Chapter 449 Who do you think you are!
Those who truly understand you include not only your own people but also your enemies.
Port vulnerabilities, backdoors, etc., may be difficult for you to find on your own, but hackers specialize in this and will always find a way to let them in.
With the help of monitoring software, Xing Baohua was able to see how the hackers entered the site, and then he wrote a patch to block it.
This thing is impossible to guard against; you can only find it and block it one by one, and it just keeps accumulating.
Fortunately, there were few electronic viruses at the moment. If it had been before he wore it, there would have been about a thousand different viruses appearing every day, with various versions and capabilities. Who knows, someone looking for this vulnerability or backdoor might have gotten in at any time.
Xing Baohua doesn't have a high-performance machine on hand at the moment, so he needs IBM to configure a small server and send it over before he can start the investigation.
Although it's a bit late, there's still a chance. After all, if the hacker finds that the virus isn't working, he'll have to come back and see what's going on.
Then it will be easier to trace the IP address.
The surveillance work was still done by his bodyguards, keeping watch 24 hours a day. Until the big devil hiding inside was exposed, only these few people around him were reliable.
Xing Baohua visited the food delivery company again to inquire about the recent growth in customers and stores. After all, with a large amount of money invested and promotional activities launched, it should be able to boost a group of businesses.
The situation remains the same, neither good nor bad. The number of shops has increased, but the number of customers ordering takeout is still the same as before. Occasionally there are one or two new shops, but when you average it out, you can't see much difference.
It seems that coupons aren't attracting many customers?
Xing Baohua didn't ask any more questions after hearing this, probably because many people still didn't trust him due to the shadow of the stolen funds from before.
How do we stimulate this trend? We need to increase the adoption of electronic products. Only when the population is larger will we see any results.
The initial investment is indeed large, with various costs and expenses, including employee expenses, especially rider expenses, which must be maintained.
Clothing, vehicles, etc.
Xing Baohua only wants to complete the initial valuation, but it seems a bit difficult at the moment.
Now that we've come this far, we have to keep going no matter how difficult it gets. At worst, Huahong will become the sole owner of this part; if that doesn't work, we'll just become the sole owner ourselves.
After dealing with some matters related to the food delivery companies, Xing Baohua asked his secretary how the preparations for the reception were going.
"Everything is ready, and we've even hired a security company in Hong Kong to protect their safety during their activities in Hong Kong 24/7," the secretary said.
"How's the media outreach going?"
"We sent out 80 invitations, but only 31 media outlets responded saying they would arrive on time."
"That's good. Make sure their food, clothing, accommodation, and transportation are all arranged. Also, prepare small gifts and souvenirs so they can receive one when they leave. This kind of publicity is more effective than advertising," Xing Baohua specifically instructed.
Actually, Xing Baohua didn't need to prepare like this. After all, the wealthy people she invited all brought media attention, and news reports don't come for money.
Increased exposure means more effective publicity.
But if you send some small gifts to appease these guys, that's a different story. They might even dedicate a large section to explaining the content of this cybersecurity conference.
This serves as a form of soft advertising. Sometimes, these things cannot be bought with money.
The following day, the virus sample that Xing Baohua had placed in the virtual space was also analyzed. There were no improvements, the only difference being that the function of tampering with the registry had been added to achieve the effect of hiding.
Okay, this is a pretty advanced feature. Once this thing goes off, the antivirus software will identify it and delete or isolate similar registry entries and normal files.
It can easily cause the system to crash, and viruses can take the opportunity to steal relevant information.
The analyzed viruses are uploaded to the virus database, and once there are enough positive results, another batch of CDs are printed and sold.
These days, something that costs only a few dollars to produce is sold for over a hundred dollars; that's really a bit greedy.
They have to be ruthless. They'll only sell them for a few years. Once the internet speed gets a little faster and the hardware capacity gets bigger, CDs won't be a problem anymore.
They all update their virus databases online, and it's free.
In the afternoon, the security guard monitoring the mailbox called him, saying that there was a message in the mailbox and an alarm sounded.
Xing Baohua quickly went over, opened the email, narrowed his eyes, and stared at the strings of code in the inbox.
I picked up my notebook, opened my programming tools, and wrote down the code from the email.
We obtained a hidden IP address.
Cunning, extremely cunning.
Judging from the beginning of the IP address, it comes from Japan.
This is a different method from the Japanese guy who planted the virus on the server before; it's not the same person. Furthermore, the way they entered was different; they used stealth techniques.
Even if they're ninja turtles, they won't escape this time.
Xing Baohua immediately took out his phone and called the IBM representative, asking, "When will my server be delivered?"
"It's not even finished assembling yet, you guys are rubbish. I'm waiting to use it, hurry up and get it on tonight's flight to Hong Kong, I need to see it tomorrow."
“Mr. This is a custom order. Some hardware needs to be tweaked, and we are working on it,” the IBM representative said.
“Send me every single part, no missing components, for any of the different debugging. I’ll debug it myself. If you don’t receive the goods by tomorrow, I guarantee you’ll suffer a huge loss.” Xing Baohua said before hanging up the phone.
Of course, saying the loss was huge was just to scare him; he couldn't actually cause IBM to suffer losses.
The two companies have a strategic partnership. Even if Xing Baohua doesn't use their products, his losses will be no less than, and perhaps even greater than, those of IBM.
With IBM's VP of Operations and CTO scheduled to visit in the next couple of days, Xing Baohua is unlikely to do anything excessive.
My dear reader, there's more to this chapter! Please click the next page to continue reading—even more exciting content awaits!
Continue read on readnovelmtl.com