Chapter 787 (1/2)

Huo Shaoheng hooked the corner of his lips and said, ”well,” how do you want to find evidence

”Very simple ah, go to France Hermes official website backstage to turn around, as long as someone tampers with the order record, it will certainly leave traces.” He closed the box and held it in his arms. ”I'll see how the confidentiality of their system is today. If it's not difficult, there should be clues tomorrow.”

Huo Shaoheng: ”it's So fast? ”

”Are you doubting my ability?” Thinking of the pick pick eyebrows, impolitely said, one hand pushed open the door, ”I went down, thank you to send me back.”

, holding her box, stood under the Wutong tree in front of the dormitory building, waved goodbye to him in a clear light, and Huo Shaoheng looked at her silently, and started the car away.

Thinking of seeing Huo Shaoheng's car disappear on the asphalt road in front of the dormitory building, he turns to enter the dormitory building.

Back in her room, she first took the scarves out of the box and put them in her special drawer. Then she took a picture of the inside and outside of the box. Then she took a picture with her mobile phone. Then she cut the box into pieces with scissors and threw it into a stainless steel dustbin. She found a lighter and burned it to ashes.

This is ”destroying the corpse”. No one will find out the box again as evidence to prove that Huo Shaoheng had done private affairs when he was on a mission

But more important evidence is still on Hermes' website.

Because Huo Shaoheng bought silk scarves with his own account number, if it is found that the purchase time point is when he is on a mission in the United States, it is also unclear.

In fact, his initiative to help Huo Shaoheng find evidence is to ”annihilate” the evidence of Huo Shaoheng's violation of discipline.

For her, people like Huo Shaoheng should have no flaws in their work.

If so, it must be someone else's fault.

After processing the box, he opened his laptop and dragged out his hacker program.

She used to be able to hack into other people's computer systems with a mobile phone. Now, with a laptop, it is certainly more powerful.

She wrote this program under the guidance of Zhao Liangze. After several years, she optimized and improved it many times, and even applied quantum theory to the program optimization of password cracking, greatly improving the efficiency of hacking into other people's encryption system=_ =。

Now, even if Zhao Liangze saw her program, he would feel sorry.

However, she did not know this. She was not modest, but simply did not compare with others.

For her, the use of cutting-edge scientific theories is just as natural as eating and dressing. For example, quantum theory is still in the theoretical demonstration stage, but she has actually applied it.

In Germany, she used to dismantle the ”devourer.exe” of the entire central control system of the federal intelligence agency. The wheat grain theory she used was similar to quantum theory.

After opening the program, she did a routine hiding IP routine, and then dragged the address of the French Hermes official website to her hacker program for analysis.

The first step is to find the interface between the Hermes official website program and the background.

If there is no interface between the foreground and the background, you have to find another way to solve the problem, which will be more troublesome.

She hacked into the internal network of the German Federal intelligence agency to take advantage of the opportunity they gave her to open the internal LAN to disguise as an external network, so that she would be tricked.

This time, I don't know what the official website of Hermes is like.

However, in consideration of the understanding of these online stores, it should be connected.

Because online stores generally use the ERP system that connects the front desk and the back office, and it is a simplified ERP system. The key points are inventory, shipment, timely bookkeeping, etc., which are connected with the automatic financial statement system.

Ordinary people can not enter the internal system, because this system must have a variety of passwords to prevent improper intrusion.

But for a hacker of such a level, the password is the lowest level of security system, and then the complex password for her small program with strong computing power is slag.

Just listen to ding a sound, she input the official website link for two minutes, the system shows that the password has been cracked.

As expected, the structure of the official website is too simple. Although there are various Flash animations on the surface, the basic principle is still in the original stage.