Locking Flanders' computer, Su Ye can do it at any time.

But how can I control the comments in the post?

If you can't delete Flander's previous post, then William will soon discover that Flander has locked his computer.

He has seen it in the post.

Just now Flanders invited William to deal with Qingyun Technology's official website.

As for the third step, it doesn't matter if it is late.

Now the most tangled part is the second part.

Although Su Ye has sufficient capabilities, he has never tried how to attack a website.

After thinking about it, it should be to obtain the administrator identity, and then attack... Let's.

If you have the administrative authority to post, delete, etc., it shouldn’t be a problem to delete this post completely.

You can even log in directly to Flanders' account.

Delete all the messages just now.

After thinking of his idea, Su Ye started to act.

This time, he still intends to borrow the name of Han Emperor Chen Yi.

Locking Flanders' computer, a dazzling crown appeared on Flanders' computer out of thin air.

There is also Su Ye's message below:

[Those who violated my Dragon and Heavenly Power will be punishable even though they are far away]

"Wtf, what's the situation?"

"Who made a torn crown on my computer."

"Also, what does this string of dragon Chinese mean."

Flanders can only furious incompetently.

At this time, Su Ye, after locking Flanders' computer, logged in to his account, and deleted all the words related to Longhan and Qingyun Technology in all posts.

After completing these tasks, Su Ye's inspiration flashed.

He also changed the password of the forum.

That's it.

This thing seems difficult, but Su Ye has a very relaxed feeling when he executes it.

It would be great if all the hackers encountered in the future could be solved in this simple way.

The next step is to track down William's whereabouts.

However, because William had never attacked himself and Qingyun Technology's website, Su Ye couldn't retrieve the other party's operation records at this time.

And if you get it from the animal husbandry house, you still need Su Ye to obtain the administrator authority of the website.

Although it will never be fortunate to think that this animal husbandry home is a real forum for people to provide breeding knowledge and exchanges with the industry.

It might be the mission release platform of that mysterious organization.

If he wanted to attack such a well-prepared housing exhibition in a short time, Su Ye didn't think he could do it soon.

He even stuns the snake.

It seems that now I can only rely on my own manual methods to trace the trace of that William.

Su Ye shut down several softwares, leaving only one software that warned that the firewall was attacked.

This is to avoid excessive consumption of the computing power of your computer's CPU when running those software.

At this time, Su Ye was very fortunate to choose to buy a computer for 80,000 yuan when he started the company.

Sure enough, there will be rewards for your efforts in this world, if you don't see any rewards now.

It's not that God is treating you badly.

Maybe it's just because you need to work harder or be more patient.

God rewards hard work.

In the future, we will continue to adhere to the current policy of treating employees friendly.

Didn't he see that Li Ming realized that he was being used, so he immediately called to inform him?

Although this is just one person's reaction, it represents the mentality of the vast majority of Qingyun Technology's employees.

Working hard every day, so that their talents can be used, but also worthy of the salary and bonus that Su Ye gave them.

Now in Qingyun Technology, the most ordinary employees can earn more than 6000 yuan a month.

In Jiangcheng, where the average salary is only more than 2,000, this can definitely be regarded as a clear stream in the business world.

As for the person who leaked company information, Su Ye is still waiting.

Perhaps the other party was collecting key evidence that Zhou Zihang used Li Ming for commercial theft.

That's right, Su Ye is like that.

Always look at the world with a kind heart.

However, Su Ye will never be polite to those who are not worthy.

For example, Flanders, Ivantov and the William who is about to be found.

Speaking of the name William, Su Ye thought of a song that he had heard before called William Castle.

If he remembers correctly, this song is a typical English-style song.

So, this William is British?

Su Ye summed it up and decided to narrow it down.

After all, most of the countries in the world where hackers are more famous, most of the people from Europa del Rey, do not look for a needle in a haystack on their own.

It's better to gamble on luck.

The scope is now reduced to one country.

As a veteran capitalist power in England, it is entirely possible that there are a few powerful hacker masters hidden among the people.

Want to understand this, Su Ye will directly transfer to England's telecommunications department (I don't know if there is any).

He now knows the conclusion. The other party's name is William, who has just logged into the website of that animal husbandry house.

If you can find the network signal record of the other party's browsing and posting in the process, then the reverse search can basically determine who is William.

England time is about 8 hours later than Longhan’s imperial capital time.

It should be in the afternoon.

As we all know, people in England do not work as hard as the people on Longhan's side.

They need leisure, and afternoon tea.

This living habit is something imprinted in their bones, just like the hard work of the Longhan people.

Flander sent a message to William just now, and he sent two messages in a row without any response.

It is absolutely impossible for a hacker to see and not reply to the information.

For half an hour before and after, the other party didn't react at all.

Su Ye boldly guessed that William must have been caught by something important.

