After searching for a long time, I couldn't even find any trace of the G-defense line being attacked. Perhaps they never attacked it at all.
Neither the alert logs nor the IP address analysis showed that the firewall was accessed.
The logs are normal, but this is really worrying.
They couldn't have imagined that the person was retaliating based on the photos, and hadn't even started online.
Okay, we can't find out. We'll have to go to Hong Kong to put out the fire first. It seems that Huahong Technology can't hold on either.
As the chief technology officer of Dami Technology, Xiao Tianna personally gathered a team to accompany Xing Baohua to Hong Kong.
Reinforcements arrived. Xing Baohua headed to Huahong headquarters, while Xiao Tianna led his men to Huahong Telecom.
People at Huahong Technology know who Xiaotian is; nominally, he is also the director of Huahong Technology.
Huahong Technology is largely unaware of Xiaotian's technical skills, as many of them have never worked together with him and are unaware of his level of expertise.
Even the technical staff at Huahong Telecom were unaware of the existence of this technical director.
When Xiao Tian arrived at the server room, he didn't greet anyone he knew or didn't know. Instead, he clapped his hands to get everyone's attention and asked, "Hello everyone, I'm the chief technician sent from headquarters. General Manager Xing has put me in charge of this matter."
One of the technical staff at Huahong Telecom didn't recognize him. They said he was from headquarters, which made me think he might be from mainland China, since I'd heard the boss's headquarters were in mainland China.
"You're from mainland China. Does mainland China have internet access? Do you understand technology?"
Xiao Tian glanced at him, his eyes stern and his expression serious, completely ignoring the other's sarcasm, and said, "Get out?"
"You think I'll just leave because you tell me to? This is Huahong Telecom, I only listen to my boss."
"Throw him out. He and his supervisor don't need to come to work anymore," Xiao Tian said, turning his head slightly to the guard.
You have to understand, Xiao Tian is a treasure too! He enjoys the treatment of a guard.
He didn't call security guards, but personal bodyguards, all armed to the teeth in case of danger.
He was accompanied by two people, there were two more in the car outside, and two more on the perimeter.
Ever since Xing Baohua and Xiao Tian came to Hong Kong, his security company has been on emergency support.
The two Little Bird helicopters purchased are staffed by pilots who are on standby at any time.
The first batch of support will arrive at any point on Hong Kong Island within ten minutes.
The convoy will arrive within 20 minutes if there is no traffic congestion.
The guards' methods are not as gentle as those of security guards; if they say to throw someone out, they really mean to throw them out.
If anyone struggles even slightly, they get a punch; if they don't behave, they get another.
Such rude behavior is not something a technician would do.
"I don't need your voices, just listen to me. If you don't listen, you have two choices: either walk out on your own, or be thrown out by my men," Xiao Tian said domineeringly.
The people at Huahong Technology didn't say anything, since they knew he was a director. But the technical staff at Huahong Telecom were mostly unaware of this big shot. Some were indeed dissatisfied, but they tolerated it because of their job benefits.
Didn't they see that the people from Huahong Technology were too afraid to speak up? Even the technical leader from Huahong Technology came forward to greet them.
"Now tell me what's going on," Xiao Tian asked Li Dongming, the manager of Huahong Technology, who had come to greet him.
"We are still under DDoS attack. Other companies are in the same situation, basically paralyzed. We can only rush to repair Huahong Telecom first."
"What are the defensive measures?"
"Traffic filtering and blocking, firewall upgrades, but it's not working. Now we can only screen and filter IPs."
"It's a waste of time. Block all external IPs now. Start the backup server and get the HK network up and running, at least for data uploading and downloading within Hong Kong Island."
“Many companies in Hong Kong are foreign trade companies or overseas companies. If you use an external port, they can’t log in to overseas websites.”
"Just like you can log in now, execute the command. Now start finding the viruses and their IP addresses." Xiao Tianna decisively issued the order.
Some people started working, while others looked like they were working, but no one really knew what they were doing.
Fortunately, a group of people were brought along to help with the work before we arrived.
Xiao Tian never expected these people to be the main force; perhaps there were hidden business spies among them acting as inside agents.
As soon as Xiao Tian came online, he cut off the external network, instantly blocking the DDoS attack from the external network.
The server load immediately decreased. Only the Hong Kong Island intranet was accessible; connecting to overseas websites resulted in "server not found" messages.
Xiao Tian found an empty seat, took out his laptop from his bag, connected to the server line, and started working.
The people he brought began assembling a small server. After it was assembled, they strung a cable into the docking station under Xiaotian's laptop.
In this way, Xiaotian's laptop can only be used as a screen, while the processing of problems is handled by a small server.
Huahong Telecom's system memory is enormous, with hundreds of millions of files and data points. Let alone scanning for viruses on his beat-up laptop, it wouldn't even finish before it was smoking.
The server scans very quickly, and with various scanning tools running simultaneously, suspicious files were identified within two to three hours.
This is very labor-intensive, as it requires manual judgment to determine whether it is a virus.
The initial step is manual screening. The next step is to decrypt the file formats within the file package to check if it contains viruses that alter the nature of the virus.
If necessary, the outer casing must be disassembled to examine the core documents.
Most viruses can infect other viruses of the same kind. Once detected, replace the infected file with a normal one.
This chapter is not finished yet. Please click on the next page to continue reading the exciting content!
Continue read on readnovelmtl.com