According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...If it's damaged, it will require many steps and a lot of trouble to repair. Export the data from the hard drive.
Xing Baohua was lucky; the power-on test was successful, and the data could be exported.
The logic chips on the newly replaced motherboard are soldered off, the data from the burnt-out chip is imported, and then they are soldered back on.
In this way, the new hard drive motherboard is essentially the same as the burnt-out motherboard.
Under a magnifying glass, the read/write head was observed to have fine, hair-like marks indicating bending, which was very likely caused by friction during the high-speed operation of the disk.
After replacing the read/write head, insert the original disk. After installation, perform a test.
The motherboard is powered on and the display is lit, but the motor is not moving.
Xing Baohua was speechless. He had never been so thoroughly vandalized, let alone so despicable. Who would have thought that the expert was even more despicable than him, destroying every single important component of the hard drive from top to bottom?
Then we disassembled the machine and replaced the motor; half an hour had passed.
With the help of the repair software, the data on the hard drive was finally read. Although there were bad sectors, they could be hidden. So, the original 1GB hard drive may now show a capacity of 750MB.
Organize the data on the burned hard drive and directly import the data into a new hard drive.
Take a test computer motherboard, plug in the hard drive and monitor, and then turn it on for testing.
The password is known. Open the plain text software. It doesn't need a high configuration. A junk board is fine. Even if it gets burned out again, I won't feel bad. It's not as expensive as a server.
However, Xing Baohua encountered a small problem.
If a file contains a virus, whether it's a compressed file or a shelled file, you can place it in a virtual space, unpack it, and search for the virus file bit by bit.
Once the virus file is found, things will be much easier.
However, Xing Baohua is now finding it difficult to unpack the data packet. It's not that the data packet cannot be unpacked, but rather that even after unpacking it, it's difficult to find the virus.
How should I put it?
This is a hidden virus with a package inside a package.
It's not a regular file, but a document format uploaded as an attachment, hidden within the email data.
Xing Baohua is now certain that the large attachment is not a normal attachment, but an attachment specifically designed to hide a virus.
The virus authors also like to play tricks, even using countdown timers.
Even if it's difficult to disassemble, you still have to disassemble it. This is the work of a master of this era, and it left Xing Baohua completely stunned.
What else can he do besides swearing?
In the past, he would have found this bastard and hung him up to be whipped for three days and three nights without feeling satisfied. But after being tricked like this, he has won over the other party's heart.
To prevent the virus from reigniting and burning out his motherboard and hard drive, Xing Baohua used an external safety device.
Similar to a fuse, it protects the main components by automatically cutting off power if the voltage or current is too high.
Actually, software can do this too, but it takes time to write. Physical cheats are so simple; they're readily available in labs.
Get ready and power on.
When I opened the email again, the countdown had just started and I hadn't stopped it yet, let alone opened the email.
*Snap!* The motherboard lost power!