Where did he know it, because the task time is still long.

William has already achieved financial freedom and freedom of life with his hacking skills.

At this time, I was watching TV in the living room with my family.

"Fuck!"

"This information flow is huge."

Su Ye exclaimed.

Different from the Internet habits of Longhan Empire netizens, if the netizens in England want to go online, the products of their own country, to be honest, are lackluster.

To put it bluntly, there are not many Internet companies in England.

They will need to use a certain social software in the German country, and later they will use a certain application in France, and finally they will use the input method and browser of the beautiful country.

Only in this way can normal Internet access functions be realized.

This is why Su Ye said that the flow of information is huge.

The main reason is that there are a lot of information requests and acceptances.

In contrast, although Longhan's domestic Internet industry has just started.

But because of the vast land and resources, a large number of people, all kinds of Internet products are already available.

Portals, search engines, game entertainment, instant messaging, etc. all have everything.

Although these products may seem immature to those foreigners, the netizens of Longhan are also immature.

Coupled with the speed of transnational Internet access, even Su Ye, a wealthy local tyrant, feels overwhelmed, let alone ordinary netizens.

Therefore, in Longhan.

If you want to find a piece of international information, it is very easy, because everyone rarely visits foreign websites.

Su Ye got a headache, and he took the time to use the mind editor to make a software for information flow classification.

It's like narrowing down the scope just now. Now let's put together the individual data information received from England to request the beautiful country.

Then filter them one by one.

As the so-called thinking determines the way out.

When Su Ye clicked to start screening, it had not been more than 5 minutes before the software had been found.

Sending a communication request from England, the Meiguo Livestock Home is responsible for receiving a total of 11 pieces of information.

"It's done!"

"Even if you can't find William now, you can find other members of that mysterious organization."

"However, William is the top priority."

Su Ye began to analyze these 11 pieces of information one by one.

This is wrong. I quit after only 11 seconds of browsing, and then I entered a chess and card website to play a game.This is not right. Su Ye could see that the other party really raised a livestock-related issue after entering the website.

"The four cows in my ranch have common limb and hoof disease. Two of them are cured, but the other two cannot be cured anyway. Do you have any good suggestions?"

Su Ye originally thought that such a post would be deleted by the backstage manager of the mysterious organization.

As a result, he did not expect that the other party actually replied.

"Because the occurrence of foot and hoof disease is often closely related to the breeding environment, we should first start with environmental management. On the one hand, the inspection of the cow bed nails must be detailed and thorough..."

This, my grass!

This reply was so professional that Su Ye couldn't help but sigh.

It’s too difficult to be a back-end administrator of a mysterious organization.

If Su Ye wants to build a website that can hide his behavior in the future, he will definitely choose to build a game or online forum as a cover.

After almost 10 minutes of screening, 3 IPs were finally determined.

All three IPs have entered the livestock house almost half an hour to an hour ago.

Su Ye saw that the other party not only directly participated in the reply to Flander's post, but also chatted with someone in another post.

However, another post, Su Ye, was no longer found.

In order to verify, Su Ye went back to Flanders' computer and looked at his operation path just now.

Sure enough, this guy also has a record of entering another post multiple times.

However, that post just disappeared.

Su Ye turned his head and glanced at the wall clock on the wall. It was almost nine o'clock by this time.

If you don't hurry up, the other party may return to the computer at any time.

Su Ye directly broke into the opponent's network.

These three IPs are all serial numbers, and Su Ye estimated that there were three interrupts in the same LAN.

Or foreigners can play, one person operates three computers.

Su Ye felt that he could kill the opponent in one fell swoop.

As a more rigid and cautious Englishman, William has the same advantages or habits as others.

He wouldn't be like the arrogant fellow Flander, thinking that he was invincible in the world, and he would be pulled down only by setting up a firewall.

At the entrance of the network, William set up two strong firewalls.

At the same time, two firewalls are also set up at the network sub-installation port of each computer.

In other words, if Su Ye wants to break William's computer, he needs to break through at least 8 firewalls to gain access to the other party's computer.

More importantly...

In order to avoid this situation where one's own computer would be attacked when not at home, William, a master of bridge construction major from Niu Jin University.

Let the firewall alarm on the computer connect to every electrical appliance in the home, including his mobile phone.

As long as someone attacks, the computer will turn on the switch to inoculate an electrical appliance after 15 seconds without a response from William.

If there is still no response after 30 seconds, the computer will send a text message to William's mobile phone asking him to go home, and a friend is looking for it.

Unfortunately, Su Ye found this alarm while looking for the core of William's firewall.

Do you want to change the alarm program for the other party?

Su Ye thought of it maliciously.

But this is a matter of waiting, now you have to make a software that can block the alarm program.

Thank you for reading this story at mtlarchive.com. Your support enables us to keep the site running!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like