Enter the command room.
Tang Qing has been frowning. He doesn't know how things will develop today.
If the talks collapse, it will mean that I can no longer rely on this arbitrage method to make money. This is my main source of income now, and I will definitely love him if I lose it.
If the talks are very "harmonious" and the other party acquiesces in this kind of transaction in the future, even if there is an upper limit, everyone will be happy.
But.
No matter what the final result is, he has to show his strength to the other side, so that the other side will not dare to have any wrong ideas in the future, otherwise nothing can be discussed.
"Food" is not qualified to talk about conditions. They can't even decide life or death.
"Tang Yi, take this website, the address is..." With a decision, Tang Qing said an address and jump way.
"Yes, commander." Tang Yihui replied, and then turned to upload the task to Xiao Er, and then disassembled and distributed it.
Although Tang Yi knows it, he is not a technician, but a commander. All he needs to do is talk about it. The second child formulates, disassembles and distributes tasks according to the process. Tang Yi is responsible for supervising whether the tasks are reasonable and perfect. Leave the rest to the intelligence analysts. Otherwise, he will have to die alone.
In the past, special anonymous browsers were used to surf the Internet outside, but they were not needed from the command room. No one could find the address. Even if they were put outside, it was not easy to trace their address with the strength of these analysts who were proficient in binary computers.
After receiving the task.
Dozens of intelligence analysts immediately turned into computer experts and united to invade the website. It's very tall, but in fact it's very simple. It's nothing more than using various web vulnerabilities to obtain permissions.
In order to make it easier to have "friendly" access to the outside world's Internet in the future, some analysts have studied Microsoft's system and major development languages, constantly testing and exploring new useful vulnerabilities.
Otherwise, how to "share" the information of several national police departments and various agencies before? So far, they have found hundreds of loopholes.
And these loopholes come in handy. But because it's not sure which vulnerabilities will be useful, an analyst tests several.
Due to the fact that they are well prepared at ordinary times, and the "innate" talent of these people for this kind of information processing.
But in three minutes, analysts get the administrator rights of the website server, and then... More large-scale invasion began, not only the network server, but also the computers and various communication devices over there, such as routers, switches and other networking devices.
After control, it is to extract all the information that can be found.
。。。。。。
Africa.
That huge basement.
A crowd of people.
The person in charge of the organization and the supervisor are watching Jack, waiting for his good news.
They knew that Tang Qing's trading time was concentrated on this point, so when the first transfer order of 60 million euros was issued, the bank intercepted the money.
They are waiting for the anxious Tang Qing to contact them, and then track down Tang Qing's position to see if they can confirm each other's information. In Jack's opinion, this kind of thing is very simple.
They also considered that if Tang Qing didn't want to "run away" with the 60 million euro, it was not impossible. After all, it was not too strange to transfer the huge amount of nearly 20 billion US dollars in such a short period of time.
Of course, they still have a fluke mentality. They bet that Tang Qing cares about this money and will contact them. If they really don't care, they won't have any loss and can get so much money in vain.
They are not afraid that anyone will dare to trouble them. Behind them are the shadows of the major banks. It is not too much to say that they are doing dirty work for them. With the escort of these people, the US government may not be able to move them.
But we have to live with our face. You can't always wander under people's eyes, or they won't come to such a place.
Just as they were happily waiting for the fish to take the bait.
Jack, who has been staring at the computer screen, suddenly sits up straight and yells, "Oh, my God."
His face was full of shock, as if he had seen a ghost.
"What's the matter with Jack? Have you found his place?" The director came forward and said happily.
"Boss, we're done." Jack said with a wry smile. At the same time, he put away his hands on the keyboard and leaned back on the chair a little feebly.
"What do you mean, which bank is it?" The director said curiously that Jack could not understand the six screens he had just installed.
He thought that he had traced the bank account, but he was not afraid of it. He apologized for the misunderstanding. At the same time, he secretly scolded the messenger for meddling.
But Jack's next words made him fall into the ice. "Boss, I mean, our servers here have been captured." Jack said grimly."What? It's impossible to be captured. We have all kinds of security software installed here. How can we be captured? It's only a few minutes. Even if the world's first hacker team comes, it's useless? The alarm didn't go off The supervisor doesn't know the channel.
This news is terrifying. He doesn't believe it at all. Over the years, they have encountered numerous network attacks, but no one can get in. They have spent a lot of money to hire many companies, experts and even hacker teams to improve their defense system. It's much more powerful than those firewalls on the market.
"Boss, that's right. I've written a small software to put it in the server and computer code. It's useless. The main thing is to count the number and status of users with various permissions. Now all servers, routers, switches and computers here have added a super user. Remember that it's new. There must only be one super user for those devices, he said It's hard to force another one. It's.. It's not scientific at all, "Jack explained slowly. Although he didn't want to believe it, this completely illogical thing happened.
When the supervisor heard the news, he quickly said, "it's called to cut off the network."
Jack shook his head with a wry smile and said, "it's useless. It's too late. With the network speed here, all the customer information in the database will be copied in one minute, and it's useless even if it's broken."
"What about that?" The director also has no way, one minute, runs to that protection tight machine room all more than one minute.
Jack spread his hand and said helplessly: "let's inform the above about this situation. We can't handle it. Now I don't think I have the authority to do anything useful. Look, all our super user accounts have been deleted. Other low-level accounts are all gone. Boss, we may have offended the wrong people. "
PS: I'm not used to mobile phone code, thinking and logic. If I feel bad, please forgive me.