Hk205 Earn 100 Million!
Shuangqing City is an international metropolis. As a city directly under the jurisdiction of the Central Xia Kingdom, the status of Shuangqing City is equivalent to that of an independent province.
Therefore, the Western General Administration of the Cyber Security Bureau is set up in Shuangqing City!
In the Western General Office of the Cyber Security Bureau, Ling Yuguo paid 1,000 Xia Guoyuan to the UBS international account opened by Mirage Technology's parent company, Mi Rui Technology, on his laptop through Fantasy Technology's online payment system.
When the online payment system shows that the payment is successful, an independent display layer emerges, which displays a 32-digit mixed string of numbers and letters, which is the authorization code of the Sakura virus data recovery tool.
Each authorization code can only correspond to one machine code, that is, it can only be used in one computer device. [
Ling Yuguo copied the authorization code and installed the data recovery tool in the USB flash drive according to the operation steps provided on the official website of Fantasy Technology. Then insert the USB flash drive into the computer device where the data needs to be recovered.
It is also a laptop that the Western General Administration tested and recovered data. At this moment, on the screen of the laptop, pink cherry blossoms are flying.
When the USB flash drive installed with the data recovery tool is inserted into the USB interface, a text input box appears in the dancing pink cherry blossom animation, prompting to enter a 32-digit authorization code.
According to the authorization code just copied, Ling Yuguo manually entered the mixed authorization code of 32 letters and numbers, and clicked the confirmation button.
The pink cherry blossom picture disappeared, the silver Mobius ring logo of Fantasy Technology appeared, followed by a circular percentage display bar, and text indicating that the data was being restored.
Due to the test notebook of the Western General Administration, there is basically no data in the hard disk, and the data recovery tool only took five minutes to restore all the data.
Ling Yuguo gave the test notebook to Kong Yi, "Kong Yi, do you see if the data has been restored completely?"
Kong Yi is an expert in data encryption and data recovery. He quickly checked the data in the test notebook. This test notebook is the test data he provided, so he is very clear about the data. After a while, he said: "Ling Bureau, the data has been completely restored!"
"Is the recovery complete? Is this fantasy technology company really that powerful? Or did they create the cherry blossom virus?" Ling Yuguo seemed to be asking himself. "Yang Lin, look at this data recovery tool, is there any system backdoor left?"
Yang Lin is an expert in virus and Trojan horses. If the data recovery tool will leave a backdoor program, Yang Lin can basically find it!
After checking the test notebook carefully, Yang Lin shook his head and said, "Officer Ling, no backdoor program was found. I checked the system just now, and the system is clean and has not been changed. In addition, the data recovery tool does not hide the behavior of networking. mode, it is preliminarily concluded that it is safe!"
Ling Yuguo was still worried: "Let's test it thoroughly together. There is also a problem with the command system in the Rongcheng Military Region. We must ensure that it is lost!"
Rongcheng City Taxation Bureau, Xiao Zhao rushed to the bureau overnight, bringing his own notebook and a USB flash drive with the Fantasy Technology data recovery tool installed.
The director of the tax bureau personally took the lead in working overtime. Can other staff not work overtime? As a result, all the staff of the tax bureau arrived at the tax bureau.
In the office, the Director of Taxation looked at Xiao Zhao and said, "Xiao Zhao, have you really found a way to recover your data?"
Xiao Zhao nodded, and then said a little embarrassedly: "Director, although the method has been found, it is not free. Companies that provide data recovery need to charge a certain fee."
The Director of Taxation said nonchalantly, "As long as the data can be recovered, the fee will be charged!"
"Director, the price of data recovery is a bit expensive!" Xiao Zhao said embarrassedly: "It will cost 1,000 yuan to recover!"
"1,000 yuan?" The tax chief thought it was too expensive! I didn't expect it to be only a thousand dollars! "Xiao Zhao, let's start restoring data! It's just 1,000 yuan, and our bureau reimbursed it!"[
Xiao Zhao coughed and said, "Director, it's 1,000 yuan for a computer, not 1,000 yuan to restore everything!"
"What?" The tax chief immediately called the director of the office and asked, "Director Guang, how many computers are there in our bureau?"
Director Guang thought for a while and said, "Director, there are a total of 132! There is also a main server and a backup server."
Xiao Zhao calculated: "One hundred and thirty-four computer equipment, a total of 134,000 yuan, Director, restore it?"
The Director of Taxation gritted his teeth and said, "Recovery! Not to mention more than 130,000, but 1.3 million, we have to recover too!"
"Understood!" Xiao Zhao also knows the seriousness of the matter. If the information stored by the tax bureau is lost, the loss will be calculated as 100 million yuan!
At the same time, a large number of enterprises have purchased data recovery services from Fantasy Technology. Some companies with a large number of computer equipment also attempt to purchase one or two hundred authorization codes and then reversely calculate the generation rules of authorization codes.
