"This?"

"Can you still do this?"

"Security card, detect IP address, what else?"

The elites of the mieyu group looked pale.

Two shots, two defeats.

Moreover, their defeats are getting worse and worse.

I don't know. I thought those hackers didn't know much about Huanyu system for the time being.

But the truth is that it's not that they don't understand the Huanyu system, but that Huanyu technology itself knows too much about itself.

They know themselves too well.

Where do you have problems, where are you easy to be attacked, and where are you not doing well?

Therefore, dynamic security appears.

Therefore, IP address detection appears.

You know, this is a trick that has never appeared in a series of websites and Internet companies before.

In the face of such a novel move, they can't do anything at once.

It's like cracking passwords. Everyone has been cracking all kinds of passwords before.

The password can have numbers, letters, or even a series of symbols.

But no matter how difficult it is, they can still think of a way.

But at this time, the password appeared fingerprints.

Strictly speaking, fingerprints can be broken.

But from passwords to fingerprints, this is a qualitative improvement.

Even if they had learned more about cryptography, it didn't work.

Just like now.

Even if they have more Trojans, ox fork technology and encounter the anti-theft system of Huanyu technology, what can they do?

The security card goes without saying.

Just an IP address detection, they don't know what to do.

At the same time, I don't know why, they can't help admiring Huanyu technology.

Where can some other Internet companies think of so many anti-theft strategies.

But Huanyu technology, their ideas go beyond countless Internet companies.

It can be said that the anti-theft measures made by Huanyu technology this time can definitely greatly improve the security of the Internet.

At least, these two anti-theft strategies, in the future, more than 95% of the guys who steal numbers will have to rest.

As for the reason.

What else?

It's not enough technology. It's impossible to steal.

Don't talk about them. Now they are forced. I don't know what to do.

"Everybody, cheer up."

"Did we just give up?"

"Are the elites in so many industries not as good as Huanyu technology?"

The person in charge of [mieyu group] convened a group of industry elites and held a meeting.

He knew that if we didn't boost everyone's morale, the confidence of these people would be destroyed.

"Isn't it the function of IP detection? Isn't it a security card? Can't we break it?"

"Although IP detection seems to be impeccable, it may not be. If we log in with the stolen IP address, won't we crack it? Of course, it may take some effort, but it's not impossible."

"As for the security card problem, it is not impossible to solve. I have two types of security cards launched by Huanyu technology. First, let's be simple. The simpler one is the security card sent by the charging card. The security card has corresponding coordinates, and each corresponding coordinate is a security card. However, the corresponding coordinates on a card are limited, that is, we only need to record more times Of course, it will take some time, maybe a few days or dozens of days, but through these methods, we can also break their coordinates. "

"What's more complicated is the dynamic secret protection they put forward, which is the one in my hand. This secret protection will randomly generate a row of numbers every 15 seconds, but in fact, this is the same as the secret protection card with coordinates. This random generation is not generated without any rules. When generating this series of numbers, it also has a survival formula. If we record more of these Numbers, then we can also deduce their formulas. "

It has to be said that the strength of a series of top system security elites from around the world is still terrible.

Although a series of anti-theft means of Huanyu technology completely exceeded their accidents, it is not without solutions.

At the same time, many of these system security experts are top mathematics experts.

As long as they can record a series of figures, they must be able to calculate the formula behind them.

"How are you now, everybody?"

"I have some ideas."

"Good, then cheer up. We don't want to be compared by Huanyu technology."

"Of course."

The members of the mieyu group grabbed their fists.

At this time, they are full of fighting spirit.

This is no better than before.

In fact, they were reluctant to join the mieyu group before. They felt that they were overqualified.

At the same time, they also feel disgusted to do such things.

They are the elites of global system security. They used to do things to maintain system security, but now they have started some immoral activities such as making Trojans and viruses.

Just threatened by Microsoft, they have to do the same.

But after a contest, they found that Huanyu technology may not be what they want to win.

This also aroused their competitive spirit.

