HacKer

Chapter 22: bet

Feng Ke’s inside security company, the technicians headed by Ma Yong, looked very ugly.

Stealing the teacher!

Shi Lei actually insulted them like this!

Even with Ma Yong, the old fritters that have been mixed for more than ten years in the workplace are a bit angry.

"Mr. Shi, so to speak, you can certainly recover, all the data in our server?"

Shi Lei nodded proudly.

"of course!"

"What if I can't recover?"

Ma Yong sneered and said: "If you talk big, you don't have to pay taxes!"

"Like fart, let go, that's it!"

Shi Lei raised his brow. "If I restore the data, what should I do?"

"Don't say anything to apologize!"

"Your apology, stone brother is not rare!"

Ma Yong hesitated for a moment, but Shi Lei is too young, young to people do not believe, he does have a strong technology!

"Mr. Shi, what do you say?"

"After all, Mr. Shi, you are still a student!"

Ma Yong squinted at Shi Lei, his tone was quite ironic. In the words, it is revealed that the bully of Shi Lei is a poor boy!

Shi Lei rolled his eyes and looked at Feng Kedao: "Feng, I can help you recover the server data!"

"But, given the situation of your server, this data recovery cost is a bit expensive!"

Feng Keface said with no expression: "How much?"

Shi Lei erected three fingers, and the lion opened his mouth: "Three thousand!"

"No problem!" Feng Kelian did not blink!

Shi Lei’s heart is secretive, is it necessary to be less?

Although a little regret, but Shi Lei is not the kind of villain who sits on the ground, he turned to look at Ma Yong.

"Ma director, it is better for us to bet these 30,000!"

"If I recover the data, you can give me 30,000 more!"

Ma Yong hesitated.

Shi Lei smiled and said: "The horse supervisor, don't you dare?"

"What are you afraid of!"

Ma Yong held his head and said with a sneer: "However, if you can't recover the server, as a poor student, how do you pay me 30,000?"

Shi Lei still did not speak, Sun Feng took the initiative to say: "I help the stone to pay!"

"Although I was just downstairs, I opened a small repair shop, but 30,000 yuan, I can afford it!"

Shi Lei moved to look at Sun Feng, "Feng Ge, thank you!"

"Stone, we have known each other for several years. If you lose this time, you can help the brothers to work in the future!"

Sun Feng said with a sigh.

Shi Lei focuses on the key.

"General Feng, you are all going out!"

"I want to start recovering data!"

Feng Ke did not hesitate to directly call the IT department, and Sun Feng, go out together.

Shi Lei stopped the road: "Feng Ge, what are you going out for?"

Sun Feng glanced, then hehe smiled and stayed.

When Feng Ke took the IT department and all went out, Sun Feng asked: "Stone, is your kid sure?"

Shi Lei laughed haha ​​and took out his U disk.

"Feng brother, have you seen my strength last time?"

Sun Feng snorted, "Last?"

“Last time, it took you nearly four hours to recover sixty-two photos?”

"What is this strength!"

Shi Lei rolled his eyes, "Feng Ge, I really don't know you guys, half of the technology doesn't understand, how to hold up the repair shop!"

"Tell you, the last time I used so much time, it was because I didn't have a ready-made recovery software!"

"For four hours, more than 90%, I am writing data recovery software!"

Sun Feng suspicion: "Stone, what do you mean, this time you can recover data, you can't use too much time?"

Shi Lei nodded casually, "Feng brother, you look for a computer, play minesweeping!"

"I will restore the data first!"

Sun Feng nodded helplessly, minesweeping something, really annoying!

Shi Lei sat in the swivel chair, first opened the security policy of the server, and after making some changes, he used anti-virus software to successfully contain the malicious virus in the lurking.

Next, plug the USB flash drive into the server's USB interface and run it directly on the USB flash drive, his own ‘depth recovery’ software.

To be honest, Shi Lei does not know how many data files are deleted in the security security server.

It is estimated to ask Ma Yong, the guy will not tell Shi Lei, and even ridicule Shi Lei.

However, Shi Lei did not intend to ask.

Although I don't know what to look for in security, Shi Lei has his own way.

Shi Lei's own deep recovery, some of which applied the new theory of 2012.

In the era of zero years, it is simply a fantasy!

For example, delete the file timeline technique.

Deep recovery software first establishes a timeline based on the time of all files and deletions.

For example, the A file, the deletion time is January 1 of the year of 2006; the B file, the deletion time is February 2, 2006; the C file, the deletion time is September 9th, 2006.

Then, delete the file timeline, there are three points, the first January 1st, the last September 9th.

As long as you have this timeline, Shi Lei can find out the specific time of the recent large-scale deletion of documents.

