Since I Was a Special Soldier

Chapter 528: The boss is not good

As for after they found out, they found out when they found out. It is still difficult for them to clean up this program, and the encryption algorithm of this program, to be honest... It's not Jiang Yanhai bragging, but the law of its encrypted shell is an electronic warfare program. If it is done, even if it is cracked by a supercomputer... it is estimated that it will not work in a few years.

If they can't crack it, the program will delete itself directly.

So Jiang Yanhai didn't worry about the problem of his own program, he directly released his program to track all the data streams of these hackers, and he did not care about the servers responsible for computing.

Fighting against these hackers has already been considered, and Jiang Yanhai doesn't know what level of his strength is the most powerful person who has come out, but what is clear is that his strength is indeed quite strong.

I don't know who the inventor of that virus is strong.

He wants to retreat is quite simple, directly set his own two firewall modes, set them to a closed mode, in this case, the firewall will automatically lock and erase all his retreating data, and then the firewall will directly reside on the server in.

When the residence time is over, it will smash itself internally. Such a closed-mode firewall will not interact with the outside world and close all ports. Of course, the hard disk where the firewall data resides is also inaccessible, leaving only an encrypted shell that can be cracked. .

Of course, if you can crack this encrypted shell, you have no problem, but if you can't crack it, then sorry, you can't do anything about it.

As for the problem of cracking, don't think about it forcibly cracking. Let alone the question of enough time, the amount of calculations of current supercomputers is not enough.

On the other hand, it is not just a problem that can be solved by the amount of calculation. If it is solely based on the amount of calculation, it is not composed of a simple number of digits. It must have a certain rule.

After fixing these two, Jiang Yanhai directly eliminated some important parts of the retreat. After 10 seconds of his retreat, the two firewalls instantly changed the mode, bounced back all access modes, and then denied any form of access.

Jiang Yanhai had left directly, and the sudden disappearance of the data stream instantly swarmed the opponent's attacks, and then the opponent's response was very quick, and these attacks were quickly shut down.

But after shutting down, they quickly controlled the two servers, but they couldn't find any clues they could find. The only thing they could know was an encrypted shell that denied all access.

The problem is that when they want to crack the encrypted shell, they find that they can't crack it anyway. Tom's server leasing company is a little better, here is an encrypted shell,

But there is a constant webpage outside the encrypted shell of this public library with a sentence on it.

"It was a pleasure to fight with you, and I look forward to seeing you next time."

This sentence is written on this page in 22 major languages ​​used all over the world, and it is estimated that anyone can understand it.

But other than that, there is nothing. Almost all hackers like the remaining id, features, etc., none of them.

It was as if this person had never appeared before, and they could not find any trace of the other party's existence in the entire server, as if the other party had never been there, except for the encrypted shell left by the firewall.

"Boss, it's not good!" The public library didn't say anything, but a security officer of Tom's server rental company said directly to his boss.

"What's the matter?" The boss Tom had a headache. He thought the matter would last for a long time, but he didn't expect it to end so soon, but although it ended quickly, their losses were not small. This time these customers will definitely lose money. .

Of course, it is impossible to lose money. At most, they are provided with free server rental for a period of time, and their data is not lost, and the other party is obviously not targeting their data.

They should be content.

"Our server can't be unlocked." The employee said in tears.

"What do you mean if you can't solve it?" The boss Tom was a little confused, didn't he mean that the other party retreated? Why can't this be solved?

"Yes, our server is directly locked, but after the lock is locked, if we want to manipulate some programs, we have to read the data in the relevant area, and now all the data in the relevant area cannot be read. We The system now has problems, unless we give up all the data in that piece." This security officer is extremely painful.

"What data is that piece?" the boss immediately asked in a daze.

"Regarding the core information of the system, if we don’t want it, the entire server must be re-made. In that case, we must at least determine which hard disk data the other party occupies, remove the hard disk hardware first, and replace it with a new hard disk. There is no way to open business for a month." The security officer looked ugly.

"One month?!" Boss Tom's voice rose sharply. If he stopped for a month, how much would he lose?

The key is that no customer can afford to stop their own database for a month. These customers will inevitably use other companies' servers. The lost customers are the most difficult to find!

It is very difficult to rebuild the server system, especially if the entire server is rebuilt, most server systems are backed up and repaired.

"What if we keep the way we are now?" The boss immediately asked ~www.wuxiaspot.com~This...maintaining the way it is, it is still barely able to operate. Our customer's data will not be affected. That part of the data is just what we are. The company’s own data, but our own data records can’t be done. And it still affects some of the performance of other customers. "

"No, I can't stay for a month, just keep it as it is." The boss Tom made the decision directly. He didn't care about that much. Now, it doesn't matter what security issues are. Anyway, it has been hacked. Could it be worse? It is better to maintain the status quo.

"Bang bang bang..." The door of his office was knocked directly. Before he could speak, his secretary pushed the door and walked in, and said quickly: "Boss, the people from fbi outside are here and they want to Take away our server!"

"Don't think about it!" Old Tom was like a Tom cat with his tail stepped on. He jumped up from the chair and rushed downstairs without even thinking about it.

Dear, click in, give a good comment, the higher the score, the faster the update, it is said that the new full marks are found at the end of the beautiful wife!

The new revision and upgrade address of the mobile station: data and bookmarks are synchronized with the computer station, and fresh reading without ads!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like