Rebirth of Cyber ​​Hegemony

Vol 3 Chapter 976: :Which anti-theft technology is strong?

"this?"

"Can it be like this?"

"Secret security card, check the IP address, what else?"

The faces of the elites in the Mieyu team were ashamed.

Two shots, both times they lost miserably.

Moreover, their disastrous defeats have been worsening every time.

Those who don't know think that those hackers don't know much about Huanyu system for the time being.

But the truth is, it's not that they don't understand Huanyu system, but Huanyu Technology knows itself too much.

They really know themselves too well.

Where do you have problems, where do you easily get attacked, and what do you fail to do well?

As a result, dynamic secret protection has appeared.

As a result, IP address detection appeared.

You know, these are all tactics that a series of websites and Internet companies have never seen before.

Faced with such a novel move, all of a sudden, they had no choice.

This is like cracking the password, everyone has been cracking all kinds of passwords.

This password can have numbers, letters, and even a series of symbols.

But no matter how difficult it is, they can still think of a way.

But at this time, the password appeared fingerprints.

Strictly speaking, fingerprints can also be broken.

But from passwords to fingerprints, this is a qualitative improvement.

Even if they learned a lot of cryptography before, it didn't work.

As it is now.

Even if they have more Trojan horses, no matter how powerful they are, or encounter the anti-theft system of Huanyu Technology, what can they do?

Needless to say the secret security card.

They don't know what to do with just an IP address detection.

At the same time, they don't know why, but they can't help but admire Huanyu Technology.

How can other Internet companies think of so many anti-theft strategies?

But Huanyu Technology, their ideas go beyond countless Internet companies.

It can be said that the anti-theft measures taken by Huanyu Technology this time can definitely greatly improve the security of the Internet.

At least, these two anti-theft strategies, in the future, more than 95% of the guys who hacked will have to take a break.

As for the reason.

What else can there be?

It is completely technically inadequate, and it is impossible to steal it.

Not to mention them, now they are all forced to do so and don't know what to do.

"Everyone, cheer up."

"Are we just giving up like this?"

"Aren't the elites in so many industries as good as Huanyu Technology?"

[Mieyu Group] The person in charge gathered a group of industry elites and held a meeting.

He knows that if everyone's morale is not agitated, the confidence of these people will be destroyed.

"Isn't it just the addition of the IP detection function? Isn't it just the addition of a secret security card, can't we break it?"

"Although IP detection seems to make him invulnerable, it may not be. If we log in with the stolen IP address, wouldn't it be cracked? Of course, this may take some effort, but it is not impossible."

"As for the problem of secret security card, it is not impossible to solve it. I have two secret security cards launched by Huanyu Technology. Let me talk about the simpler first. The simpler one is the secret security provided by the top-up card. This secret security has a correspondence. Each corresponding coordinate is a secret security. But the corresponding coordinates on a card are limited. In other words, we only need to record several times. Of course, it will take a certain amount of time, which may take several days. It may be dozens of days, but through these methods, we can also break their coordinates."

"What’s more complicated is the dynamic secret guarantee they launched, which is the one in my hand. This secret guarantee will randomly generate a row of numbers every 15 seconds, but in fact this is the same as the secret guarantee card with coordinates. This random Generation is not a generation without any rules. When generating this series of numbers, he also has a survival formula. If we record these numbers more, then we can also deduce their formulas."

It has to be said that the strength of a series of top system security elites around the world is still terrifying.

Although Huanyu Technology's series of anti-theft methods have completely exceeded their accidents, they are not without solutions.

At the same time, many of these system security experts are top mathematics experts.

As long as they can record a series of numbers, they must be able to figure out the formula behind them.

"Everyone, how are you now?"

"I have some ideas."

"Very good, then cheer up, we don't want to be compared by Huanyu Technology."

"certainly."

The members of the Mieyu group grabbed their fists.

At this time, they are full of fighting spirit.

This is no better than before.

Before they joined the Mieyu group was actually reluctant. They felt that they had some overkill.

At the same time they also feel disgusting to do this kind of thing.

They are the elites of global system security. What they have been doing in the past is to maintain system security, but now they have started to make Trojan horses, viruses, and other unethical activities.

Only threatened by Microsoft, they also had to do so.

But after going through the competition, they found that Huanyu Technology may not be the one they want to win.

This also aroused their eagerness to win.

