According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...It took me three and a half days to write the software. I ran the code and tested it, and it's not bad.
Just make do with it. Finding bugs and waiting for it to be fixed is a long time coming. As long as it works, that's fine.
After setting up the software, I went to the lab and specifically asked two young-looking programmers to help me take notes.
He needs a complete virus removal process.
Once the recorded data is compiled, it will be uploaded to the virus database of Shield Security and management software, so that at least there will be solutions to refer to when encountering similar viruses in the future.
After everything was ready, Xing Baohua first created a virtual space in the system, which was actually equivalent to safe mode, but with some differences.
Open several self-made security software programs, connect all external security devices, and plug in the data package hard drive.
After the drive letter appeared, the process of restoring the data package to its original mode began. It was quite laborious and required great care.
I was afraid of triggering a virus and burning out his motherboard.
Fortunately, the packaging went smoothly without any major incidents. It seems that the other party only protected certain data within the data packet.
Instead of wanton destruction.
From then on, everything went smoothly and as Xing Baohua had anticipated. The targeted scanning software was very effective, scanning out the entire data packet. The next step was to analyze the format of the virus file.
Xing Baohua didn't dare enter the password and opened everything.
He now strongly suspects that the password input field is the virus trigger, and the password is the instruction to activate the virus program.
The more I think about it, the more horrified I feel.
Isn't this guy a bit too OP?
The entire package cannot be opened without entering a password; entering a password is equivalent to activating the virus. He has linked the activation method to the password field.
You can only rely on your eyesight to find the file extensions of all files.
Surprisingly, he actually found a few, all of which were complementary and related virus methods.
Playing the booby trap mode involves using all sorts of disgusting tactics.
Once a virus format is identified, first use attribute mode to view the full name, retrieve detailed information, examine the structure, and make an open-ended approach between read-only and hidden modes.
Handling viruses manually is time-consuming, laborious, and mentally taxing.
It took more than a week to finish cleaning.
Can I confidently enter my password now? Open the relatively secure data packet.
The other party is cunning, so we need to be careful. For this reason, Xing Baohua backed up the motherboard and hard drive components, fearing that they might be burned after he entered the password.
After entering the password, just wait to press Enter.
Before manual virus removal, pressing Enter would definitely activate the virus.
Now, you have to press Enter with bated breath.
After a slight hesitation, I pressed the Enter key heavily.
It's open, and there's no countdown timer. I breathed a long sigh of relief. It wasn't easy! If I didn't have some advanced common sense, I would have had to burn through countless circuit boards to learn this lesson!
After opening the app, Xing Baohua didn't rush to click. He scanned it again with special scanning software, afraid that there might still be viruses hidden there that he hadn't found.
After all, the human eye has its limitations.
Another half-day passed, and Xing Baohua was completely exasperated by this piece of junk.
Only after the scanning software indicated that it was safe did Xing Baohua feel comfortable opening the buyer's file.
There were many emails inside. I opened them one by one, asking about the software development requirements and pricing.
The guy who wanted to buy the software gave a standard reply: as long as you can crack the email server, find the hidden data within the email data, and contact him at the address provided, you can prove you are capable of completing his task.
The commission is thirty million US dollars.
Seeing this, Xing Baohua stroked his chin. Could it be that the attack on the main server had nothing to do with this?
I feel like it's related to him, how could it not be? Is my intuition no longer accurate?
I can't really explain it, but since we've come this far, let's keep going.
address?
Where is the address?
Holy crap! Could hidden data be a virus? Is the address inside the virus?
This is outrageous! Finding this guy is too expensive, and I wonder how many people have been scammed.
Xing Baohua didn't move for the time being. Instead, he got up and went out of the laboratory for a stroll, and had a smoke to clear his head and think about his ideas.
Who is this mysterious master?
What exactly are they trying to do? With such good skills, they could just gather a few people and form a team. Why bother playing this kind of boring game?
No, it should be called talent selection! All the data and viruses are just test questions. Only those who can crack his virus and obtain the address can pass his test.
He will then issue a commission, and there will be a reward of 30 million US dollars for completing the task.
The testing costs are just too high.
After finishing his cigarette, Xing Baohua returned to the lab and asked the two people who were recording the process, "Have you compiled the entire unlocking process document yet?"
The two said they needed some more time.
Xing Baohua could only wait for them to finish recording before he could proceed to the next step, which was to decrypt the virus.
It's not just about analyzing and researching the virus, but also about finding its addresses.
As Xing Baohua was about to log into the forum to see what new posts there were, she suddenly looked around at the other busy employees.
He thought of a small problem: how many people in the company had been on the forum or seen the post asking for the software, and how many of them had fallen victim to the scam?
It's perfectly normal for programmers to do part-time jobs.
As long as it doesn't violate company rules, Xing Baohua can't interfere in other people's private affairs, so this is really not a good question to ask.
As for the detoxification methods compiled, those who have been scammed before will probably try them again after seeing them.
We'll release the solution later.
This chapter is not finished, please click the next page to continue reading!