Of course, to prevent the recurrence of large-amount transfers, Xing Baohua also had the technical team modify some functions, namely, that transfers cannot exceed 1,000 yuan.
Customers need to top up their accounts directly on the food delivery platform, which is similar to purchasing virtual currency.
The money you top up can be withdrawn or even converted into phone credit or internet fees.
It is multifunctional and versatile, and adds two more complaint hotline channels. Previously, there was only one complaint hotline because there were few customers, and it was almost impossible to get through when there were a lot of complaints.
Therefore, in order to provide better service, we have opened two more lines and a complaint channel on the computer.
On the day of the reopening, Xing Baohua's monitoring email also started buzzing.
The guards called Xing Baohua, and after he arrived, he began to investigate.
Three networked computers: one for external lines, one for internal lines, and one for connecting to the server.
The detection software sends intrusion information to a dedicated email address. Once opened, the email can show which port or gateway the intruder used to enter the system, and even display the intruder's IP address.
Xing Baohua's knowledge of the internet is several generations behind that of this era. Although he is only half-baked, he still has the ability to contend with these so-called experts.
We can't say we can completely crush the opponent, but by taking advantage of the difference in time and technology, we can at least find out who the opponent is.
If the other party reacts quickly and unplugs the internet cable, you should immediately leave or move. It won't be easy for Xing Baohua to find them.
After all, he didn't have a rapid response team like the FBI.
They can only passively defend themselves and wait for the consequences.
Five intrusion messages came in, all from vulnerabilities that hadn't been found yet. The IP addresses were quickly displayed, all of them belonging to compromised computers.
The real address has not yet been revealed.
Personal computers still lag far behind in computing power. Xing Baohua called IBM to have a small server built for him. The latest model, the latest performance. Except for a large-capacity hard drive, everything else had to be top-of-the-line.
Don't expect to track down hackers using outdated, low-performance personal computers, especially when analyzing the numerous IP addresses of botnets; you might not be able to identify more than a few even if you keep searching.
The computers here at Xing Baohua's place are considered state-of-the-art, but even these! The fans are making a piercing noise.
The hackers released the virus and then left, cleaning up the server logs and scanning the server again before finally leaving with peace of mind.
Fortunately, Xing Baohua had taken precautions, so he didn't need to go to the server room to repair the deleted files or search for information. All the intrusion attempts were stored in his email.
He can quickly take some preventative measures.
Right after the hackers left, he used the computer connected to the server to process the virus and placed it in quarantine.
Someone will go and analyze the virus pattern.
Continue read on readnovelmtl.com