This is how the hacker intercepts Tang luoye's e-mail, intercepts the instructions he sent to the future city, modifies them and resends them. In this way, the employees in the future city receive the wrong instructions and embed new modified and adjusted software programs according to the wrong instructions.
However, the supervision e-mails and technology effect videos sent by the Engineering Department of futuretown to Tang's shareholders every day are also intercepted and modified. Otherwise, according to their real reports, they will definitely report the differences in the subtle effects caused by the software adjustments. After the hackers modify all the emails, they can see the embedded software, The future city as like as two peas in the previous tests.
If it wasn't for the personal email that Pang Tong suddenly arrived today, I'm afraid they are still in the dark and don't know when.
Tang luoye called the PRB senior management in the past, heard the other party's praise of them, and praised the perfect solution of software dead corners and defects. Tang luoye was shocked to find that his group's network must have been intruded.
If this method does not trigger the internal security alarm, in addition to the cooperation of insiders, it also needs the other party's intruding IT skills.
When Tang's scientists and technicians counterattacked the network, a programmer once said, "the other party is definitely not just a simple hacker. We should be faced with a group of high-tech technology teams. This kind of commercial espionage invasion must have very strong IT technicians as the backing. I'm afraid their team's strength is comparable to ours."
At the moment, when the repairman says that the IP address is Su Xu's computer, the office is quiet as if there is nothing, and all kinds of knocking sound just now are gone.
Tang Luo held his shoulder in his arms. He said nothing and didn't look at Su Xu.
Su Xu frowned and said in a low voice, "I don't know what's wrong with my computer, but it's been black three times. I asked someone to repair it today, but I didn't find out the virus. If it's the intrusion code that is intercepted by the control that spreads out on my computer, I apologize, but don't look at me in this way. I'm not an insider. "
The program supervisor also opened his mouth and said, "it is the software of the future city that was first discovered by Director Su, and there is the possibility of modification. Let's quickly follow this IP address and find out the IT team of commercial spies who use Director Su's computer as the media. "
People are typing the keyboard again, and several developed technologies flow to Su Xu's office to check the traces left by the invasion from her computer.
I have been busy for a long time. This time, I spent a lot of time. Although I understand how the intruder modifies the intercepted email, but The result is still not very good, they can't find out how to invade.
The programmer said: "they use different IP addresses every time they invade. They can find out these places, but it is estimated that it is difficult to find the people behind the scenes. And this morning, they seem to realize that they have been discovered. Before we counter attack, they have collectively withdrawn from the company's network, and have eliminated a lot of important traces. Director Su asked someone to repair the computer, and completely destroyed these traces of invasion. The last time they removed the IP address could not be found. "
Finish saying, the programmer intentionally or unintentionally looked at Su Xu, let her very uncomfortable.
After a moment's silence, the general manager of the software department said, "the intruders modify the instructions because they have intercepted e-mails as manuscripts. They send out new software to embed in the future city. It is bound to need our original software programs, otherwise they will take what to modify and adjust. We have always been strict with the confidentiality of software programs. Apart from the four major shareholders of the company, I am the only one who has a complete set of programs. How did it leak out? "
A technician who had gone to Su Xu's office to detect her computer had hesitated and said, "we have just checked out the software program leaked from her on Director Su's computer, and there are traces."
Tang Luo's face became more and more obscure.
Su Xu became the target of public criticism. She didn't know what was going on. She learned from Pang Tong several hours ago that the software effect was different.
The software programs that we have been developing for more than half a year have been leaked out by her. Many people are not satisfied with it. At this time, a researcher in the corner suddenly said: "just now, Director Su said that it was after receiving a private letter from the construction workers of the future city that we realized that the software embedded in the future city is the best The final decision is not quite the same. The intrusion team can intercept the email from PRB executives to the chairman. How can they not intercept the personal e-mail from central Europe? The catch is too big. "
"And computer maintenance. It's really a coincidence that when the intrusion team quits the group network, the black screen of your computer is broken. It's so clever. By means of maintenance, many traces of invasion and final exit are gone."
Su Xu frowned. There are only two meanings in this person's words.
First, either the intrusion team deliberately made it, so that Su Xu received Pang Tong's email, so that they found the network was hacked today.
