According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...Now I can finally go back and finish what I didn't get to do last time with Master Zhou.
It's the middle of the night again. The phone always rings when I'm doing something really good. Look, I've been in the server room for so many days without a phone call at night, so why does it only ring when it's such a big event in my life?
When he answered the phone and heard it was Zhao Shanhai calling, even if he had something to say, he had to suppress it.
"Sorry, boss, I'm disturbing your rest. I've found the account owner you asked me to find! I suspect that the other party deliberately used my identity."
"Who made that judgment?" Xing Baohua asked.
"The information provided by UBS indicates that the other party is Croatian, born in 1889, and will soon be over 100 years old," Zhao Shanhai said.
"Thank you, I understand! I'll try to find out where the funds in the account went," Xing Baohua said.
"I'll try my best, but it might not work."
"I'll try my best!"
After hanging up the phone, Xing Baohua returned to bed. Master Zhou pouted and said, "You wereted your time cultivating earlier; you're all limp now."
"I'm sorry, but would you mind doing the extra work?" Xing Baohua said with a slight smile.
"How annoying!" Although Headmaster Zhou said this, he started to tidy her hair, which had been messed up by the bumpy ride.
Tying my hair up is just for convenience.
The next day, Xing Baohua returned to Hainan Company in high spirits and put the previously backed-up hard drive into the safe.
You never know when you might need it.
He's now waiting for the hacker alliance to give him information; he wants to know the rules and how to play.
He had the email addresses of nine other hackers, but he knew that those accounts were temporary and could be changed at any time.
Finding these nine individuals is extremely difficult and requires the right timing.
Let's put that aside for now and get the order first.
Around the afternoon, Xing Baohua received a notification in the email inbox of the botnet he was monitoring.
As usual, I scanned the QR code before opening it. This time there were no viruses at all; it was just pure text content.
The above sentence states that the client has commissioned the identification of a specific IP address and its details, with a commission of $300,000.
The generous payment indicates the task is challenging.
Sure enough, Xing Baohua was delighted when he saw the IP addresses. If he remembered correctly, they were the addresses of the computers whose circuit breakers had been suspended.
Without even thinking, I replied to the email, explaining that the IP addresses I gave him could not be connected.
This can be considered an indirect rejection.
After that, the other party didn't send him any messages.
After waiting a while, Xing Baohua started working. His recent investigation into the other party had resulted in a backlog of documents requiring his signature and approval.
It's a waste of energy to be busy while checking your email.