Even if they are not fighting for Microsoft at this time, they have to fight for their own reputation.

If even Huanyu Technology can't win, how will they protect the security of the global system in the future?

If even Huanyu Technology can't break it, what face do they have in this circle?

"Brothers, let's discuss what to do next."

"I think we should increase the monitoring function of Trojan horses, otherwise, without long-term monitoring, we can't break their anti-theft at all."

"Yes, but this may increase our risk, we have to be careful."

"Relax, we have always been very careful."

Fighting for face, the elites of the Mieyu team once again worked hard.

They came up with dozens of new types of Trojan horses.

This kind of Trojan horse is a further upgrade of all previous Trojan horses, whether it is hiding or monitoring functions.

At the same time, they also carried out a more powerful strategy against the new anti-theft strategy developed by Huanyu Technology.

"Damn, I finally finished it."

"I'm exhausted. I changed it for seven days and seven nights. This is the strongest Trojan I have ever made."

"This is also my strongest Trojan."

"Everyone will act together and we will not stop if we don't destroy Huanyu Technology."

After a series of efforts by everyone, the Mieyu team posted the strongest Trojan they produced to movie websites of all sizes.

Once users of the Huanyu system are caught, their computers will have no secrets at all.

"How, how is the effect?"

"It's not bad. Those people are really good. They go to download small movies every day and never learn a lesson. Our Trojans were successfully implanted in their computers."

"But it seems that the download volume of the Huanyu system has increased."

"Well, indeed, this also proves that the number of users of the Huanyu system is increasing on the other hand. I received a message from Microsoft. It is estimated that Microsoft is also in a hurry, and they urged us again."

"I believe that this time we will definitely be able to change Huanyu Technology."

Everyone has confidence in the Trojan horses they made.

What we have to do now is to wait by the email and expect these Trojans to send back the monitored data emails.

After waiting for several days, strange things happened again.

In the past few days, the Trojan horses run by some of the top system security experts have only sent back a few hundreds of thousands of emails.

But if they calculate from the infected computer, they calculated it, and they have infected at least 1 million in the past few days.

Only a few thousand emails were sent back out of 1 million units.

Even these thousands of emails sent back have recorded all the monitored data, and even stolen their numbers.

But what good is it.

The rate of such hacking is too low, even if it happens, it will not cause any noise.

"What's the matter, why is there no news for most of our Trojans?"

"I don't know, it won't be killed by the investigation."

"No, I used 360 antivirus. Only a few of the dozen or so Trojans I made were detected, and none of the rest were detected."

"That's weird, what's the matter?"

In order to find out this phenomenon, the Mieyu team spent several days, but couldn't find the reason.

This can't blame him.

The Mieyu team is in the United States, and they cannot go to China to investigate information in real time.

They just made a series of Trojan horses against the Huanyu system and the information given before.

But the world is changing too fast.

Similarly, Internet technology is changing very quickly.

You have the most advanced hacking technology.

Others' anti-theft methods have improved for several generations.

Do you think that Huanyu Technology only uses security cards and IP detection technologies to prevent theft?

They also have an even better one, which can be restored directly with one click.

Yes.

This is a function from the latest launch of Huanyu Internet Cafe System.

As long as this function is turned off, no matter what was downloaded before, everything you operated will be deleted.

Here, naturally, it also includes the Trojan horses in the [Mieyu Group].

"One-click restore, our Trojan was deleted by them with one click."

"Our such a strong Trojan was actually destroyed by their so bad technology."

"Hahaha, hahaha, hahaha... I won't play with you anymore."

Suddenly, a member of Mieyu's team laughed wildly, and then rushed out of the office.

"He seems to be crazy."

"It looks like it is."

"What about us?"

"I think we will be crazy if we continue to stay here."

Many people looked at each other ~www.wuxiaspot.com~ and proposed their resignation to the person in charge.

They really have no face to stay here anymore.

"you……"

The head of the Mieyu team opened his mouth, he wanted to save these elites.

However, he knew that no matter what he said, these people would not stay here anymore.

The previous three battles completely destroyed their self-confidence.

They cannot recover without a certain amount of time.

"Okay, you can rest for a while, I will go back and think of other ways with Microsoft."

He knew that these people had tried their best.

But what else can they do if they try their best?

Even if they were to stay, they would not be able to deal with Huanyu Technology.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like