Ressurring Network Controversy

Chapter 976, the anti-theft technology

"This?"

"Can you still do?"

"Secure card, test IP address, is there?"

The destroy group is a group of elbow, such as dead gray.

Two shots, they all fought twice.

Moreover, their fiasco is more than once.

I don't know, those hackers have nothing to know more about the Huanyu system.

It can be true but not they don't understand the Huanyu system, but Huanyu Technology I know it too much.

They really understand themselves.

Where you will have problems, where you are easy to attack, what are you doing?

Thus, a dynamic security is present.

Thus, IP address detection appears.

You know, this is the trick that the previous website Internet company has never seen.

In the face of this novel move, just let them have any way.

This is like cracking passwords, before everyone has been constantly cracking from all kinds of passwords.

This password can have a number or there may be letters, and even a series of symbols can even be added.

I can think of a way.

But this time, this password has a fingerprint.

Strictly speaking, the fingerprint can also be broken.

But from passwords to fingerprint, this is the quality improvement.

I am afraid that they have learned more knowledge of more than passwords.

As now.

Even if they have more Trojans, ever-boolery technology, and encounter the anti-theft system of Huanyu technology, what can they do?

Don't say that the secret card is not said.

Light is an IP address detection, they don't know what to do.

At the same time, I don't know why, they are unable to admire Huanyu Technology.

Other Internet companies can think of so many anti-theft strategies.

Accessible technology, their ideas beyond countless Internet companies.

It can be said that Huanyu Technology's anti-theft initiative is absolutely increased significantly to the Internet.

At least, these two anti-theft strategies, more than 95% of the guys after the future, they all have to hook.

As for the reason.

What else can you?

It is not enough technology, it is impossible to pose.

Don't say them, now they have some obliges, I don't know what to do.

"Dear, cheeper."

"Do we give up this?"

"Do we have some elite in so many industries, is not as good as Huanyu Technology?"

[Dianyu Group] The person in charge will convene all the industry elite and open a meeting.

He knows that no more morale, this person's confidence will be detached.

"Isn't it the function of adding IP detection? Isn't it an increase in secret card? Isn't we crack?"

"IP detection This although it seems to make him impeccable, but not necessarily. If we use the stolen IP address to log in, don't you crack? Of course, this may have some effort, but it is not there."

"As for the issue of secret security card, I don't want to solve it. I have two secret cards launched by Huanyu technology. Let's talk about it simple. Simple some is the secret security of the recharge card, this security has corresponding The coordinates, each corresponding coordinates are a secret. However, the coordinates above a card is limited, that is, we have to record a few times, of course, this also takes a certain time, may take a few days. Or do tens of days, but through these some ways, we can also break their coordinates. "

"More complicated is the dynamic security of them, which is this in my hand. This secret will randomly generate a row of numbers every 15 seconds, but in fact, this is the same as the secret security card with coordinates, this random Generation is not generated by any rules. When you build this series, he has a living formula. If we record these numbers, then we can also push their formula. "

Have to say, the strength of the world's top system security elite is still very horrible.

Although a series of anti-theft means of Huanyu Technology is completely exceeded, it is not a way to have no crack.

At the same time, some system security experts have a lot of top mathematics experts.

As long as you can record a series of numbers, they will inevitably calculate the formulas behind.

"Everyone, how is it now?"

"There are some ideas."

"Very good, then I will start my spirit, we don't have to be compared by Huanyu Technology."

"of course."

The union team members caught the fist.

At this point, they are full of fighting.

This is not more than before.

They haven't been willing to join the pauses before, they feel that they have some small use.

At the same time, they also feel that this is very disgusting.

They are elites of global system security. I have always done the maintenance of system security, but now I have made Trojans, there is some no morality of the virus.

Just threatened by Microsoft, they have to do this.

But one turned, they found that Huanyu technology is not necessarily what they want to take.

This also aroused their good heart.

Even if you don't fight for Microsoft, they have to fight for their reputation.

