Chapter 787

Huo Shaoheng hooked the corner of his lips and said, "well," how do you want to find evidence

"Very simple ah, go to France Hermes official website backstage to turn around, as long as someone tampers with the order record, it will certainly leave traces." He closed the box and held it in his arms. "I'll see how the confidentiality of their system is today. If it's not difficult, there should be clues tomorrow."

Huo Shaoheng: "it's So fast? "

"Are you doubting my ability?" Thinking of the pick pick eyebrows, impolitely said, one hand pushed open the door, "I went down, thank you to send me back."

, holding her box, stood under the Wutong tree in front of the dormitory building, waved goodbye to him in a clear light, and Huo Shaoheng looked at her silently, and started the car away.

Thinking of seeing Huo Shaoheng's car disappear on the asphalt road in front of the dormitory building, he turns to enter the dormitory building.

Back in her room, she first took the scarves out of the box and put them in her special drawer. Then she took a picture of the inside and outside of the box. Then she took a picture with her mobile phone. Then she cut the box into pieces with scissors and threw it into a stainless steel dustbin. She found a lighter and burned it to ashes.

This is "destroying the corpse". No one will find out the box again as evidence to prove that Huo Shaoheng had done private affairs when he was on a mission

But more important evidence is still on Hermes' website.

Because Huo Shaoheng bought silk scarves with his own account number, if it is found that the purchase time point is when he is on a mission in the United States, it is also unclear.

In fact, his initiative to help Huo Shaoheng find evidence is to "annihilate" the evidence of Huo Shaoheng's violation of discipline.

For her, people like Huo Shaoheng should have no flaws in their work.

If so, it must be someone else's fault.

After processing the box, he opened his laptop and dragged out his hacker program.

She used to be able to hack into other people's computer systems with a mobile phone. Now, with a laptop, it is certainly more powerful.

She wrote this program under the guidance of Zhao Liangze. After several years, she optimized and improved it many times, and even applied quantum theory to the program optimization of password cracking, greatly improving the efficiency of hacking into other people's encryption system=_ =。

Now, even if Zhao Liangze saw her program, he would feel sorry.

However, she did not know this. She was not modest, but simply did not compare with others.

For her, the use of cutting-edge scientific theories is just as natural as eating and dressing. For example, quantum theory is still in the theoretical demonstration stage, but she has actually applied it.

In Germany, she used to dismantle the "devourer.exe" of the entire central control system of the federal intelligence agency. The wheat grain theory she used was similar to quantum theory.

After opening the program, she did a routine hiding IP routine, and then dragged the address of the French Hermes official website to her hacker program for analysis.

The first step is to find the interface between the Hermes official website program and the background.

If there is no interface between the foreground and the background, you have to find another way to solve the problem, which will be more troublesome.

She hacked into the internal network of the German Federal intelligence agency to take advantage of the opportunity they gave her to open the internal LAN to disguise as an external network, so that she would be tricked.

This time, I don't know what the official website of Hermes is like.

However, in consideration of the understanding of these online stores, it should be connected.

Because online stores generally use the ERP system that connects the front desk and the back office, and it is a simplified ERP system. The key points are inventory, shipment, timely bookkeeping, etc., which are connected with the automatic financial statement system.

Ordinary people can not enter the internal system, because this system must have a variety of passwords to prevent improper intrusion.

But for a hacker of such a level, the password is the lowest level of security system, and then the complex password for her small program with strong computing power is slag.

Just listen to ding a sound, she input the official website link for two minutes, the system shows that the password has been cracked.

As expected, the structure of the official website is too simple. Although there are various Flash animations on the surface, the basic principle is still in the original stage.

She swips her finger on the laptop touch screen and quickly enters the background of Hermes' official website.

She has seen Huo Shaoheng's purchase record, the specific date and time point are clearly remembered.

Quickly searched the other party's database and found the purchase record of the day.

She quickly replaced Huo Shaoheng's account number with her own account number, and directly modified it from Hermes' historical database. Just like the other party secretly modified Huo Shaoheng's transit address, she was more considerate. She concealed the whole account and replaced it.

So the person who placed the order became the one who cared about himself.

Then erase the traces of system modification.For her consideration, she doesn't need to create "system failure" to roughly erase the traces of modification. She directly uses the other party's system to update and backup the original data every day, and uses a completely covered small program to modify all the other party's backups.

In this way, in addition to the one who has changed the forwarding address, no third party will know that the order has quietly changed its account number.

Even if the IT programmer who answered Huo Shaoheng's inquiry call today, he will not think of checking the account number.

I even marked "VIP" on my account so as to confuse the other party's memory more realistically.

Change the account number, modify all the backup data, just enter the second step of the program.

She wanted to see which IP was hacked into the official website of herm è s on that day and modified the forwarding address of Huo Shaoheng's order.

Time goes by so long, the other side also looks like a master.

This needs to enter the other party's system management program to see all the IP that has logged in the system, and then screen out the IP of the appropriate time period and the IP associated with Huo Shaoheng's order.

This requires a very large amount of computation.

To be on the safe side, I downloaded all the IP addresses on the official website of Hermes that day and put them into their own programs to start searching.

With such a large amount of data, we still need to verify the analysis. Considering that this small laptop is a little overloaded.

She looked at the calculation time given by the program, and it took 15 hours to complete the analysis.

It's twelve o'clock at noon, that is to say, it won't be finished until three in the morning.

She immediately pushed her laptop to one side and ran it by herself. At the same time, she took out the iPad and began to write a thesis.

……

Huo Shaoheng returned to the headquarters of the special operations division and went back to his official residence to change his clothes.

From upstairs, I saw Yin Shixiong come back.

"Are you ready?" Huo Shaoheng asked casually as he buckled his military uniform.

Yin Shixiong pursed his lips and stood at attention immediately, but his gossip was about to break through the sky

Huo Shaoheng raised his eyes and gave him a cold look.

Yin Shixiong was so excited by this look that he laughed, "Huo Shao, did you just come back from the hospital? Is it OK to read it? "

This is the second change, monthly ticket 5800.

Remind relatives of the monthly and recommended tickets Oh!

It's the third watch at 7 p.m.

O(∩_ ∩)O~。

www.novelhold.com , the fastest update of the webnovel!