Rebirth of Cyber ​​Hegemony

Chapter 976: Which Anti-Theft Technology Is Stronger?

"This?"

"Is it still possible?"

"Secret card, IP address detection, what else?"

The elites of the Extermination Team were ashen.

Two shots, both times they failed miserably.

Moreover, their fiasco got worse every time.

Those who didn't know thought that those hackers didn't know much about the Huanyu system for the time being.

But the truth is, it's not that they don't know about the Huanyu system, but Huanyu Technology itself knows too much about itself.

They really know themselves too well.

Where do you have problems, where do you easily get attacked, and where do you fail to do well?

Thus, dynamic security appeared.

Thus, IP address detection occurs.

You know, this is a trick that a series of website Internet companies have never seen before.

Faced with such a novel move, all of a sudden, they had no choice.

It's like cracking passwords, everyone has been cracking all kinds of passwords all the time before.

This password can have numbers, letters, or even a series of symbols.

But no matter how difficult it is, they can still think of a way.

But this time, the password appeared fingerprints.

Strictly speaking, fingerprints can also be broken.

But from passwords to fingerprints, this is a qualitative improvement.

No matter how much knowledge of cryptography they have learned before, it will not work.

As now.

Even if they have more Trojan horses and more advanced technology, what can they do if they encounter the anti-theft system of Universal Technology?

Not to mention the security card.

Just an IP address detection, they don't know what to do.

At the same time, for some unknown reason, they couldn't help but admire Huanyu Technology.

How can some other Internet companies think of so many anti-theft strategies.

But Huanyu Technology, their ideas go beyond countless Internet companies.

It can be said that the anti-theft measures made by Huanyu Technology this time can definitely greatly improve the security of the Internet.

At least, these two anti-theft strategies, in the future, more than 95% of the guys who steal accounts will have to stop.

As for why.

What else could there be?

It is completely lack of technology, it is impossible to steal.

Not to mention them, now they all have some coercion and don't know what to do.

"Everyone, cheer up."

"Have we just given up?"

"Could it be that the elites in so many of our industries are not as good as Huanyu Technology?"

[Destroy Yu Group] The person in charge convened a group of industry elites and held a meeting.

He knew that if he didn't agitate everyone's morale, the confidence of these people would be destroyed.

"Isn't it just adding the function of IP detection, isn't it just adding a secret security card, can't we break it?"

"IP detection seems to make him impeccable, but it is not necessarily. If we log in with the IP address of the stolen person, won't it be cracked? Of course, this may take some effort, but it is not impossible."

"As for the secret security card problem, it is not impossible to solve it. I have two types of secret security cards launched by Universal Technology here. Let's talk about the simpler ones first. The simpler one is the secret security provided by the recharge card, which corresponds to the secret security card. Each corresponding coordinate is a secret. However, the corresponding coordinates on a card are limited, that is to say, we only need to record several times. Of course, it will take a certain amount of time, which may take several days. Or dozens of days, but through these methods, we can also break their coordinates."

"What's more complicated is the dynamic secret security they introduced, which is what I have in my hand. This secret secret will randomly generate a row of numbers every 15 seconds, but in fact this is the same as the secret security card with coordinates. Generation is not a generation without any rules. When generating this series of numbers, he also has a survival formula. If we record these numbers more, then we can also deduce their formulas."

It has to be said that the strength of a series of top system security elites from around the world is still terrifying.

Although Huanyu Technology's series of anti-theft methods completely exceeded their surprises, it was not without solutions.

At the same time, many of these system security experts are top math experts.

As long as they can record a series of numbers, they must be able to calculate the formula behind it.

"Everyone, how are you doing now?"

"Have some ideas."

"Very good, then cheer up, we don't want to be compared by Huanyu Technology."

"certainly."

The members of the Yuyu Team clenched their fists.

At this time, they were full of fighting spirit.

It's not as good as before.

Before they joined the Yuyu team reluctantly, they felt that they were overqualified.

At the same time, they also feel disgusting to do this kind of thing.

They are the elites of global system security. They used to do things to maintain system security, but now they have started to make Trojan horses and viruses, which are immoral.

Just threatened by Microsoft, they have to do the same.

But once they turned the contest, they found that Universal Technology was not necessarily what they wanted to win.

It also piqued their competitiveness.

If not fighting for Microsoft these days, they have to fight for their own reputation.

