224 Chapter 223 People That Shouldnt Be Provoked (Subscribe!) (1/2)

Enter the command room.

Tang Qing kept frowning, he didn't know how things would develop today.

If the talk collapses, it will mean that I can no longer rely on this arbitrage method to make money in the future. This is my main source of income now, and it will definitely hurt him to lose it.

If the talk is very'harmonious' and the other party acquiesces to his kind of transaction in the future, even if there is a limit on the quota, everyone is happy.

but.

No matter what the final result is, he must show his strength to the other party, so that the other party will not dare to have any crooked minds in the future, otherwise nothing can be reached.

'Food' is not qualified to negotiate terms, they can't even decide on life or death.

”Tang Yi, take this website, the address is...” Tang Qing said an address and a redirect method after he had decided.

”Yes, commander-in-chief.” Tang Yi replied, turning around and uploading the task to Xiao Er, then dismantling and distributing it.

Although Tang Yi also understands, he is not a technician, but a commander. This kind of thing only needs to move his lips. Xiao Er formulates and disassembles and distributes tasks according to the process. Tang Yi is responsible for supervising whether the tasks are reasonable and complete.Leave the rest to the intelligence analysts.Otherwise, he won't be busy alone.

In the past, special anonymous browsers were used to surf the Internet outside, but they are not needed from the command room. Not to mention that no one can find the address, even if it is released to the outside world, relying on the strength of these analysts who are proficient in binary computers, It is not easy to track down their addresses.

After receiving the task.

Dozens of intelligence analysts immediately turned into computer masters and joined forces to invade the website. It is very high, but it is actually very simple. It is nothing more than using various loopholes in the web to obtain permissions.

In order to make it easier to have ”friendly” access to the outside world in the future, some analysts have studied Microsoft's systems and major development languages ​​early on, constantly testing and discovering new useful vulnerabilities.

Otherwise, how did you ”share” the data and information of several national police stations and various agencies?The vulnerabilities they have found so far are as diverse as hundreds.

And these vulnerabilities come in handy right now.However, because it is not certain which vulnerabilities can come in handy, an analyst tests several.

Because they are usually too well prepared, plus these people's natural talent for processing this kind of information.

In just three minutes, analysts got the administrator rights of the website server, and then...A larger-scale invasion has begun, not just the network server, but also the computers and various communication devices over there, such as routers and switches, and all networked devices.

After the control, all the information that can be found is extracted.

......

Africa.

That huge basement.

A bunch of people huddled together.