Second, it's su Xu's play by borrowing Pang Tong's e-mail. Anyway, the software has been embedded, so there is no need to invade the network. It's better to come to a scene where the thief shouts to catch the thief. It can also remove the suspicion by the way. It can also excuse that her computer is infected with a virus. Even if the invasion trace is destroyed, it is also the responsibility of the person repairing her computer.…… She can receive Pang Tong's e-mail, his content mentioned software program such key words, unexpectedly was not intercepted, really strange.
Su Xu remembered that when she was reading Pang Tong's email, the screen flashed. According to their statement, the intruder had the ability to intercept Pang Tong's email to her.
But why not?
Why did she see it?
"Director Su, do you really don't know what's going on here, or do you know who stole the software program in your hands?" Asked the program supervisor.
At this point, almost people feel that Su Xu has something to do with it.
There was a murmur in the office, and the atmosphere was chaotic.
Su Xu turned her head and looked at Tang Luo ye and said, "do you think I'm the ghost?"
He didn't look at her. He was calm and angry in his eyes. He said to the general manager of the software department: "call my colleagues who work in the future city and ask him to send a complete set of embedded software programs."
Then there was an IT elite in the R & D department on the spot and said, "you, be careful, don't receive software that has been blocked and modified by others. After receiving the revised software, we will analyze it one by one. What kind of consequences will the modified software program bring to our construction? Is it good or bad. We have been working hard for half a year for this software. We can't just give up all our efforts. "
"Responsible for network security, rebuild a corporate intranet as quickly as possible."
Then he said to another senior executive of the software: "go and call Bai Mo, don't use the company's phone, and ask him to bring the team here quickly."
Tang Luo night sound calm, one by one to order the next work, the thorny sudden changes, split up to solve one by one.
"The rest of you, keep tracking the intruder."
"And more." Tang Luo night lowered his voice and said, "this matter must not be known to PRB people."
PRB only thinks that the software embedded today is the adjustment after they have improved it. However, it is not easy to modify the software. The program jointly developed by pRB and Bai's company has dead corners and defects. However, it is a technology field that cannot be achieved by current technology. Although there are other alternatives, they are temporary and can only be seen for a while Perfect effect, a long time, the whole software program will appear a variety of other problems.
That's why they don't use other methods to replace the dead ends in these software.
"Su Xu, it's not convenient for you to participate in the work of the next 19 floors." Tang luoye finally turned to her and said, "you go out."
She looked at his eyes carefully. Although she was angry and dark, she didn't feel suspicious and distrustful. It seemed that Tang luoye didn't think she was an internal ghost. Su Xu really felt that she couldn't stay on the 19th floor. After all, what software engineers do now belongs to the category of high-level secrets.
Su Xu nodded: "OK, I understand." As soon as she was about to leave, she suddenly felt that there was a question that needed to be asked. She said to the program supervisor, "when did my computer become a channel for intruders? When was my stored software program stolen? " She needs to know when her computer went wrong.
Program supervisor looks at Tang luoye.
Tang Luo night nodded the first, the supervisor then replied to her: "the day of invasion, the whole set of software program was stolen. It was on the third of last month. "
Su Xu left the 19th floor when she heard the answer. She recalled in her mind what day of the week was on the third of last month, and what she had done with her computer She remembered that day was the day when her computer first appeared black screen.
And she is to send Lin Zixia the planning case, after receiving Lin Zixia's reply email, she just a little bit, suddenly the computer black screen.
Yes, it happened on that day.
She remembered Li Lin's exhortation to her that day, so that Su Xu could stay away from Linzi in summer. She felt that linzixia's mind was very heavy.
Indeed, linzixia asked her for the software program half jokingly.
Su Xu is flustered and chilly. She thinks it's weird. She only looks at the relationship between the invasion and linzixia, but Su Xu is still unstable. She calls linzixia and turns off the phone. Su Xu was angry and called Lin's department again. After three rings, Su Xu said, "I'm looking for Lin Zixia, your general manager."
A soft female voice came from the mobile phone: "is it Miss Su?"
Su Xu frowned, the other side asked again, Su Xu just said: "yes."
"Hello, I am the Secretary of the general manager. He is not in the company. Before leaving today, he gave me a key and told me that if Miss Su calls, he will ask you to come and take the key."