Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Romance -> God class takeaway brother

Chapter 612 Unscrupulous

Previous page        Return to Catalog        Next page

    ?

    Not long after, several people moved the things Lin Cheng wanted to Gong Chen's office, and Song Ran and Wang Hui followed.

    Seeing Lin Cheng turn on the server, Song Ran wondered: 'Consultant Lin, what is your purpose of checking the server?  '

    Lin Cheng revealed a mysterious smile and said, "You will find out later."

    After finishing speaking, he ignored the few people behind him, directly opened the database, and at the same time opened the firewall program he had previously designed for Polaris Software.

    Seeing Lin Cheng's actions, everyone felt more and more confused.

    But soon they understood the intention of Lin Cheng's move.

    He tapped the keyboard quickly and entered a program code on the screen.

    In an instant, a text file appeared on the computer screen.

    Lin Cheng opened the file, and lines of information immediately appeared on it.

    Song Ran is the director of Polaris Software Company, so he is naturally no stranger to these information codes.

    The moment he saw the contents of this file, Song Ran's face showed a look of shock, and he couldn't help but ask, "Isn't this a web log?"

    Lin Cheng said with a smile: "When I designed this firewall program, I wrote a hidden mechanism by the way. It will monitor and copy the information of the network log from time to time, and save it for this kind of situation. You guys  Didn¡¯t it say that the hacker¡¯s information could not be found before? Now I make his intrusion information invisible.¡±

    Hearing this, Song Ran and the others immediately showed joyful smiles on their faces.

    The reason why hackers are scary is because their whereabouts are secretive.

    But once the traces of hacking are found, unless it is those top hackers, the possibility of being traced will greatly increase.

    Song Ran complained a little: "Consultant Lin, since this firewall has such a mechanism, why didn't you tell us at the beginning? You don't know, since last night, the hair of Mr. Gong and I is going to be gray."

    Lin Cheng shook his head and said, "Of course I can't tell you, otherwise, if you open this file rashly without taking physical isolation measures, wouldn't that hacker notice it? Then the hacker will definitely  This file will be deleted at the same time!"

    Hearing this explanation, Gong Chen and others nodded in understanding.

    In the previous situation, if they really knew that there was such a mechanism, I am afraid they would really do it.

    Lin Cheng asked: "What time was it invaded last night?"

    Song Ran said: "About nine o'clock."

    Lin Cheng hummed, and then began to search for the network log information around nine o'clock last night.

    "found it."

    Not long after, Lin Cheng said with a smile.

    When everyone heard the words, they immediately came together.

    Lin Cheng pointed to a few abnormal log messages on the screen, and said with a smile: "These are the hacking process."

    Gong Chen didn't understand hacking. After seeing the information, he immediately asked, "Consultant Lin, what should we do next?"

    "Of course, to see who this hacker is from? Dare to directly extort 100 million US dollars, this person's appetite is really big enough."

    While speaking, Lin Cheng directly began typing on the keyboard quickly.

    Standing in Gong Chen's position, he can only see lines of program codes being refreshed on the computer screen.

    Seeing these codes on the screen, Gong Chen felt as if he was reading a bible.

    He asked Song Ran beside him curiously: "Old Song, what is Consultant Lin doing?"

    Although Song Ran knows some things about network security, he knows more about software design and network defense. He doesn't know much about intrusion techniques.

    He said a little unconfidently: "Maybe he is tracking the hacker's network address?"

    "possible?"

    When Gong Chen heard Song Ran's answer, he glanced at him suspiciously.

    Seeing this, Song Ran whispered in Gong Chen's ear, "Mr. Gong, our consultant Lin's hacking skills are definitely top-notch in the country. Let alone me, even those professional network security personnel can't handle his operations."  It may not be able to understand, let's just wait quietly for Consultant Lin's result."

    Hearing this, Gong Chen could only nod helplessly.

    Time passed by with the crackling sound of Lin Cheng's typing on the keyboard.

    About five minutes later, a smile suddenly appeared on Lin Cheng's face, showing aSure enough, with such an expression, he muttered to himself: "I wonder who has such courage, it turned out to be him! No wonder he was able to break through my firewall silently."

    Gong Chen has been observing Lin Cheng. After seeing the change in Lin Cheng's face, he immediately said pleasantly: "Consultant Lin, do you know the identity of that hacker?"

    Lin Cheng nodded.

    Hearing this, Song Ran asked in surprise, "Who is that hacker?"

    Lin Cheng looked at the program code on the computer screen calmly, and spit out two words one by one: "Ghost!"

    "What? Ghost hacker?"

    Hearing this name, Song Ran and Wang Hui's expressions changed drastically, and they shouted almost in unison.

    Seeing the changes in the expressions of Song Ran and Wang Hui, Gong Chen felt a little uncomfortable. He hurriedly asked, "Who is this famous hacker? Is it very powerful?"

    When Song Ran heard this, a bitter smile appeared on his face, and he said, "Mr. Gong, I'm afraid we really have to spend money to eliminate disasters this time."

    After finishing speaking, he explained in detail what he knew about the ghost hacker.

    Every time Song Ran mentioned a record of the ghost hacker, Gong Chen's face became more and more gloomy.

    At the end, Gong Chen's complexion was frighteningly dark.

    Wang Hui sighed, and said: "Mr. Gong, if this hacker is really a ghost hacker, then our company may really be killed by others!"

    At this time, Song Ran looked at Lin Cheng and said, "Consultant Lin, how did you confirm that this hacker is a ghost hacker? After all, the ghost hacker has never left the slightest trace in various actions."

    When Lin Cheng heard the words, he smiled lightly and said, "Who told you that the ghost hacking operation has never left traces?"

    Song Ran froze for a moment, and said, "Isn't that what everyone on the Internet says?"

    Lin Cheng showed a disdainful smile, and said: "Even if it is a clever hacker, it will leave traces. At best, the ghost hacker will leave relatively few traces. He has obtained the encoding feature, but it has already been recognized by the world."  The security systems of the major countries have collected it, but these countries do not want to provoke ghost hackers, so there are such rumors. Just now I have reverse-tracked the process of the hacker's intrusion. Through the comparison of the other party's programming characteristics, I have nine  With a certainty of success, you can determine the identity of the other party's ghost hacker."

    After getting Lin Cheng's affirmation, the faces of Gong Chen and others became more and more desperate.  (Remember the site URL: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report