Malicious programs, repeatedly copying and deleting junk files, will first delete all stored files on the server.

As long as the exact time of the first large-scale deletion of the file is found, the file that was previously deleted, including this point in time, can be recovered based on this time point.

As for the deletion record after this time, Shi Lei will only randomly select some recovery, and then check if it is a junk file and make a judgment.

The security-focused server does not use a non-X86 server, but instead uses a generic X86 server and is only a departmental server.

The so-called X86 server, and non-X86 server, the main difference is the instruction set, it can be said that the operating system is not the same.

The X86 server is commonly referred to as a PC server. In general, the X86 server uses an Intel processor and a Windows system, using the CISC complex instruction set.

This kind of server has a wide range of applications. Although the compatibility is good and the price is cheap, the disadvantages are also obvious, the stability is poor, and the security performance is worse!

For non-X86 servers, the RISC reduced instruction set is generally used, and the EPIC parallel instruction code is also used.

This type of server is a high-end gadget!

They are expensive, have a closed system, and have good stability, excellent performance and high safety.

Mainly used in the core business of large enterprises.

For example, the financial industry, the telecommunications industry, the absolute giant industry!

The X86 server is roughly divided into four levels.

Entry-level servers, such servers, in fact, and ordinary PCs, performance gap is not large.

Even some small companies and small businesses simply buy a high-performance personal computer and act as a server.

For example, Shi Lei last time, in the maintenance shop of Sun Feng, the two machine emperors he saw, can be used as an entry-level server.

The second level of the server, the workstation server.

Although the workstation server is more powerful than the entry-level server, it is a low-end server!

The third level, the medium-sized server, is the departmental server that is being used by Looking Security.

Such servers have higher performance and higher prices, which are often used by medium-sized enterprises.

The ** department of large enterprises also often uses this level of servers.

As for the fourth-class enterprise server, it is actually a real high-end server.

This level of servers is generally non-X86 servers, most of which use Linux systems, or Unix systems.

In 2006, enterprise servers, usually only large high-tech companies, will be used.

Shi Lei looked at the timeline of deleting documents while scorning himself.

“It’s a ghost, a big company with high technology, actually using departmental servers!”

"I thought it was an enterprise server. I can leave a back door and borrow borrowed computing resources. I didn't expect it to be small slag!"

Sun Feng is on the side, trying to mine, and listening to Shi Lei’s muttering, casually saying: “Stone, what are you talking about?”

Shi Lei quickly said: "Nothing!"

"Data is recovering!"

Sun Feng was shocked and looked at the time in the lower right corner of the computer, only after more than ten minutes.

"So fast?"

Shi Lei said without words: "Is this fast?"

"If it's not a garbage server looking around security, it's estimated to take up to five minutes!"

Sun Feng looked at the eyes and inserted the U disk on the server's USB interface, as if watching a peerless beauty.

"Stone, such a light and easy job, how dare you want 30,000?"

Shi Lei snorted, "Feng Ge, there is a saying, the harder will not, the meeting is not difficult!"

"I have mastered this technology, so you feel easy!"

"If you give it to other data recovery studios, although they can recover, they will take at least a week, and the asking price is definitely higher than me!"

“I have a shorter time to recover data than others, and the fees charged are lower than others. It’s very kind!”

Sun Feng enviously looked at Shi Lei.

"Stone, or you have a future with knowing technology!"

Shi Lei smiled and said: "Feng brother, waiting for a while will ultimately be your advantage!"

On the display, the depth recovery software interface has been shown to be restored.

Shi Lei pulled the U disk down and put it in the pocket, only to go to the door and shouted.

"Feng total, get it!"

Feng Ke quickly came over, there is another person, faster than Feng Ke's footsteps, this person is Ma Yong!

After Ma Yong ran in, he immediately sat in front of his computer and started using internal management software to query the server for a variety of information.

No matter what he inquires, all the data is clearly displayed on the display!

"This....how is this possible!"

"This is only twenty minutes!"

"impossible!"

Ma Yong growled incredulously!

——————————————————————————————————————————————

PS: Currently recommended tickets, 2426, before 8:00 pm, 2550, that is, more than 100, a total of more than 1,000 books to read the book, one-tenth of the book friends, each vote Get rid of it, then add more!

Seeking collections, recommendations, member clicks, rewards, reviews, book reviews, and everything!

thank you all! Thank you mountain!

——

[Thank you for your appreciation] Xiao Song 8888, (Scarecrow), ink and ink L, reward 100.

.

.

.

;

{飘天文学 www.ptwxz.com Thank you for your support, your support is our greatest motivation}

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like