According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...He turned to Aunt Qian and said, "I heard that. Go to the company tomorrow and say that President Wang Weibao introduced you."
"Thank you, thank you Mr. Xing for the meal," Aunt Qian said happily, even tugging at the girl next to her to urge her to thank him quickly.
Xing Baohua saw the girl silently say thank you to him, and smiled and nodded.
This is a classic case of someone being sold out and still helping to count the money.
After the meal, everyone dispersed and went home.
only.
Master Zhou, who hadn't said much all night, was full of energy on the night shift. Even this dignified man from Shandong was sore and weak the next day.
Working during the day and then working overtime at night, even the strongest body can't withstand such torment!
Upon arriving at the company, Xing Baohua focused on waiting for the specially made server to arrive, as he had already sent someone to the airport to wait for it.
The server finally arrived in Xing Baohua's hands around noon, and sure enough, it consisted of loose, unassembled parts.
Having not done anything himself in a long time, Xing Baohua rolled up his sleeves and began assembling the server.
It still uses a dual-socket CPU, supports the latest 386 processor, and has 8 memory slots, taking up half of the motherboard.
The power supply is very heavy; it takes two people to carefully move just this one small server.
This thing weighs about 50 kilograms each. Because it's valuable, it's safer for two people to carry it.
After assembling the server and connecting it to the dedicated line from the data center, setting up the system, and allocating space, it was already past 3 PM. Time to get started.
Let's not track the other IPs for now. Let's focus on that Japanese guy who uses a hidden IP and see who he really is.
I thought they would use a lot of botnets to cover up their IP address, but who would have thought that the IP address was actually real.
Is this a sign of disdain for broiler chickens, or a contempt for the technology in Hong Kong? Are they that confident?
Once the address is found, you need to check the other party's real address, which will be registered with their operator.
To obtain information, one could either hack into the telecom operator's servers or send someone to the operator to retrieve the data.
You can't get them through official channels; you have to use unconventional methods, and you can usually buy them by spending some money.
Xing Baohua didn't use anyone from the Japanese branch to do this; instead, he had Zhao Shanhai's son do it.
Xing Baohua obtained the other party's name, home address, and even phone number within two hours.
This work efficiency is unmatched!
The other person's name is Yuichi Fujiwara, and he is the technical director of a software company at JD.com.
Next, Xing Baohua will check if any of the IPs he has dismantled are the same as this one. If so, it means that the other party has also hacked into his server before. If not, what is this person trying to do by spreading poison again?
In return, Xing Baohua first used the server's performance to release the botnets. He planned to check out Fujiwara Kazuo's computer and implant a monitoring virus into it as well.