Chapter 7
.
Zhou Ziyun rubbed his eyes hard. When he looked at the screen carefully again, the line of confident fonts showed that what he saw was not dazzled. Zhou Ziyun was shocked at this time, and for nothing else, it was just that the other party invaded his computer without his own awareness, and he also used the system's own notepad to tell himself that no one except him could recover the photos he had lost.
Regardless of whether he really has the ability to help him recover data, the technology of invading his computer alone has proved that he is not an ordinary hacker. At least, this computer he moved from his sister's room is far from comparable to that of the computer used by ordinary novice. The firewall used by his sister was obtained from somewhere, and the security performance is much stronger than the firewall on the market. Moreover, some unnecessary services in the system were turned off by his sister, and all the loopholes were blocked, but even so, the other party still easily invaded the computer.
"Master, this person is definitely a master." Zhou Ziyun said excitedly. After confirming that the other party was a hacker, Zhou Ziyun's heart was revived in despair. Although he also knew that hacker experts might not necessarily recover data, he also knew that some of the hackers like to pick hard bones to chew. And the harder the bones, the more interested the hackers are, because Zhou Ziyun is also a little bit of aware of this.
Zhou Ziyun then directly entered in the next line of Notepad: I'm very happy to meet you, Mr. Zero. I am very impressed by your technology. Please help me and help me recover these eleven important photos.
zero: I didn’t like doing this kind of thing, so many people couldn’t even invite me. But for your infatuation, I will help you, remember, this is only once.
Zhou Ziyun excitedly entered: OK, OK, thank you so much, Mr. Zero. As for the compensation I mentioned, as long as you restore the photo, I will immediately transfer the money to your account. I have no doubt about your technology. As long as you want to make my machine slack at any time. May I ask, are you a Chinese?
zero: Yes, I'm a Chinese.
"Hehe, this kid is quite sensible. I just thought about how to ask him about compensation. It's rare that this kid is so proactive. I will try my best to help you recover the data." Looking at Zhou Ziyun's reply in Notepad, Lin Mu smiled happily. Just now, he seized the time to check the data recovery tutorial in the Great Wall system. Combined with the analysis of the virus by many experts on the Internet, Lin Mu can confirm that this mutant virus named Or type by the Great Wall semi-intelligent operating system will only re-partition the infected computer, and then stuff a large amount of huge garbage data into it.
During this process, Lin Mu found that the data should have been overwritten once, just like the photos in his own computer can be recovered after being overwritten. In the data recovery software he just used, Lin Mu discovered that it also had a remote data recovery function. Although Lin Mu had never used this function, he remembered that he had just used the hidden connection in the Great Wall Intelligent Remote Control Software. After entering Zhou Ziyun's IP address, he connected to his computer a moment later.
What's even more amazing is that since Tencent Company banned all the modified versions of qq that can display IP, it is impossible to see the QQ version on the Internet that can display IP. However, I didn't expect that there is no such restriction in Great Wall Instant Message Software. Zhou Ziyun's IP address and real address are displayed directly on Great Wall Instant Message Software. Lin Mu just tried whether the invasion can be smoothly, but unexpectedly it was successful.
"It's so cool. You don't need to set anything. You just need to enter the IP address. This Great Wall intelligent remote control can automatically invade the target system." Lin Mu was so happy that he shouted. Great Wall intelligent remote control is also divided into several invasion methods such as vulnerability intrusion and violent intrusion. Lin Mu just chose vulnerability intrusion and immediately entered Zhou Ziyun's computer. At this time, Zhou Ziyun's reply appeared on Lin Mu's computer screen again.
Zhou Ziyun: Senior, where should I get the hard drive to you? Should I make a full backup of the disk before I take it?
zero: Nothing is needed, you just need to connect the hard drive where you lost data to the computer you are using now.
Zhou Ziyun: But Qian Fei, if I connect the hard drive to this computer, my computer will probably be infected immediately by the strange virus.
"Uh, I forgot this important thing if I didn't say it. But it doesn't matter, labor and capital have prepared a lot." Lin Mu smiled and double-clicked the simplified version of Great Wall Antivirus Software on the right side of the system, summoning the interface of the antivirus software. Nowadays, all the software in the entire computer has reached a level that is almost god.
Not to mention the data recovery software and remote control software he just used, take this Great Wall Antivirus software for example. It is different from all antivirus software on the market today, because it can not only protect the computer with this antivirus software installed, but also protect a designated network computer from viruses. Lin Mu couldn't help but sigh that who designed such a coquettish system, which is so powerful.
