Reading Network]
You'll Also Like
-
Mythical professionals are all my employees
Chapter 271 21 hours ago -
I did it all for the Han Dynasty!
Chapter 538 21 hours ago -
Starting with the smashing of Dunkirk
Chapter 249 21 hours ago -
Steel torrents pioneering a different world
Chapter 241 21 hours ago -
My future updates weekly.
Chapter 128 21 hours ago -
Father of France
Chapter 272 21 hours ago -
In the future, Earth becomes a relic of the mythical era.
Chapter 447 21 hours ago -
From the God of Lies to the Lord of All Worlds
Chapter 473 21 hours ago -
Tokyo, My Childhood Friend is a Ghost Story
Chapter 214 21 hours ago -
At this moment, shatter the dimensional barrier.
Chapter 172 21 hours ago