Enter the command room.

Tang Qing has been frowns, he doesn’t know how things will develop today.

If the talk collapses, it will mean that you can no longer rely on this arbitrage method to make money in the future. This is the main source of income for yourself. If you lose it, you will definitely feel bad about him.

If the talk is very ‘harmonious’, the other party will acquiesce in his future transactions, even if there is a ceiling, it is also a joy.

but.

Regardless of the final result, he must show the other side the strength, so that the other party will not dare to make any more thoughts in the future, otherwise nothing can be said.

‘Food’ is not qualified to talk about conditions, they can not even decide whether they are born or dead.

“Tang Yi, take this website, the address is…” Tang Qing, who made the decision, said an address and a jump method.

“Yes, commander.” Tang Yi replied, said that he turned and transferred the task to Xiao Er, and then dismantled and distributed.

Although Tang Yi also understands, he is not a technician, but a commander. This kind of thing only needs to be moved. The second is to formulate and disassemble and distribute tasks according to the process. Tang Yi is responsible for supervising whether the task is reasonable and perfect. Others are handed over to those intelligence analysts to do it themselves. Otherwise he should not be busy.

I used a special anonymous browser on the Internet before, but I don’t need it from the command room. I don’t say that no one can find the address, even if it is put outside, with the strength of the analysts who are proficient in binary computers. It is not easy to track down their address.

After receiving the task.

Dozens of intelligence analysts immediately turned into computer experts, and jointly invaded the site. It is very simple to say, it is very simple, nothing more than using the various vulnerabilities of the web to obtain permissions.

In order to make it easier for the Internet to be “friendly” in the future, some analysts have already researched Microsoft’s system and major development languages ​​early, constantly testing and discovering new useful vulnerabilities.

Otherwise, how do you “share” information about several national police stations and agencies? The loopholes they have discovered so far are as varied as hundreds.

These vulnerabilities come in handy at this time. But because it is not certain which vulnerabilities can come in handy, an analyst tests several.

Because the preparations are too full, plus these people are ‘born’ to ‘innate talent’ for this kind of information processing.

But in three minutes, the analysts got the admin rights to the web server, and then. . . Larger intrusions have begun, not just network servers, but also computers and various communication devices over there, such as router switches and other networked devices.

After control, all the information that can be found is extracted.

. . . . . .

Africa.

That huge basement.

A bunch of people are crowded together.

The person in charge of the organization and the supervisor are watching by Jack and waiting for his good news.

They knew that Tang Qing’s trading hours were concentrated at this point, so when the first 60 million euro transfer order was issued, the bank intercepted the money.

They just waited for the anxious Tang Qing to contact them, and then tracked to Tang Qing’s position to see if they could confirm the other’s information. This is very simple for Jack.

They also considered that if Tang Qing did not want this 60 million euro ‘running road’ situation, this situation is not impossible. After all, in such a short period of time, it will transfer a huge number of nearly 20 billion US dollars, and 60 million euros will be used. It’s not too strange to play with water.

Of course, they are still lucky, gambling Tang Qing cares about this money, will contact them, if you really don’t care, they have nothing to lose, but also so much money.

They are not afraid that some people dare to come to them for trouble. They have the shadow of major banks behind them. It is not too much to say that they are doing dirty work for them. With this group of people escorting, the US government does not necessarily move them. .

But everyone still has to go through the face, you can’t always sway under the eyes of others, otherwise they will not come to such a place.

Just as the entire group is happy to wait for the fish to hook up.

Jack, who has been staring at the computer screen, suddenly sat up straight and shouted: “OH, MY GOD.”

His face was full of surprises, like seeing a ghost.

“What happened to Jack, have you found the other position?” The supervisor said happily.

“Boss, we are finished.” Jack listened with a face with a bitter smile. At the same time, put away the hands on the keyboard, a little weak to lean on the chair.

“What do you mean, which bank is the other party?” The supervisor said curiously, he couldn’t understand what Jack had just installed on the six screens.

He also thought that he had traced which bank’s account, but he was not afraid. He was apologized for misunderstanding. At the same time, he also secretly concealed the instigator’s nosy.

But Jack’s next sentence made him suddenly fall into the hail. “Boss, I mean, our server here has been compromised.” Jack said ugly.

“What, it has been compromised. How can this be possible? We have installed various security software here. How can it be compromised? It’s only a few minutes, even if World’s first hacker team came in, it’s useless? The alarm didn’t touch. “The supervisor is not channel.

The news was too fucking. He didn’t believe it. After so many years, they had suffered numerous cyber attacks, but no one came in. They paid a lot of money to hire a lot of companies and experts and even hackers to perfect their defense. System. It’s much more powerful than the firewalls on the market.

“Boss, yes, I wrote a small software that is inconspicuous in the code of the server and computer. It is useless. It is mainly to count the number and status of users with various permissions. Now all servers and routers, switches, Computers have added a super user, remember to add, those devices super users only have one, he can force another to increase, this is not scientific,” Jack explained slowly. Although he is not willing to believe, this completely illogical thing happens.

When the supervisor heard a big deal, he quickly said, “That is what makes people cut off the network.”

Jack smiled and shook his head and said: “It’s useless, it’s too late. With the speed of the network here, as long as all the customer data in the database will be copied in one minute, it will be useless.”

“What should I do?” The supervisor did not swear. In a minute, he ran to the tightly protected room for more than a minute.

Jack spread his hand and said helplessly: “This situation is notified. We can’t handle it. Now I don’t think I have any permission to do anything useful. Look, our super user accounts have all been deleted. Other low-level permissions. The account is gone, boss, we may have provoked people who should not be provoked.”

Ps: Mobile phone code words, thinking and logic are not used to it, if you feel bad, please understand.


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like