home

search

Make a bet

  Hacker * HK022 makes a bet

  Feng Ke's panoramic security company, led by Ma Yong and other technical personnel, looked very unsightly.

  Stealing the master's skills!

  Shi Ke actually insulted them like this!

  Even someone like Ma Yong, a veteran who has been in the workplace for over a decade, can't help but feel some resentment.

  "Mr. Shi, so you're saying that you can recover all of our data from the server?"

  Shi Ke nodded proudly.

  "Of course!"

  "What if it can't be recovered?"

  Ma Yong sneered: "Talking big is tax-free!"

  "It's like farting, once it's out, it's done!"

  "What if I recover all the data?" Shi Ke raised an eyebrow.

  "Don't mention compensation or apology!"

  "Your apology is of no use to Stone Brother at all!"

  Ma Yong hesitated for a moment, but Shi Lei was indeed too young, so young that it was hard to believe he actually possessed solid skills!

  "Mr. Shi, what do you think we should do?"

  "After all, Mr Shi, you're still just a student!"

  Ma Yong looked at Shi Lei with a slanted eye, his tone somewhat sarcastic. His words also revealed a hint of bullying Shi Lei for being poor as a young boy!

  Shi Ke rolled his eyes and looked at Feng Ke, saying: "Feng, I can help you recover the server's data!"

  "However, considering your server situation, this time's data recovery cost is a bit expensive!"

  "Feng Ke's face was expressionless as he asked: 'How much?'"

  Shi Kei raised three fingers, and the lion opened its mouth wide: "Thirty thousand!"

  "No problem!" Feng Ke didn't even bat an eyelid!

  Shi Ke muttered to himself in his heart, could it be that something was missing?

  Although he was a bit regretful, Shi Lei wasn't that kind of petty person who would take advantage of others. He turned his head to look at Ma Yong.

  "Boss Ma, why don't we just bet these 300,000 yuan!"

  "If I recover the data, you can give me 30,000 yuan more!"

  Ma Yong hesitated.

  Shi Ke burst out laughing and said: "Director Ma, aren't you afraid?"

  "There's nothing to be afraid of!"

  Ma Yong raised his head and said with a mocking tone, "However, Mr. Shi, if you can't recover the server, as a poor student, how will you pay me 30,000 yuan?"

  Shi Ke hadn't spoken yet when Sun Feng took the initiative to say: "I'll help Shi Tou pay!"

  "Although I just opened a small repair shop downstairs, 30,000 yuan is still affordable!"

  Shi Ke looked at Sun Feng with emotion, "Feng Ge, thank you!"

  "Stone, we've known each other for many years too. If you lose this time, you'll have to help your brother out with some free labor in the future!"

  Sun Feng said with a sneer.

  Shi Ke nodded heavily.

  "Director Feng, you all get out!"

  "I'm going to start recovering data now!"

  Feng Ke didn't hesitate and directly called out to the people from the IT department, as well as Sun Feng, and they all walked outside together.

  Shi Ke stopped him and said: "Feng Ge, where are you going?"

  Sun Feng was taken aback, then smiled and stayed behind.

  When Feng Ke led the IT department people and they all walked out, Sun Feng asked: "Shitou, do you have confidence in this?"

  Shi Ke laughed and took out his own U-disk.

  "Brother Feng, didn't you see my strength last time?"

  Sun Feng snorted, "Last time?"

  "Last time, you spent almost four hours recovering just sixty-two photos, didn't you?"

  "What kind of strength is this!"

  Shi Ke rolled his eyes, "Feng Ge, I really don't know how you managed to keep the repair shop going with zero technical skills!"

  "Let me tell you, last time it took so long because I didn't have any recovery software readily available!"

  "For four hours, over ninety percent of the time, I was writing data recovery software!"

  Sun Feng raised an eyebrow and asked, "Stone, are you saying that this time, recovering the data won't take too much time?"

  Shi Ke nodded casually, "Feng Ge, find a computer and play Minesweeper!"

  "I'll restore the data first!"

  Sun Feng reluctantly nodded, sweeping away landmines and whatnot, how annoying!

  Shi Ke sat in the swivel chair, first opening the server's security policy, making some changes, and then using anti-virus software to successfully suppress the malicious virus lurking inside.

  Then plug the U disk into the USB interface of the server and run the "Deep Recovery" software written by himself directly in the U disk.

  To be honest, Shi Ke didn't know how many data files had been deleted from the servers of Huan Shi An Fang.

  It's estimated that if he goes to ask Ma Yong, that guy won't tell Shi Lei, and will even mock him.

  But Shi Ke didn't plan on asking either.

  Although I don't know what files need to be restored for Huan Shi's security, Shi Lei has his own way.

  Shi Ke wrote a deep recovery himself, some of which applied the brand new theory in 2012.

  In 2006, this was simply a fairy tale!

  For example, delete file timeline technology.

  Deep recovery software first establishes a timeline based on all files and their deletion times.

  For example, file A was deleted on January 1st, 2006; file B was deleted on February 2nd, 2006; and file C was deleted on September 9th, 2006.

