Without the corresponding security certificate, He Congzhi directly became the security guard of this new company, and the monthly salary of 20,000 yuan was really too high for He Congzhi, and he never dared to think about it before.
Looking at the huge office, He Congzhi never thought that he would be able to work here one day, and the monthly salary was 20,000 yuan, which was several times higher than the public salary of many people!
So now He Congzhi is full of gratitude to Chen Xuyuan, not only gave him 10 million, but also gave him such a good job.
Looking at the office in front of him, this belongs to him alone, looking at the brand new computer, this is only their former supervisor's share, and now he is also the same person as the supervisor.
Chen Xuyuan sat quietly in the office, there were no hackers coming in yesterday, it was because the heat was too small, and some people couldn't find it at all, so it was very easy yesterday.
Now that the heat has slowly increased, you may encounter real hackers at any time.
Therefore, Chen Xuyuan can't be so relaxed, and list the information returned by a screen detection software separately to see if there is any problem.
In fact, hackers don't have anything, because the current Chen Xuyuan is not the Chen Xuyuan of two months ago, and the hacking technology has improved at least a hundred times.
Now he has the eye of the program, although he did not concentrate on electronic components, but he still studied it in his spare time, and now for Chen Xuyuan, the storage of mobile phones is not only memory, including some other electronic components also have a weak storage capacity.
So now Chen Xuyuan's hacking ability can already make a little use of these electronic components with the help of the Eye of the Program.
It is simply impossible for others to change the memory, as long as it is booted directly, it will be detected and recognized, and then a series of actions will be taken.
As for how many originals Chen Xuyuan stored the source code, only Chen Xuyuan knows it personally.
If you don't get rid of all the source code stored in these originals, it is impossible to just change the memory.
The guidance mechanism of mobile phone flashing has also been transformed, and it is impossible for ordinary people to enter the reinstallation system to guide successfully.
Of course, the storage capacity of electronic components is fixed, and Chen Xuyuan is not the only one in this world who knows that there is storage capacity.
Many of the more capable hackers know it.
And it's already been exploited, like many computer viruses, formatting and reinstalling the system can't get rid of the viruses at all, because these viruses are not just stored on the hard drive.
Even if it is another hard drive, the storage area and storage fragments are different, so I won't explain much here.
So it's not so simple to be an advanced hacker, and many people may not be able to reach the highest heights in their lifetime.
A real hacker must have a full understanding of all the hardware components of the computer or mobile phone, so that your hacking path can go better.
The biggest benefit of the program's eye for the storage capacity of the component is that it is easier to understand than others.
The storage capacity of some originals is not clear even to the manufacturer, let alone the average hacker, but Chen Xuyuan can't hide all this from him with the help of the program's eye.
For him, the entire phone has countless storage areas, and he can play with it, find one and have another.
I'm not afraid to be looked for.
If you put the memory storage on another machine, the virus protection software code will directly look for the components stored on another machine, leaving no chance to clean up the entire storage.
Therefore, ordinary hackers still don't think about it, not only need to defend against the spread of viruses, but also need to kill viruses in time, otherwise it is equivalent to stabbing a hornet's nest and their computers are finished.
Ordinary hackers can't deal with it, and even stronger hackers can't deal with it, and it's basically an absolute defense, but it's not impossible.
That's the kind of human beings who have awakened, maybe a computer hacker has awakened the ability related to components, and if they can directly control the components, no matter the hidden virus source code, they can all be cleared for you.
Chen Xuyuan clearly knows that this kind of person is powerful, Leng Mengjie, how can he be like this, much higher than Chen Xuyuan, he can only boil slowly, and he doesn't know when it will be the day of his emergence.
So these hackers are terrifying, and the fact that they have not encountered them on the dark web does not mean that it is impossible, and it may not be impossible to be born later.
And with his appearance, it seems that there are more and more awakened people in the whole world, Chen Xuyuan is very confident in ordinary people, but for the awakened, Chen Xuyuan has no way.
So now you can only guard against accidents that occur at any time, and you can deal with the situation yourself in time, otherwise it will be broken by someone just two days after it was launched, which will become a joke.
Chen Xuyuan did not allow such a situation to occur.
On this day, it did make some hackers excited, and people from the dark web and the Red Alliance also noticed that the hackers with a price of less than 10 million took quick action.
They didn't shout on Weibo, they went directly to the official website to start downloading, 50 yuan is not money for them at all, and a random computer is hundreds of thousands.
What they care about is the 5 million, and at the same time, they also care about this company that doesn't know the height of the sky, and it is really bold to dare to challenge all mankind.
On this day, software sales also skyrocketed, growing at a rate that was almost visible to the naked eye.
As soon as the software was started, many hackers did not go directly to flash the machine like some ordinary people.
Instead, inject a virus into the phone first, and since it's a protective software, it's a joke if the defense capability is not good.
Many hackers began to act, and the computer screen on Chen Xuyuan's side also responded quickly, some rune codes fluctuated rapidly, Chen Xuyuan stopped what he was doing and began to monitor it carefully.
There are thousands of vulnerabilities in the mobile phone system, and now Chen Xuyuan doesn't dare to say that he can find and fix them all, which is unrealistic.
Because the system of each mobile phone is different.
This system is all open source, and the ghost knows if there will be hackers' mobile phone systems modified by themselves!?
So this one has to be monitored.
Since it is a protection software, the secret privacy of the customer's mobile phone must be defended throughout the whole process, even if you know that the other party's system has set up a backdoor vulnerability or the like.
Free novels bring you joy and joy ---> storyskyline.net
Chen Xuyuan must ensure that everything in every mobile phone cannot be leaked out after using this software.
"Your sister!
The Android system vulnerability that I wrote myself has also been fixed?
My backdoor was fixed for me too!?
One of the hackers let out a startled noise.
"Hemp eggs!
I don't believe it, can you fix everything for me!?
The hacker muttered and started working on the keyboard again.
"Data flow detected!"
"Anomalous data detected!"
"Virus intrusion detected."
The hackers, who are working hard, found that the computer screen quickly prompted some information!
"Zizi!
The whole computer quickly went dark. ” "Your sister!
Is this protection software or virus software?
Depend on!!
The hacker let out an exclamation.