In the unknown century of Guangyuan, the unnamed galaxy achieved unification. To address population issues, a marriage matching system was developed, forcibly pairing people through data calculatio...
"I heard you're updating your information system? What happened?"
Zhou Siyu walked side by side with Wu Ming and Qin Ge, his hands behind his back.
"To be honest, our database was attacked some time ago, and we lost some data."
"Is it that important?" Zhou Siyu tilted her head to look at Wu Ming, resting her chin on her hand. "If it's just useless data that's been stolen, we can just strengthen the security system."
“It’s not clear what was stolen yet.” Wu Ming scratched the back of his head awkwardly, cleared his throat uncomfortably under Zhou Siyu’s gaze, and said, “The technicians only detected that some data was missing, but because the database was scrambled by the attackers, so…”
“This is a bit troublesome.” Zhou Siyu frowned, tilted his head and thought for a moment, “Your entire system is in chaos, simply updating it is definitely not enough.”
"That's what the technicians from the Information Management Bureau said too, but there's no time to reinstall now. My idea is, could we temporarily use a new system to handle simple things like resource allocation..."
"Doesn't the military have a dedicated system with even higher security?"
"That's not for ordinary people," Wu Ming waved his hand and explained, "Military information systems are only open to high-ranking officers."
"Let's take a look at your system first."
"Okay, this way please."
Wu Ming hurriedly stepped forward to lead the way, but couldn't help muttering to himself.
This person appeared out of nowhere without a word, and he didn't even notice.
The three large, gold-embossed characters "Information Department" on the black sign were particularly dazzling in the sunlight. Zhou Siyu squinted, stood at the door, and slowly lowered his gaze until it landed on the silver lock.
"I'm looking for the person in charge."
Wu Ming coughed awkwardly, took half a step back, and started calling for reinforcements.
Not long after, a woman wearing a white lab coat, black-rimmed glasses, and shoulder-length short hair walked over in high heels. She transferred the documents from her right hand to her left, wiped her right hand on her coat, and extended her hand to Zhou Siyu.
"This must be the technician sent from the Information Management Bureau headquarters. It's a pleasure to meet you."
"And this is...?"
Zhou Siyu didn't reach out; instead, she turned her head to look at Wu Ming.
"This is Director Zhang Li, the head of our Information Department." Wu Ming stepped forward and stood shoulder to shoulder with Zhou Siyu, introducing, "This is Zhou Siyu, a technical staff member sent by the Information Administration Bureau headquarters."
"Director Zhang?" Zhou Siyu raised an eyebrow slightly, smiled and extended his hand. "Hello, nice to meet you. Please give me your guidance."
"Major General Zhou, you flatter me."
Zhang Li withdrew his hand and lightly wiped it on his coat, a small gesture that Zhou Siyu noticed.
"Let me explain the situation first."
Zhou Siyu smiled, his right hand behind his back with slightly bent fingers that rose and fell rhythmically, as if he were playing a musical piece.
"Please come in."
Zhang Li took out his key, opened the door, and led Zhou Siyu inside. Qin Ge peeked in, glanced at her, and immediately looked away.
The cramped room was filled with various workstations besides a few desks, and floating screens were covered with flashing numbers. The computer cooling fans made a loud noise, and waves of heat filled the small space.
Wu Ming peeked out, then immediately pulled his head back in.
It's too stuffy; you'll suffocate if you stay inside for too long.
Zhou Siyu had no time to pay attention to the door gods standing at the entrance; she began to check the information system.
The situation was far worse than Wu Ming had described; the entire system was disrupted, and all the data and source code were in disarray.
Zhou Siyu tried many methods and spent a whole day trying to restore less than one ten-thousandth of the system.
"Contact headquarters and apply for a new system."
Zhou Siyu rubbed her aching neck, raised her head from the control panel, her eyes bloodshot.
"The new system takes too long to install..."
“The connection between the various subsystems was severed. I just fixed part of it, and with the data that your team fixed before, the most basic part can still run. I will find some programs from the database that can perform statistical distribution operations and connect them. It will be usable, albeit barely.”
Zhou Siyu stood up, leaning on the table for support. Her vision was blurry. She barely managed to steady herself by supporting herself on the table, shook her dizzy head, and turned her head slightly to the right, her peripheral vision catching sight of an inconspicuous black wire in the corner of the main unit.
"Database permissions..."
Zhang Ligang was about to speak when he sensed something was wrong. He followed Zhou Siyu's gaze and exclaimed in surprise, "Ah!"
"have a look."
Zhou Siyu propped himself up on the table, squatted down next to the tall main unit, and peered behind the main unit along the short black cable.
The short black cable carrying a small black box was taken away by Zhou Siyu. Looking at the object in front of him, Zhang Li looked around in surprise and lowered his voice: "This is... a data interceptor?"
Zhou Siyu put her index finger to her lips and examined the small box from all angles. Then she asked Zhang Li to find some tools and quickly disassembled the box.
The small red light hidden under the chip kept flashing. Zhou Siyu turned on the microcomputer, connected the box to the computer, and then quickly typed on the keyboard.
"Come here."
Zhou Siyu wiped his sweat, slid the virtual keyboard in front of Zhang Li, sat cross-legged on the floor, and rested against the cabinet.
"Anti-tracking?"
Zhang Li raised an eyebrow and quickly got to work.
"You should have noticed by now that someone first cut off the information flow, then used a data interceptor to infiltrate the system, steal data, and disrupt the system."
He had just checked and the system's firewall was intact and had not been attacked. So there was only one possibility: the intruder had bypassed the firewall by some means and directly entered the system to operate.
This chapter is not finished, please click the next page to continue reading!