Chapter Ninety-Nine: Self-Help
The leader who took care of him in the company didn't want to inform them, and his friends didn't want to cause them trouble, so after thinking about it, Li Er still shook his head: "Forget it, don't call them here." ”
Fang Chang glanced at him clearly, and when Li Er felt that the details were about to be seen, he handed over a notebook: "This is your transcript, sign it if there is no problem." ”
Li Er took the transcript and began to read it. Although he had just seen what Fang Chang had been writing, he didn't expect to be writing this. Don't say it, the old man's handwriting is quite good-looking.
After confirming that it was correct, Li Erlong signed his name in a flying dance, and did not forget to say after signing: "Can the mobile phone be returned to me, stay here and be bored......"
"You're going to have fun in the bitterness. The long, slender fox's eyes narrowed as if he were smiling. After confirming that his signature was correct, he left. When Li Er saw them walk out directly, he thought that he had no hope of getting his things back, but he didn't expect Li Wanji to come back a moment later and get his mobile phone back.
"Don't send any scarves, don't make it difficult for us. Li Wanji admonished Li Er, and kindly mentioned: "We can't say much about the investigation, if we find any progress that can clear your suspicion, we will definitely let you out as soon as possible." Don't worry, Fang Chang is very powerful, he won't wronged any good person. ”
Bang, the iron door shut. In the corner of the guard room sat an old police officer, behind his desk looking at a computer screen and smoking a cigarette. Don't look at people who don't look this way, if Li Er has any action to escape from prison, he will definitely be taken down by him as soon as possible.
Li Er glanced at the closed-circuit monitor on his head, found a corner where he couldn't see the phone screen, and pressed the lock button.
The five-point-2-inch screen lit up, and the battery was still more than 90 percent. He breathed a sigh of relief, but luckily it was fully charged in the morning.
Of course, he didn't get his phone back to play games or read novels, but to wash his innocence and make a final self-rescue action. It is better to rely on others than on yourself.
After gaining the ability to be a super hacker, he had already modified his electronic items. Just like the pear mobile phone in his hand, although the appearance is exactly the same as the ordinary pear 6S, the core and memory are much more advanced, and it has also been brushed with his own internal system.
After making a few secret gestures on the unlock page, the original nine-square grid page suddenly went black, and several rows of green codes were swiped. Quietly, the system was activated.
On the simple black interface, there are only a few simple similar APP icons. LI ER CLICKED ON THE CRACKED WI-FI AND CONNECTED TO THE POLICE STATION'S INTERNAL NETWORK......
It is inconvenient to enter the code too many times for mobile phone intrusion, and Li Er deliberately wrote a lot of preset actions, so it only takes a few clicks to invade by itself. However, it can't be overcome by a firewall that is too strong. The public security network is naturally not a target that can be dealt with by mobile phone intrusion, but Li Er found the username and password entered in TXT on a computer, probably written down by some forgetful old public security officer, so the problem was solved.
Logged in to the intranet with the recorded username and password, and the internal interface with blue and white colors popped up on the remote control window. Li Er hurriedly used the search function to query the files related to his case.
Thanks to the fact that all filings are now filed on a computer, his case is no exception. The document he searched for was created yesterday, and it contained the forensic doctor's report on the cause of death, as well as a hotel investigation report......
As he expected, the time of the deceased's death was between 7 p.m. and 2 a.m. the day after the scarf was published, and the place of death was a luxury suite in a hotel, and the cause of death was multiple stab wounds to the lower abdomen with a sharp object.
On that day, the deceased Deng came to a hotel by car alone, and never came out after opening the room. Since there was no CCTV in the hallway and room, the killer was not filmed either. The elevator's CCTV did not capture any suspicious figures, and the police team did not find any fingerprints and valuable evidence at the scene.
It wasn't until the next day when the cleaning staff opened the door to clean the room that the victim's body was found......
Well, from the perspective of an ordinary person, Li Er didn't see any clues in the cause of death at all, and not everyone can be a detective.
Li Er gritted his teeth and spent a million to contract "Detective Conan". The familiar cool feeling was directly submerged in the pineal gland, and when I looked at the file again, it was really different.
Not only is the logic many times clearer, but Li Er has found a lot of doubts from the clues.
Lear closed the file and opened the file attachment. A full 300M of photo data made the phone almost stuck for a moment, and then it was successfully unzipped.
