Save Fland's computer and Su Ye can do it at any time.

But how can I control the message in the post?

If you can't delete Fland's post, so fast William will also find that Fland is locked by himself.

He has already seen in the post.

Just now Flandy invites William to deal with the official website of Qingyun Technology.

As for the third step, then there is no relationship at all.

The most tangled is the second part.

Although Su Ye said enough, how to attack a website and never tried it.

If you think about it, you should get an administrator, and then attack ....

At that time, there is a post-deletion of administrative privileges, and completely delete this post should not be a problem.

Even, you can directly log in to Flanders' account.

Delete all the messages just now.

After thinking about your mind, Su Ye started action.

This time, he is still intended to borrow the name of Hanhuang Chen Yi.

Lock the Fland's computer, a dazzling crown appeared in Fland's computer.

There is also a message from Sui Ye:

[Make me Dragon Hantian, although far away]

"WTF, what is this special."

"Who gave my computer to get out of a broken crown."

"Also, what is the meaning of this dragon Chinese."

Fland can only fuse.

And this time, after the computer who locked Fland, I logged in to his account, involving all the posts to Dragon Han, Qingyun Technology and other words all deleted.

After completing these work, Su Ye Ling light flashed.

He also changed the password of the forum.

Come.

This thing looks difficult, but Su Ye has a very easy feeling.

If the hacker encountered later, you can solve it.

The next step is to trace William's drops.

However, because William did not attack himself and Qingyun Technology website, this time Su Ye cooked at the other party's operational record.

The words from the home of livestock have also needed the administrator privilege of Sui Yili to obtain the website.

Although it will never be lucky, this livestock home is a true forum that provides farming knowledge and intersection with industry.

It is very likely to be the mysterious organization's task release platform.

If you want to attack such a guardian, Su Ye, you can't think that you can do it soon.

I will even hit the snake.

It seems that now I can only rely on my own manual way to trace the William's trace.

Su Ye turns off several software, leaving only a firewall attacked.

This is to avoid running the computers of our computer CU when they are running those software.

At this time, Su Ye was invincible, when he opened a company, he chose to buy a computer with 80,000 yuan.

Sure enough, there will be rewards in this world, if you don't see any rewards now.

It is not old days to stay in a matter.

May be just because you need more effort, or more patience.

Tiandao rewards.

In the future, we must continue to adhere to the policy of treating the friendly friendly employee.

Didn't see that Li Ming realized that he was taken by people, let's talk about himself.

Although this is just a person's reaction, it represents the mentality of most employees of Qingyun Technology.

Every day, work, let your own can get it, and it is also worthy of salary and bonuses sent by Sui.

Now in Qingyun Technology, the most ordinary employee, a month's income can reach more than 6,000 yuan.

This is only more than 2,000 Jiangcheng in average salary, absolutely calculating a clear current in the business borders.

As for the person who leaked company information, Su Ye is still waiting.

Perhaps the other party is a key evidence that Zhou Zihang uses Li Ming to carry out business secret secrets.

Yes, Su Ye is like this.

Always take a kind heart to see this world.

Just, treat those who are not worth it, Su Ye is absolutely will not be polite.

For example, Fland, Ivanov and the William, who are about to find.

Speaking of William's name, Su Ye thought of a song that I have heard called William Castle.

If he has not remembered, this song is a typical English style song.

So, this Willia is a British?

Su Ye is gone, decided to zoom out.

After all, most of the world's hackers are more famous in the country, and they are looking for themselves.

It is better to gamble.

The range is now reduced to a country.

As the old capitalist strong country, England is hidden in the folk, which is completely possible.

If you want to understand this, Su Yili will directly transfer to England Telecommunications Department (nor do you know that there is wood).

He now knows the conclusion, the other party is William, just landed on the website of the livestock home.

If you can find the network signal record of the other party in the process, then the reverse lookup can basically determine who is William.

England time is more than 8 hours later than Dragon Han.

It should now be in the afternoon.

As we all know, the work of people around England is not as forces like the people here.

They need leisure, need and afternoon tea.

This kind of living habits are things in their bones, just like Dragon Han people's hardworking.

I just gave Williams to Wili, there was no response to two other people.

This is absolutely impossible for a hacker if it sees that it is absolutely impossible.

There is no response to each other before and half an hour.

Su Ye boldly speculated that William is definitely awarded what is important.

