Reborn Super Bank System

Chapter 223 People That Shouldn't Be Provoked (Subscribe!)

Enter the command room.

Tang Qing kept frowning, he didn't know how things would develop today.

If the talk collapses, it will mean that I can no longer rely on this arbitrage method to make money in the future. This is my main source of income now, and it will definitely hurt him to lose it.

If the talk is very'harmonious' and the other party acquiesces to his kind of transaction in the future, even if there is a limit on the quota, everyone is happy.

but.

No matter what the final result is, he must show his strength to the other party, so that the other party will not dare to have any crooked minds in the future, otherwise nothing can be reached.

'Food' is not qualified to negotiate terms, they can't even decide on life or death.

"Tang Yi, take this website, the address is..." Tang Qing said an address and a redirect method after he had decided.

"Yes, commander-in-chief." Tang Yi replied, turning around and uploading the task to Xiao Er, then dismantling and distributing it.

Although Tang Yi also understands, he is not a technician, but a commander. This kind of thing only needs to move his lips. Xiao Er formulates and disassembles and distributes tasks according to the process. Tang Yi is responsible for supervising whether the tasks are reasonable and complete.Leave the rest to the intelligence analysts.Otherwise, he won't be busy alone.

In the past, special anonymous browsers were used to surf the Internet outside, but they are not needed from the command room. Not to mention that no one can find the address, even if it is released to the outside world, relying on the strength of these analysts who are proficient in binary computers, It is not easy to track down their addresses.

After receiving the task.

Dozens of intelligence analysts immediately turned into computer masters and joined forces to invade the website. It is very high, but it is actually very simple. It is nothing more than using various loopholes in the web to obtain permissions.

In order to make it easier to have "friendly" access to the outside world in the future, some analysts have studied Microsoft's systems and major development languages ​​early on, constantly testing and discovering new useful vulnerabilities.

Otherwise, how did you "share" the data and information of several national police stations and various agencies?The vulnerabilities they have found so far are as diverse as hundreds.

And these vulnerabilities come in handy right now.However, because it is not certain which vulnerabilities can come in handy, an analyst tests several.

Because they are usually too well prepared, plus these people's natural talent for processing this kind of information.

In just three minutes, analysts got the administrator rights of the website server, and then...A larger-scale invasion has begun, not just the network server, but also the computers and various communication devices over there, such as routers and switches, and all networked devices.

After the control, all the information that can be found is extracted.

......

Africa.

That huge basement.

A bunch of people huddled together.

The person in charge of the organization and the supervisor watched by Jack, waiting for his good news.

They knew that Tang Qing's transaction time was concentrated at this point, so when the first transfer order of 60 million euros was issued, the bank blocked the money.

They were waiting for Tang Qing, who was anxious, to contact them, and then tracked Tang Qing's location to see if they could confirm the other party's information. In Jack's view, this kind of thing was very simple.

They also considered that if Tang Qing didn’t want the 60 million euros to “run off”, this situation is not impossible. After all, a huge amount of nearly 20 billion US dollars would be transferred in such a short period of time. It's not too strange just to be drenched.

Of course, they still have a fluke mentality, betting that Tang Qing cares about this little money and will contact them. If they really don't care, they will have nothing to lose, and they can get so much money in vain.

They are not afraid that someone will dare to trouble them. Behind them are the shadows of major banks. It is not an exaggeration to say that they are doing dirty work for them. With the escort of this group of people, the US government may not be able to move them. .

But everyone still has to live a good life, you can't always dangle under people's eyelids, otherwise they won't come to such a place.

Just when a group of people happily waited for the fish to take the bait.

Jack, who had been staring at the computer screen, suddenly sat upright and yelled: "OH, MYGOD."

His face was full of surprise, as if he had seen a ghost.

"What's the matter with Jack, have you found the position of the other party?" The supervisor said happily.

"Boss, we're done." Jack said with a wry smile.At the same time, he put his hands on the keyboard away and leaned weakly on the chair.

"What do you mean, which bank is the other party?" The supervisor said curiously, anyway, he couldn't understand the things on the six newly installed screens in front of Jack.

He thought he had tracked down which bank account, but he was not afraid. He would apologize if he misunderstood. At the same time, he secretly scolded the messenger for nosy.

But Jack's next sentence made him suddenly fall into an ice cellar."Boss, I mean, our server here was compromised." Jack said with an ugly face.

"What? It's compromised. How can it be possible? We have installed various security software here. How can it be compromised. It only takes a few minutes. Even if the world's number one hacker team comes, it will be useless? The alarm did not sound. "The supervisor does not communicate.

This news was too terrifying. He didn’t believe it. After so many years, they have encountered countless cyber attacks, but no one can enter. They have spent a lot of money to hire a lot of companies, experts and even hacker teams to improve their Defense system.It is much stronger than those firewalls on the market.

"Boss, yes, I wrote a humble little software and put it in the code of the server and computer. It is useless, mainly to count the number and status of users with various permissions. Now all servers, routers and switches here, Computers have already added a super user, remember to add, there must be only one super user for those devices, and he can forcibly add another one. This is... not scientific at all," Jack slowly explained.Although he didn't want to believe it, this completely illogical thing happened.

When the supervisor heard that the matter was overwhelming, he hurriedly said: "That will tell people to cut off the network quickly."

Jack shook his head with a wry smile and said, "It's useless, it's too late. With the speed of the Internet, all customer data in the database will be copied in just one minute, and it's useless if it's broken."

"What do you do then." The supervisor was gone, and in one minute, he ran to the well-protected computer room for more than one minute.

Jack spread out his hand and said helplessly: "Let’s inform the above, we can’t handle it. Now I guess I don’t have the authority to do useful operations. Look, our super user accounts have all been deleted. Other low-level permissions. All the accounts are gone, boss, we may have provoked people who shouldn’t be provoked.”

ps: Mobile phone code, thinking and logic are particularly unaccustomed, if you feel bad, please forgive me.