Now, even if they don't fight for Microsoft, they have to fight for their reputation.

If they can't even win Huanyu technology, how can they protect the security of the global system in the future.

If they can't even break Huanyu technology, what face do they have to mix in this circle?

"Brothers, let's discuss what to do next."

"I think we should increase the monitoring function of the Trojan horse. Otherwise, without long-term monitoring, we can't break their anti-theft."

"Yes, but I'm afraid it will increase our risk. We have to be careful."

"Don't worry, we are always very careful."

In order to fight for face, the elites of mieyu group are angry again.

They have created dozens of new types of Trojans.

This trojan horse is a further upgrade of all previous Trojans, regardless of its hiding and monitoring functions.

At the same time, they also carried out more powerful strategies for the new anti-theft strategy developed by Huanyu technology.

"Shit, I finally did it."

"I'm so tired. I changed it for seven days and seven nights. This is the strongest Trojan horse I've made."

"This is also my strongest Trojan horse."

"Let's act together. We will never stop until Huanyu technology is destroyed."

After a series of efforts, mieyu group hung the strongest Trojan horse they made to various movie websites.

Once the users of Huanyu system are recruited, their computers will have no secrets.

"What's the effect?"

"Very good. Those people are really good. They download small movies every day and never learn a lesson. Our Trojan horse was implanted into their computer smoothly."

"However, it seems that the download volume of Huanyu system has increased."

"Well, it's true. On the other hand, it proves that the number of users of Huanyu system is increasing. I received a message from Microsoft. It's estimated that Microsoft is also anxious. They urged us again."

"I believe that this time we will be able to turn over Huanyu technology."

People are very confident in their own Trojan horse.

All we have to do now is wait by the email and expect these Trojans to send back the monitored data email.

After waiting for several days, strange things happened again.

In the past few days, the Trojan horse made by some top system security experts only sent a few hundred or thousands of emails back.

If you can calculate from infected computers, they calculated that at least 1 million computers have been infected in recent days.

Only a few thousand emails came back from one million.

Even the thousands of emails sent back have recorded all the monitored data, and even stolen their numbers.

But it's no use.

Such a number theft rate is too low. Even if it happens, it can't cause any noise.

"What's the matter? Why don't most of our Trojans have news?"

"I don't know. I won't be killed."

"No, I used 360 anti-virus. Only a few of the more than a dozen Trojans I made were detected, and they couldn't detect the rest."

"That's strange. What's going on?"

In order to find out this phenomenon, the mieyu team spent several days and couldn't find the reason.

He's not to blame.

The mieyu group is in the United States, and they can't go to China to investigate information in real time.

They just made a series of Trojans against the Huanyu system and the information given before.

But the world is changing too fast.

Similarly, Internet technology is changing very fast.

You have the most advanced number theft technology.

Others' anti-theft means have improved for generations.

Do you think Huanyu technology only uses technologies such as security card and IP detection to prevent theft?

They also have a more unique, direct one click restore.

yes.

This is a new function from Huanyu Internet cafe system.

As soon as this function is turned off, no matter what you downloaded, everything you operated will be deleted.

Of course, it also includes the Trojan horse in the [mieyu group].

"One click restore, our Trojan horse was deleted by them."

"Our strong Trojan horse was destroyed by their bad technology."

"Hahaha, hahaha, hahaha... I won't play with you anymore."

Suddenly, a member of the mieyu group laughed wildly and rushed out of the office.

"He seems crazy."

"It seems so."

"What about us?"

"I think we'll go crazy if we stay here."

Many people looked at each other and resigned to the person in charge.

They really have no face to stay here.

"You..."

The leader of mieyu group opened his mouth. He wanted to save these elites.

But he knew that no matter what he said, these people would not stay here.

The previous three battles have completely destroyed their self-confidence.

They can't recover without a certain time.

"OK, you take a break. I'll go back and think of other ways with Microsoft."

He knew that these people had tried their best.

But what else can they do if they try their best?

Even if they stay, they can't deal with Huanyu technology.