  Then delete the file timeline, there are three points, the first January 1st and the last September 9th.

  As long as he has this timeline, Shi Ke can find out the specific time of the recent large-scale file deletion.

  Malicious program, repeatedly cycling through copying and deleting junk files before, will definitely first delete all the files stored on the server.

  As long as you find the specific time of the first large-scale file deletion, you can use this time point as a benchmark to recover files that were deleted before this time point.

  As for the deletion records after this point in time, Shi Ke would only randomly select some to recover and then check if they were junk files before making a judgment.

  The server of Hikvision's security system does not use non-X86 servers, but uses general X86 servers, and only belongs to department-level servers.

  The so-called X86 server and non-X86 server are mainly distinguished by instruction set, or it can be said that the operating system is different.

  x86 server, also known as PC server, generally uses Intel processor and Windows system, using CISC complex instruction set.

  This server has a very wide range of applications, although it is compatible and cheap, but the disadvantages are also very obvious, poor stability performance, and even worse security performance!

  Non-x86 servers generally use RISC instruction sets with fewer instructions and also use EPIC parallel instruction codes.

  This kind of server is already considered high-end!

  They are expensive, with a closed system, but have good stability, excellent performance and high safety.

  Mainly applied in the core business of large enterprises.

  For example, the financial industry, the telecommunications industry, are absolutely giant industries!

  X86 servers can be roughly divided into four levels.

  Entry-level server, this kind of server is actually not much different from an ordinary personal computer in terms of performance.

  Even some small companies or enterprises simply buy a high-performance personal computer as a server.

  For example, Shi Ke's last time, in Sun Feng's repair shop, the two machines that were seen can be used as entry-level servers.

  Second-tier servers, workstation servers.

  Although workstations are more powerful than entry-level servers, they are still low-end servers after all!

  The third tier is a mid-range server, which is currently used by Hikvision for departmental-level servers.

  This type of server has higher performance and is also more expensive, often used by medium-sized enterprises.

  Large enterprise independent departments also often use this level of server.

  As for fourth-tier enterprise servers, they are actually high-end servers.

  Servers at this level are generally non-X86 servers, most of which use Linux or Unix systems.

  In 2006, enterprise-level servers were typically used by large high-tech companies.

  Shi Ke looked at the timeline of deleted files while muttering in disdain.

  "What a cheapskate! A large enterprise with high-tech at its side actually uses department-level servers!"

  "I thought it was an enterprise-level server and I could leave a backdoor to borrow some computing resources, but it turned out to be a small potato!"

  Sun Feng was on one side, diligently sweeping for mines. Hearing Shi Lei's muttering, he casually said: "Stone, what are you saying?"

  "Nothing!" Shi Ke hastily replied.

  "Data recovery is complete!"

  Sun Feng was startled and looked at the time in the bottom right corner of the computer, only a little over ten minutes had passed.

  "So soon?"

  Shi Ke silently said: "Is this still quick?"

  "If it weren't for Hikvision's crappy servers, I'd probably only need five minutes!"

  Sun Feng's eyes shone brightly as he gazed at the U disk inserted into the server's USB port, as if he were looking at a stunning beauty.

  "Three thousand for this easy job? You're pushing your luck!"

  Shi Ke let out a laugh and said, "Feng Ge, there's a saying that goes: 'The difficult is not difficult for those who are skilled, but the skilled find it easy!'"

  "I've mastered this technique, so you think it's easy!"

  "If you give it to another data recovery workshop, although they can also recover it, they will need at least a week's time and the price is absolutely higher than mine!"

  "I recovered data in a shorter time than others and charged lower fees, very kind of me!"

  Sun Feng looked at Shi Lei with envy.

  "Stones, you guys who understand technology have a future!"

  Shi Ke laughed and said: "Feng Ge, don't worry, you'll get your reward later!"

  On the display, in the depth recovery software interface, it is already displayed as recovered.

  Shi Ke pulled out the U-disk and put it in his pocket, then walked to the door and shouted.

  "Director Feng, it's all set!"

  Feng Ke hurried over, and another person was even faster than Feng Ke's footsteps. This person was Ma Yong!

  Ma Yong rushed in and immediately sat down at his computer, starting to use the internal management software to query various types of information from the server.

  No matter what he inquired about, all the data was clearly displayed on the screen!

  "How...how is this possible?!"

  "It's only been twenty minutes!"

  "It's impossible!"

  Ma Yong let out an incredulous roar!

  ————————————————————————————————————————————————

  PS: Currently, the number of recommended votes is 2426. Before 8 pm, it was 2550, which means only over a hundred more votes are needed. If one-tenth of the over 1,000 book collectors who have read this book each cast a vote, I will add an update!

  Collection, recommendation, member clicks, rewards, reviews, book reviews, and everything!

  Thank you everyone! Thank you so much!

  ——

  [Tip of appreciation] Xiao Song 8888, (Scarecrow), Mo Mo L, tipped 100.

  .

  .

  .

Recommended Popular Novels