Li Yuan's computer was performing a self-test. Xing Baohua thought for a moment, then pressed the power button for a few seconds before shutting it down.
Trust, too, is something that is built over time.
The fact that they checked his computer right after he left shows they weren't entirely at ease with him.
Therefore, Xing Baohua wanted to observe for a while longer. During her conversation with Li Yuan, she learned that the boy had been living a frugal life, and his main source of income was currently the school's scholarships and his postgraduate income.
As for the extra money he currently earns, it's not something he can do all the time. Even the internet cable and network card he bought represent the biggest investment he's ever made in his life.
When Xiao Tian saw that Xing Baohua had turned off his computer again, he said, "I installed monitoring software on that computer. The commands he outputs are uploaded to the server in segments as code. If you want to see it, I can bring it to you."
Xing Baohua shook her head slightly and said no need.
Instead, he went to Xiaotian's workplace, took out his laptop, plugged in the network cable, and turned on the computer.
After connecting to the internet, Xing Baohua entered the address on the webpage and waited for more than ten seconds before the page slowly appeared.
The entire website is in English, with the Bank of Scotland prominently featured at the top.
Xing Baohua pointed at the screen and said, "If you're not busy, use a botnet to access the external network and look for vulnerabilities in the internal network. If you can get in and find them, that would be best. Try to access the server, check the server system version, and the vulnerability situation. Or use your trick to upgrade the server and leave a vulnerability channel."
Xiao Tian looked at the page, using the up and down arrow keys to control the progress bar. After glancing at it, he turned to Xing Baohua and said, "If there are serial ports between the external network and the internal network, it's easy to find."
"Yes! Let's first look around this webpage to see if it's a separate external server or if it shares a single server and then separates the internal and external servers?" Xing Baohua said this with a bit of wishful thinking, since the United States is known as a developed country.
All the advanced technologies follow the trend of aesthetics; stock markets, foreign exchange, banks, and so on all build websites.
Building a server is a major expense; the cost of an internal network may be higher, but the cost of an external network is not low either.
What if the Bank of Scotland wants to save some money and carves out a separate space on its internal server for external use?
The only cost required is to add a few more hard drives and set up a separate server, saving a huge amount of money!
Testing the waters will only waste a little time. If this situation really occurs, it just means the other party is stupid and hasn't been thoroughly beaten. For Xing Baohua, it's just luck; he deserves to make money.
Xiao Tian wrote down the bank address and said to Xing Baohua, "Try to get me a Windows server system. I'll study it when I have free time."
Xing Baohua nodded and said okay.
Actually, this guy is very grateful to IBM. If they hadn't made the servers so big and become a major global server supplier, Xing Baohua would have been busy researching other systems for a while.
The world's server manufacturers include not only IBM, but also HP, Dell, and many other brands.
However, they are all mainly small servers, which are similar to the IBM small servers that Xing Baohua is currently using.
Other brands also offer large servers, but they can't compete with giants like IBM. Fortunately, there was only one company with that exclusive technology at the time, and they had a very good working relationship with them.
Xing Baohua purchased many large servers from IBM and also had a small portion of open-source code provided by IBM.
These are also systems specific to IBM, and their systems were developed based on Unix. They've simply recompiled Unix to create their own unique system, but the kernel is still Unix.
It's basically adding a protective shell to an open-source system.
If this protective shell is likened to a lock, each system has its own key, but unfortunately, Xing Baohua's team was given a locksmith.
Can it be defended against?
Afterwards, Xing Baohua gave Xiaotian a computer application to analyze its structure. This was a real-time online forex candlestick chart trading software.
This is a global 24-hour trading system, and the owner behind this software is the Bank of England.
The world's largest foreign exchange market accounts for roughly one-third of the trading volume here.
It's an exaggeration, but it's true. Many Commonwealth countries use the Bank of England's rates as a reference for foreign exchange transactions.
It's called a reference, but it's really just copied and used.
Xing Baohua wanted Xiao Tian to take a look at the software's structure and see how to change some parameters without being detected under real-time fluctuations.
Software is easy to modify, but the data that the software collects on the server is not so simple.
If we can thoroughly understand the software, we can open up another avenue.
By using forex trading software to cheat a little, this money becomes much easier to make.
Is it a waste to wait more than 10 billion yuan for more than half a year? Even if interest is paid, it's not enough to cover the interest fees. Just take 100 million yuan from each bank account and use it for short-term trading to cover operating costs.
I don't expect to make a lot of money from this. I can use the cheating system to make a small profit, but not a big one.
With so many people watching, adjusting the profit and loss ratio, showing both gains and losses, would make it seem more realistic. But what if it were all profit, considering Xing Baohua runs a high-tech company and a software park?
It's hard to believe he didn't do something wrong.
Even if they suffer losses, they will try to check the security system on their servers.
The upgrade program that Xiaotian set up is like an IFF (Identification Friend or Foe) software. The security software in the system can't scan it, and even if you search for it manually, it would take several years.
Take the IBM hard drive that Xing Baohua got, for example. It took a whole team of people searching for it manually – it was incredibly difficult. If software could detect viruses, who would bother with that kind of effort!
This chapter is not finished, please click the next page to continue reading!
Continue read on readnovelmtl.com