Generally speaking, antivirus software is only important for antivirus engines, followed by virus databases. How complicated is this required to use an antivirus software to protect another computer on the vast network? At least Lin Mu knew that no antivirus software can do this. Of course, this simplified version also shows that the protected remote computer can only be limited to a state where the virus cannot occur. If it encounters a stubborn and undelete virus, the protected computer can only choose to delete the virus and cannot be removed.
Lin Mu's next reply calmed down Zhou Ziyun's nervous heart.
zero: You don’t need to worry. Others may not be able to do it, but I have my own way to ensure that your system is normal.
Then Lin Mu turned on the remote computer protection option of Great Wall Antivirus software and entered Zhou Ziyun's network ip. Great Wall Antivirus software then surfaced a prompt, which was that if the target computer used a dynamic IP, a identification file must be generated in that computer, and the identification file must be placed in the root directory of the system disk. The function of the identification file is to identify that the computer is being protected by Great Wall Antivirus software. Once the target computer is restarted unexpectedly, Great Wall Antivirus software can find the computer based on this identification file, so that the protection target will not be found due to the restart of the computer.
Lin Mu then asked Zhou Ziyun: Is your network dynamic IP or static IP?
When Lin Mu saw Zhou Ziyun reply that it was a static IP, he was slightly surprised. He knew very well that static IPs were generally those networks with high bandwidth, and the network fee he paid was so painful. "I would have killed this guy if I had known it, I should have slaughtered this guy again. Oh, forget it..." Lin Mu regretted a little, and then inputted the IP address obtained on the Great Wall Instant Message software into the antivirus software.
After a while, Lin Mu entered Zhou Ziyun's computer's C drive and saw a file called "Great Wall Antivirus Software Protection Logo". After nodding, Lin Mu typed a reply: Okay, you can now connect the hard drive to the computer you are using now. Just in case you can back up the data of this computer to another machine first. After Zhou Ziyun responded, through the interface displayed by the remote connection software, Lin Mu saw a new disk letter suddenly appeared in Zhou Ziyun's computer. It seemed that he had connected to a mobile hard drive or a U disk.
Immediately afterwards, Lin Mu watched Zhou Ziyun click on each folder one by one, copying the important data from this computer into the new disk letter. After doing all this, Zhou Ziyun took off the mobile hard drive, and then entered into the notepad on the desktop: Senior, I have backed up, you can start.
zero: Well, no matter what happens to your computer, you don't do anything to it, and you need to avoid network disconnection and power outage.
Zhou Liyun: Okay, I rarely get out of the Internet here, so I can rest assured. As for power outage, my computer has an ups uninterruptible power supply system, which can provide an hour of full speed after the computer is powered off. Senior, you can rest assured.
zero: Then connect the hard drive.
Immediately afterwards, a prompt for the target host to be offline pop-up, and a prompt for the antivirus software to be connected to the protection target No. 1. Lin Mu knew that the other party had turned off the machine and was about to connect the hard drive. Unlike Zhou Ziyun, Lin Mu was not nervous at this time. Even if the photo recovery failed, Lin Mu would not have any loss at all. Whether he recovered or not was just his skill to move his fingers. What's more, Lin Mu was full of confidence in the Great Wall semi-intelligent system at this time, and this matter could not fail in his heart.
About five minutes later, the simplified version of Great Wall Antivirus Software popped up the protection target No. 1 and started to perform a warning. "Hehe, the action is very fast." Lin Mu casually connected the remote control software to Zhou Ziyun's computer. Zhou Ziyun was indeed as Lin Mu said, and he didn't even move his mouse since he started the computer. Lin Mu opened a notepad on the desktop and typed: I want to start recovering data, and to prevent you from operating, I want to lock the system.
Zhou Ziyun: OK.
"This kid is really easy to cheat. Are you not afraid of me destroying it in his system?" Lin Mu muttered strangely. It must be unknown that Zhou Ziyun knew very well that if the other party wanted to invade his computer, he had no room for fight back. Besides, if this hacker master really wanted to destroy it, it was not easy. If he ordered it for a few orders, his system would immediately fall down. In addition, Zhou Ziyun had already backed up all her sister's important data, and even if the other party caused damage to the computer during the recovery of data, it would not be important.
After Lin Mu locked Zhou Ziyun's system, he clicked on the Great Wall data recovery software. After entering Zhou Ziyun's IP address, the software quickly began to scan his hard drive. Zhou Ziyun on the other side could only stare at the computer screen and wait nervously.........
Chapter completed!