Chapter 224 (1/2)

Enter the command room.

Tang Qing has been frowning, he does not know how things will develop today.

If we talk about it, it will mean that we can no longer rely on this arbitrage method to make money. This is our main economic source now. If we lose it, we will definitely love him.

If the negotiation is very ”harmonious”, the other party will acquiesce in this kind of transaction in the future, even if there is a limit, it is also happy.

But.

No matter what the final result is, he should show his strength to the other side, so that the other side won't dare to give up any wrong thoughts in the future, otherwise nothing can be said.

”Food” is not qualified to talk about conditions, they can not even determine life and death.

”Tang Yi, take down this website. The address is...” With a decision, Tang Qing said an address and a way to jump.

”Yes, commander in chief.” Once Tang replied, he turned around and uploaded the task to the waiter, then disassembled and distributed it.

Although Tang Yi knows it, he is not a technician, but a commander. This kind of thing only needs to be talked about. Xiao Er formulates, disassembles and distributes tasks according to the process. Tang Yi is responsible for supervising whether the tasks are reasonable and perfect. The rest is left to the intelligence analysts themselves. Otherwise, he would have to die alone.

In the past, we used to use a special anonymous browser to surf the Internet, but we didn't need it from the command room. No one can find the address. Even if we put it outside, it's not easy to find their address with the strength of these analysts who are proficient in binary computers.

After receiving the task.

Dozens of intelligence analysts immediately turned into computer experts to jointly invade the website. It's very tall, but it's very simple. It's nothing more than using various vulnerabilities of the web to obtain permissions.

In order to make it easier to access the outside world's Internet in a ”friendly” way, some analysts have studied Microsoft's system and major development languages for a long time, constantly testing and exploring new and useful vulnerabilities.

Otherwise, how to ”share” the information of several national police stations and institutions? So far, they have found hundreds of loopholes.

And these loopholes come in handy. But because it's not clear which vulnerabilities will work, an analyst tests several.

Because they are so well prepared at ordinary times, these people are born with a talent for this kind of information processing.

But in three minutes, analysts got administrator rights to the web server, and... More large-scale invasion has begun, not only the network server, but also the computers and various communication equipment, such as router switch and other networking equipment.

After control, all information that can be found is extracted.

。。。。。。

Africa.

That huge basement.

A crowd of people huddled together.