If Lian Huanyu Technology can't win, how can they protect the security of the global system in the future.

If Lian Huanyu Technology can't be broken, what face do they have in this circle?

"Brothers, let's discuss what to do next."

"I think we should increase the monitoring function of Trojan horses, otherwise, without long-term monitoring, we can't break their anti-theft at all."

"Yes, but I'm afraid this will increase our risk and we have to be careful."

"Rest assured, we are always careful."

Fighting for face, the elites of the Extermination Team once again became angry.

They came up with dozens of new types of Trojans.

This kind of Trojan is a further upgrade of all previous Trojans, whether it is hiding or monitoring.

At the same time, they also carried out a more powerful strategy for the new anti-theft strategy developed by Huanyu Technology.

"Damn, I'm finally done."

"I'm exhausted. I changed it for seven days and seven nights. This is the strongest Trojan horse I've ever made."

"This is also my strongest Trojan horse."

"Let's act together, we won't destroy Universal Technology, we will never give up."

After a series of efforts by everyone, the Yuyu team put the strongest Trojan horse they produced on various movie websites.

Once a Huanyu system user is caught, then their computer will not have any secrets at all.

"How, what is the effect?"

"It's very good. Those people are really lustful. They go to download small movies every day and never learn their lessons. Our Trojan horse was successfully implanted into their computers."

"But it seems that the downloads of the Universal System have increased."

"Well, it's true. On the other hand, this proves that the number of users of the Universal System is increasing. I received news from Microsoft, and it is estimated that Microsoft is also in a hurry. They urged us again."

"I believe that this time we will definitely be able to turn over Huanyu Technology."

Everyone is very confident in the Trojan horse they made.

All we have to do now is to wait beside the emails and expect these Trojans to send back the monitored data emails.

Just waited for several days, strange things happened again.

In the past few days, the Trojans created by these top system security experts have only sent back hundreds of thousands of emails.

But if they calculated from the infected computers, they calculated that they have infected at least 1 million units in the past few days.

There are only a few thousand emails sent back from a million units.

Even if these thousands of emails have been sent back, all the data monitored has been recorded, and their numbers have even been stolen.

But what's the use of it.

This kind of hacking rate is too low, even if it happens, it won't cause any extraordinary results.

"What's the matter, why is there no news about most of our Trojans?"

"I don't know, it won't be killed."

"No, I used 360 antivirus, and out of the dozen or so Trojans I created, only a few were detected, and the rest were undetectable."

"That's weird, what's going on?"

In order to find out this phenomenon, the Yuyu team spent several days and couldn't find the reason.

Can't blame him for that either.

The Yuyu team is in the United States, and they can't go to China to inspect information in real time.

They just made a series of Trojan horses for the Huanyu system and the information given before.

But the world is changing too fast.

Similarly, the Internet technology is changing very fast.

You have the most advanced hacking technology.

Other people's anti-theft methods have improved for several generations.

Do you think that Universal Technology only uses security cards and IP detection technology to prevent theft?

They also have a more absolute, direct one-click restore.

Yes.

This is a newly introduced function from the Huanyu Internet Cafe System.

As long as this function is turned off, no matter what was downloaded before, all the operations will be deleted.

In this, it naturally also includes the Trojan horse in [Destroy Yu Group].

"One-click restore, our Trojan was deleted by them with one click."

"Our strong Trojan horse was wiped out by their poor technology."

"Hahaha, hahaha, hahaha... I won't play with you anymore."

Suddenly, a member of the Yuyu team burst out laughing wildly, and then rushed out of the office.

"He seems crazy."

"Looks like it is."

"What about us?"

"I think we'd go crazy if we stayed here."

Many people looked at each other and resigned to the person in charge.

They really have no face to stay here.

"you……"

The leader of the Extermination Team opened his mouth, he really wanted to save these elites.

However, he knew that no matter what he said, these people would not stay here any longer.

The previous three battles had completely destroyed their self-confidence.

They cannot recover without a certain amount of time.

"Okay, you can rest for a while, I'll go back and think of other ways with Microsoft."

He knew that these people had done their best.

But if they did their best, what else could they do?

Even if they stay, they can't deal with Huanyu Technology.

Chapter 993/1195
83.10%
Rebirth of Cyber ​​HegemonyCh.993/1195 [83.10%]