If you can't even get along Huanyu technology, how do they protect the security of the global system.

If the Huanyu technology can't break, what else do they have face in this circle?

"Brothers, we discuss it, how to do next steps."

"I think we should increase the monitoring function of Trojans, otherwise, there is no long-term monitoring, we can't break their anti-theft."

"Yes, however, this will probably increase our risk, we have to be careful."

"Reassured, we have never been very careful."

For the face of the face, the union of the group is once again angry.

They have made dozens of new Types.

This kind of Troja is hidden and monitored, all of which are further upgraded in all Trojans.

At the same time, they also have a more powerful strategy for the new anti-theft strategy engaged in Huanyu Technology.

"Mom, I finally did it."

"I am exhausted, changed for seven days and seven nights, this is the strongest Trojan I made."

"This is also my strongest Trojan."

"Everyone acts together, not destroying the Huanyu Technology, we have vowed."

After a series of efforts, the destroying group hung up the strongest Trojans they produced to the majority of movie websites.

One, there is a horn system user, then their computer will not be possible.

"How, what is the effect?"

"It's very good, those people are really colored, go to download small movies every day, never learn lessons, our Trojans are smoothly implanted to their computers."

"But it seems that the download volume of the Huanyu system is increased."

"Well, it is indeed, this also proves that the user's number of users in the Huanyu system is increasing. I have received the news on Microsoft, it is estimated that Microsoft is also anxious, they have reminded us once."

"I believe that this time we must do the Huanyu Technology."

Everyone is very confident for the Trojans you make.

What to do now, that is, wait for the email, I look forward to this Trojan to send back the monitoring data email.

Just waiting for a few days, the strange thing happened again.

Among these days, the Trojan of these top system security experts actually sent a sporadic hundreds of thousands of mail.

If they are calculated from the infected computer, they have to infect 1 million units in the past few days.

There are only a few thousand mails in 1,000 units.

Even thousands of messages that have been sent back have recorded all the data from the monitors, even giving their numbers.

But this is useful.

Such a hacking rate is too low, even if it happens, it can't cause anything.

"What is going on, how do we have any news?"

"I don't know, it will not be killed."

"No, I used a 360 anti-virus. I only have a few Trojans who have come out, only a few Trojans were detected, and the rest did not detect."

"That's strange, what is this going?"

In order to find this phenomenon, the destroyed team spent a few days and did not find any reason.

This can't blame him.

The destroying group is in the United States, they can't travel to China in real time.

They are just a series of Trojans to the Huanyu system and the information previously given.

But this world change is too fast.

Similarly, Internet technologies are also very fast.

You have the most advanced hacking technology.

Others' anti-theft means are progressing a few generations.

Do you think that Huanyu Technology is just a secret security card, IP detection such a technical anti-theft?

They still have a more absolute, directly restore.

Yes.

This is a feature from the latest promotion of the Huanyu Internet Bar System.

This feature As long as one shutdown, no matter what the download is downloaded, everything is all, all will be deleted.

In this case, there is naturally included Trojans in the [Die ".

"One-click restore, our Trojans are actually deleted by them."

"We are so strong that the Trojans are given by them so bad."

"Hahaha, hahaha, hahaha ... Laozi doesn't play with you."

Suddenly, there was a member of a member of a member of a member, followed by the office.

"He seems to be crazy."

"It looks like."

"What about us?"

"I think, continue to stay here, we will be crazy."

Many people looked at each other and resigned to the person in charge.

They really have no face to continue.

"you guys……"

The person in charge of the destroying group opened his mouth, and he wanted to save this elite.

However, he knows, no matter what he said, some people will continue to stay here.

The previous three battles can be described as completely destroying their self-confidence.

Without a certain time, they can't recover.

"Yes, you have a rest for a while, I will look back with Microsoft think about other ways."

He knows that some people have tried their best.

But do your best, what can they do?

Even if they stay, they can't deal with Huanyu Technology.