According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...The guards helped him make a detailed plan; the entrance and retreat routes were easy to figure out. The key issue, however, was the situation inside.
If there are many guards inside, all of them will be lost.
Even if they get in, how will they handle reinforcements? It's said that the R police also use small-caliber equipment. If they notify the US military for support, how many minutes will it take them to arrive?
After circling around the telecom operator's location twice, Xing Baohua indeed discovered surveillance cameras.
It's all around the perimeter, so it's definitely all inside. Should we try hacking it?
With that in mind, Xing Baohua decided to go back to sleep first and have the logistics staff find a company or home user with internet access.
Of course, it would be best to go to a company, since there are no employees working at night, and they can go there in the middle of the night to borrow the internet cable.
So, Xing Baohua rested during the day, and at night, he would borrow a net himself, while the rest of the people continued to play with the equipment.
The logistics staff helped him find a small two-story company. This small company only had two computers, and Xing Baohua didn't ask what the company mainly did.
As long as there's a network cable, it's fine.
Xing Baohua didn't use anyone else's computer; he brought his own laptop and unplugged the network cable from the back of the computer and plugged it into his laptop.
Suddenly, it dawned on me: at home, I always use the automatic connection program he sets up, but here it's still a dial-up connection.
Cracking it would be too much trouble, so Xing Baohua had no choice but to open the other person's computer and find the dial-up password from the group policy.
Just logging in took about ten minutes.
The main problem is that computers in small companies boot up too slowly.
Xing Baohua first accessed the operator's server and searched for the program to connect to the monitoring equipment step by step.
If there's no server, then how about a computer connection program?
Since the surveillance video files are not stored on the server's hard drive, they must be connected to an external computer. As long as the external computer uses the server's network cable, Xing Baohua can find them by following the network cable.
Finding this thing is a waste of time; Xing Baohua didn't create a search tool for scanning video files.
Besides, it would be pointless to do it, since he doesn't even know what the file format of surveillance video is.
The only thing the Japanese do wrong is use video formats incorrectly. For example, Sony and Panasonic use different video formats.
Xing Baohua could only search little by little.
It took more than five hours to find it around 3 a.m.
Fortunately, the other party's surveillance did not use CD-ROM technology; otherwise, it would have been an independent unit without a network connection.
While the computer room monitoring equipment also uses computers as a converter, they use magnetic tape technology.
It wasn't a large cassette tape like a videotape; it was an audio cassette tape.
This also puzzled Xing Baohua: how much video could a single cassette tape store?
However, the advantage is that the computer's tape reader can read the information.