Among them are photographs from the scene of the murder, as well as drawings of the construction of the hotel floors. One of the photos taken from the computer at Deng's home made Li Er feel like a light was behind him!
There may be clues about the murderer in there!
The computer in the photo has been sealed as evidence, and Li Er does not believe that the police did not try to crack the contents of the computer. He checked the internal network, and sure enough, a computer was cracking the encryption program.
This computer was full of loopholes in Li Er's opinion, and without alarming the other party, Li Er quietly obtained the highest permission, and used his own decryption program to push the algorithm, so that the other party's program could calculate the result earlier.
Cracking Deng's computer, Li Er immediately went to swim around, and it didn't take long to get Deng's buckle number password and scarf number, and when Li Er logged in to Deng's number, the other party was still cracking the password.
Deng's panda eating sweet potato scarf in the message record opened Li Er's eyes, it turned out that a million-fan big V talked about business like this, and a forward was tens of thousands of hundreds of thousands of accounts, and he also deliberately looked at whether the plagiarism incident was instructed by anyone, but there was no in the chat record, it was estimated that it was chatted with other software, so it was closed.
After several searches, Li Er finally found some clues.
On the buckle, there is such a chat record in the discussion group of "business friends" of pandas eating tomatoes:
“2016-01-04
Trading with a vest 10:34:22
I'm the one you sent evidence the last time
Panda Eating Sweet Potato 10:40:13
Changed your number?
Trading with a small vest 10:40:15
How much do you want
Panda Eating Sweet Potato 10:40:17
Million.
Trading with a small vest 10:40:25
……
Trading with a small vest 10:40:26
Too much
Panda Eating Sweet Potato 10:40:29
If you don't talk about it, you will be given three days.
――――2016-01-04――――
Trading with a small vest 20:20:15
Is it still there
Panda eats sweet potato 20:20:30
Got it in mind?
Trading with a small vest 20:20:34
Three million can
But how do I know that you didn't give the evidence to others
Panda eating sweet potatoes 20:20:35
There are rules for each line, and I haven't shown this thing to anyone but you, and I haven't mentioned it on the Internet.
The only original is in my hand, and it's still worth three million for a lifetime, right?
Moreover, in addition to plagiarism, you also have black material in my hands......
Trading with a vest 20:20:40
Less nonsense
The transaction is written off
Or cash?
Panda Eating Sweet Potato 20:22:30
Well, XX hotel XXX room.
Trading with a small vest 20:22:35
I'll go to you tomorrow
Panda eating sweet potatoes 20:22:40
Well.
――2016-01-05――
Trading with a small vest 17:00:00
I'm here."
Seeing this, Li Er can be sure that the murderer is the little vest used for this transaction. But this QQ number,It hasn't been online since the 5th.,The information is all fake.,There's a sweet potato in it.,It seems that it's specifically for this transaction.,There's no information left at all that can be traced back to the real identity.。
The only thing I can know is that this matter is also related to "plagiarism". However, unlike his plagiarism, what Panda found this time must be real plagiarism, otherwise the other party's reaction would not be so big.
The panda should have wanted to blackmail the other party by plagiarism, but was killed by the other party instead. This is also reasonable, because in Huaxia, plagiarism can punish a person to bankruptcy, and it will also be included in the personal information file. Plagiarists, with bad circumstances, are basically impossible to work in this industry for the rest of their lives, and it is normal to find a job. Basic citizen benefits and insurance are also not available, and the future is basically bleak. This is also the reason why Li Er changed color immediately after being splashed with plagiarized dirty water.
And with Panda's character, it's hard to believe that he will only blackmail once. If he blackmails for the second time, the third time, will he give it or not...... and this may be the reason why the vest is desperate.
At the end of the day, pandas are too greedy.
However, the release of this clue will only deepen Li Er's suspicion. Because of the word "plagiarism", the only recent incident is his "Shangjing Ghoul".
However, he also has the force value to kill an adult......
The only way is to find the plagiarist's body, if you can find the panda's evidence, maybe all the doubts can be solved, including who the killer is.
But the panda was probably afraid that others would know, so before leaving, he removed the disk where the evidence was placed in the computer. Although it is only a common network free antivirus software, but with a few rookies in the network security department of the public security department, I am afraid that it will not be recovered.
Li Er also had to prevent them from doing things around, and made all the numbers that could have been restored to the point that they could not be restored.
For example, now, Li Er has finished reading the message and recorded it, and they haven't cracked the password yet, so they are wandering around the desktop.
;