Chapter 759 Investigation Deployment



However, now that the MAC address is known, all configuration information of this host can be collected through Microsoft's patch.

Unless the other party doesn't even want the host anymore and replaces it with a new one.

Most people wouldn't operate it this way; they're used to the machine, and it's full of data and tools, so they can't bear to throw it away.

Even if the system crashes, it won't be reinstalled; it will mostly be repaired, keeping only the commonly used tools.

Aside from unplugging the network cable, Xiao Tian basically hacked into the other party's computer. He did one thing: empty their hard drive, left a virus record, and saw how they obtained information through chat and how they got money.

Do I need a bank account name to receive money?

Having the account name tells you who the other party is.

Moreover, this time the gains were significant, as all the attacks from the trolls originated from Da Piao Liang.

They also obtained their real addresses through their real IP addresses.

They quickly used technical means to notify the people there to go to the address, take photos where necessary, and hire private investigators to investigate all the information.

This money was well spent; the family members and relatives of the person being investigated should also be investigated.

Whether or not one's family members should be spared misfortune depends on who the person is.

Zhao Haigang's cleaning team has received orders to enter the Great Beauty Country in batches.

They are waiting for orders at any time. As for who is the mastermind behind this, the answer will soon be revealed.

James is the head of a computer applications center in the United States. In addition to his work, he is also one of the notorious trolls known as "Ghost."

When James realized he was being tracked, he promptly activated the blocking mechanism, destroying two botnets before feeling safe.

Feeling somewhat confident, he didn't unplug the network cable or cut off the power.

Instead, he continued to look at information online. He was one of the main forces behind the attack on Xing Baohua's websites and servers. He went to the forums he was in contact with and saw that everyone was saying they were being tracked.

He saw the unexpected: being tracked simultaneously like this requires a huge amount of manpower. Does Huahong Technology have that many technical personnel?

Suddenly, he remembered that Xing Baohua also owned Dami Technology. Perhaps when they were using cannon fodder, Xing Baohua had already transferred the technical personnel from Dami Technology.

Therefore, a warning was issued: we are facing equally skilled technical personnel. The best approach is to first check if the computer is infected with a virus.

Although James was the whistleblower, he didn't immediately check his computer because his firewall didn't alert him.

He has great confidence in his firewall, which he built himself; he doesn't trust any other firewalls.

Three days later, James continued browsing the forum, watching the organizers post information, when suddenly a small pop-up appeared in the upper right corner of their screen.

It looked like a chat window, which startled me at first.

He wanted to use the mouse or keyboard to see who had hacked his computer, but his firewall hadn't alerted him.

At this moment, a dialog box pops up with a message.

"I know who you are, what you've done recently, and whether you'd like to work for me."

Instead of checking the computer, James typed in the chat box: "Who are you?"

"Your new boss, Xing."

James's eyes were wide open, as if he had seen a ghost, and he was thinking about how James had found him.

How should I answer?

After thinking for a moment, he typed "NO!" in the chat pop-up window.

Just as he pressed the Enter key, a slight smile appeared on his stiff face, when he heard a loud bang. He was about to turn his head to see what was going on when he heard the sound of breaking glass. Then he felt as if someone had punched him hard in the head, and his head slammed heavily against the computer screen.

A stream of bright red liquid flowed onto the keyboard, staining it completely.

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List