However, the authorization code designed by Shi Lei is completely a randomly generated string of 32 digits and letters, and there is no half-point rule at all. After each 32-bit string is generated, the corresponding authorization code will be stored in the database of the No. 1 server.
When the authorization code is used to activate the data recovery tool, it will automatically connect to the database of the No. 1 server for automatic comparison. The data recovery tool will only be activated if there is a corresponding authorization code.
Therefore, as for those who try to cheat and play tricks, how to calculate the generation rule of the authorization code can also be made into a tool like an authorization code generator!
On Jingyayuan's side, Shi Lei keeps an eye on Fantasy Technology's official website to prevent malicious hacking and malicious investigation by some people.
When it was close to 0:00 in the morning, Shi Lei checked the international accounts of UBS and MiRui Technology and found that he had already earned more than 30 million Xia Guoyuan!
A computer costs 1,000 yuan, more than 30 million yuan, just more than 30,000 pieces of computer equipment!
Shi Lei believes that with the passage of time, there must be more and more money coming into the account. But Shi Lei also has a worry in his heart. In this cherry blossom virus disaster, Fantasy Technology has made too much money!
This is not good for fantasy tech!
In case of being misunderstood by others, Fantasy Technology is the maker of the cherry blossom virus, that would have a very bad impact on Fantasy Technology!
After thinking about it, Shi Lei gave up washing and sleeping, but opened the programming software and prepared to write a cherry blossom killer!
Cherry Blossom Killer is also a computer virus, but unlike other computer viruses, Cherry Blossom Killer will only search for the Cherry Blossom virus in the Internet, and then forcefully delete the Cherry Blossom virus.
When they can't find the cherry blossom virus on the Internet, they will start to clear themselves.
After half of writing, Shi Lei put up an announcement on Fantasy Technology's official website, indicating that Fantasy Technology is trying to completely eliminate the cherry blossom virus.
The time is approaching the early morning... and Shi Lei still hasn't gone to sleep. Instead, he continues to write Sakura Killer and maintain the official website of Fantasy Technology.
The official website of Fantasy Technology has been maliciously attacked intermittently. If there is no defense from Shi Lei, I am afraid it will be captured. It's just a pity that the Rock Firewall method is used. [
The Panshi Firewall is on the blacklist of Wosang Country, and the Sakura virus was developed by Wosang Country's powder Sakura. If the International Intelligence Bureau of the Ministry of Foreign Affairs of Wosang discovers the Panshi Firewall, then Shi Lei will be out of luck!
In an all-nighter, Shi Lei finally completed the development of Cherry Blossom Killer. Log in to UBS and check the bank account of Miray Technology.
On the display, the available balance of the bank account shows a long list of numbers!
Looking at this long list of numbers, Shi Lei was shocked!
He repeatedly counted several times, and finally confirmed that the number before the decimal point has a total of nine!
Xia Guoyuan: 103,223,00000!
103,223,000 yuan!
"One hundred million!" Shi Lei patted his face hard, and muttered to himself, "Could it be that after staying up all night, my eyesight is not enough?"
Rushing into the bathroom, Shi Lei wet his head with cold water, looked in the mirror to confirm that he was awake, and returned to the No. 1 server!
Counting the number on the screen again, the figure of the available balance is indeed nine digits, more than 100 million yuan!
"Hahahaha!" Shi Lei laughed and snorted coldly, "Pink cherry blossoms, pink cherry blossoms, should I invite you to dinner? Or should I share with you?"
Wo Sangguo, Pink Sakura is analyzing the data recovery tool developed by Fantasy Technology. He specially exchanged Japanese yen for 1,000 Xia Guoyuan and purchased an authorization code to check the recovery effect of the data recovery tool.
Judging from the test results, pink cherry blossoms were hit hard!
"Who is the person behind the fantasy technology? He actually completely deciphered the cherry tree genetic blueprint of the cherry blossom virus!" Pink Sakura frowned, unable to believe the facts in front of her. When he was about to invade Fantasy Technology, the computer's firewall suddenly sounded an alarm!
In the Western General Office of the Cyber Security Bureau, after a night of struggle, Ling Yuguo, Ding Qiudun, and Yang Lin jointly analyzed the cherry blossom virus data recovery tool, and repeatedly confirmed that the data recovery tool did not have any backdoors, and immediately reported to the Rongcheng Military Region. A solution was provided and the specific situation was reported to ns.
ns has investigated all the information about Fantasy Technology, and firstly found Mi Rui Technology Company. Due to the legal problems in the Cayman Islands, the ns law investigated the specific situation of Mirui Technology Company, and finally had to return to the domestic investigation.
Fantasy Technology was registered in Shuangqing City, and they quickly found Shi Lei's body
Shi Lei was looking at the more than 100 million yuan in the international account of UBS and smirked, but he immediately thought of an important question.
Fantasy Technology has earned so much, I am afraid that the domestic NS, and the four major network security bureaus, should check his old bottom, right?
(To be continued. If you like this work, you are welcome to register as a member of this work. Your support is my greatest motivation.)