He knows that it is because the task time has long been.

William has long been achieved with financial freedom and freedom of life.

At this time, I am watching TV in the living room.

"!"

"This information is relatively large."

Su Ye is amazed.

Different from the Dragon Han Empire Internet users, if England.com, if you want to go online, the country's products are trick, lack of good deeds.

To put it bluntly, it is not how many Internet companies in England.

They will need to use a social software in Germany, etc., and then use an application of France in France, and finally use the beautiful country input method and browser.

This will achieve normal Internet access.

This is why Su Ye will tell the reason why information flow is relatively large.

It is mainly to cross the information request and very much.

Compared with the fact that the Internet industry has just started in the Dragon Han Dynasty.

But because the reason for the blogging blogging, all kinds of Internet products have been there.

Portal, search engines, game entertainment, instant messaging, etc.

Although these products may be more tender in those foreigners, but the same, Longhan's netizens are also very tender.

Plus the network speed of the multinational Internet Internet, even Su Ye, the madness of the wealthy, the might of the wealth is, and it is not necessary to say that ordinary netizens.

Therefore, in Dragon Han.

If you want to find a cross-border message, it is very easy, because everyone is not very much about foreign websites.

Su Ye hurts, or seizes the time to make a information flow classification software with a thinking editor.

It seems that the range of scope has been reduced, and now I will pay together for those single data information from England to request the beautiful state.

Then screen one by one.

It is the so-called idea to determine the way out.

When the SU rushed to start screening, there is no more than 5 minutes, and the software has been found.

From England issued a communication request, there are 11 information in the beautiful country animal husbandry home.

"Cheng!"

"You can also find other members of the mysterious organization even if you can't find William."

"However, William is the weight of the middle."

Su Ye began to analyze this 11 information one by one.

This is wrong, just withdrawal of 11 seconds, I have already gone, and I have entered a chess website to play games.

This is not right, Su Ye can see a livestock related issue after the other party enters the website.

"The four-headed milk of my pasture has a common limphoe disease. There are two heads, but there are two heads that are not good, do you have any good suggestions?"

Su Ye was originally thought that such a post would be deleted by the mysterious background management person.

As a result, he did not expect that the other party actually replied.

"Since the occurrence of limb surgery is closely related to the feeding environment, the first should start from environmental management. On the one hand, the inspection of the cowshed outlet must be completely thorough ..."

This, my grass!

This response is so professional, and the heart is not sigh.

The background administrator who is mysterious organization is too difficult.

If Su Ye himself wants to be such a website that can hide the hidden travel, he will definitely choose to be a game or web forum as an obstruction.

After almost 10 minutes of screening, 3 I was finalized.

These three I have entered the livestock home for almost half a hour.

Su Ye saw the other party not only directly participated in the reply of Flandy post, but also chatted with people in another post.

Just, another post Su Ye has not found it.

In order to verify, Su Ye returned to Fland's computer and seeing his operation path.

Sure enough, this guy also has multiple records of another post.

But that post is gone.

Su Ye turned his head and looked at the wall clock on the wall. This time is almost nine o'clock.

If you don't hurry your time, the other party may return to the computer next time.

Su Yili directly into the other's network.

These three I are connected, and Su Ye is estimated that this is three interruptions in the same local area network.

Still old, play, one person to operate three computers.

Su Ye felt that he can make the other part of the Internet.

As a comparative old-fashioned English, William has the same advantages or habits.

He won't be like France's arrogant guy, thinking that he is invincible, only set a firewall.

At the location of the network entrance, William set two sturdy firewalls.

At the same time, two firewalls are also set in the place where every computer's network is distributed.

In other words, if Su Ye wants to break William's computer, at least takes at least 8 firewalls to enter the other party.

More critical is ...

In order to avoid this situation that the computer will be attacked at home, William is a master's degree in the bridge of the beef tendon.

Let the firewall alarm on your computer can be connected to each electrical appliance in the home, including his mobile phone.

As long as someone attacks, the computer will be turned on after 15 seconds without William's reaction.

If you don't receive the reaction after 30 seconds, then the computer will send a mobile phone to William, please go home, have a friend who is looking for.

It is very unharmonic that Su Ye found this alarm when looking for the core of the William firewall.

Do you want to change a alarm program for the other party?

Su Ye did not have a malicious thinking.

However, this is an equal thing, and now you can create a software that can shield alarm program.