Chapter 919: All the contradictions are gathered on the Germans
A cool smile smeared the corner of the white brother's mouth.
"I have a document issued by General XXX."
"I have an oracle written by Ao Guanhai, myself."
Hehe.
Hey......
Whoop.........
The US imperialist public security officers on a motorcycle suddenly came to the scene.
When they arrived at the place, the US imperialist public security directed: "What's the matter, why did you touch it?" ID card, driver's license, bring them all, give it to my eldest brother. ”
Rachel paid two certificates, and the people in the car also paid two certificates.
The U.S. imperialist public security officer read two certificates, wrote two tickets in his own handwriting, and then said: "What are you doing, this car is nothing serious, you go quickly, don't stand in the way here, hinder others from walking, do you understand?" ”
The big white brother laughed: "Understood, understood, thanks, thanks." ”
I also smiled: "Understood, that, I'm tired, I'll see you later, oh no ......"
Whoop......
The police car fled.
I continued, glancing at Big White Brother.
Big white brother glanced at me.
"Hehe, you didn't take out your documents just now." I laughed evilly.
The white brother laughed evilly: "Your handwritten oracle seems to have been lost." ”
Hehe, hehe......
Hey, hey, the white brother gritted his teeth and flashed his small gun: "Acquaintance, drive the car away, or I'll shoot immediately." ”
Rely on your sister, who doesn't have a gun.
As soon as I stretched out my hand, I took it, and Browning took it out with great power.
And just like that, there was another stalemate.
Bang!
Your sister, who is this!
After a violent crash, the big white brother turned his head sharply.
I took advantage of the situation, stretched out my hand, grabbed the hair of the thing, loosened my body again, and squatted down.
Bang!
The big white brother knocked on the car door.
I took the handle of the gun, bang!
At the same time, I saw Rachel, who also took the handle of the gun and smashed the person on the other end.
When the two of us knocked out the people who were the main and co-pilot, they turned their heads and ran to the car to take a look.
A big brother, like a zongzi, his mouth is blocked, his hands and feet are tied, and he can't stop whining in the back seat.
Dear Uncle Charles.
We're late.
I analyzed that these two people are not the main force, but just one of the big nets cast by the new life.
Thankfully, in this crisis, my intuition once again played its part.
This car is considered to be the right one.
Don't talk nonsense, let's go!
I opened the rear door and let Charles out, there was a car on the road, and I couldn't solve it, so I just threw the back seat, closed the door, and escaped!
On the way, I didn't meet the nosy American imperialist people.
We made a quick trip, not to the small shops in Chinatown, but to Rachel's Big House.
When we got to the place, we went into the yard and carried people out of the car, Rachel opened the door and we flashed in.
Close the door and put it on the couch for the uncle.
I took a fruit knife and smiled at the uncle, whoosh! Picked the nylon rope on his body.
Stretching out his hand again, a guy hissed, and tore the seal on the uncle's mouth.
Uncle Charles, a snort.
When I looked, the seal was full of beards.
Rachel then stirred up two cups of hot coffee, handed me one and she took one.
We looked at my uncle.
I gave Rachel another look, meaning, don't just drink it.
Rachel understands.
turned around, and it didn't take much effort to bring it to the uncle.
took the coffee and took a sip, and the uncle calmed down a little.
"As soon as I picked up the phone, I was targeted." The uncle said this, took another sip of coffee, then leaned back against the sofa, looked up and frowned, rubbed his face, and fell into the infinite memory of pain.
Rachel and I, gave Uncle a few minutes.
Uncle, with his hands on his head, his whole body relaxed.
Five minutes later.
Huhuhu......
Your sister! He's asleep! Actually, just fell asleep like this?
I glanced at Rachel in utter silence, and then I whispered, "Let him sleep for a while, I guess he hasn't slept in a long time." ”
Rachel nodded.
Turning around, one of us was watching people, and the other was busy in the kitchen, cooking and eating.
After two hours, the pie is baked out.
The uncle also woke up.
The two of us accompanied him, devoured it all, and the uncle finally drained the coffee in one go, and then stretched his waist and said, "I haven't slept for nearly a week." ”
I got another cup of hot coffee and handed it to him.
Uncle took it.
I said, "How did you do that?" How did you get those things? ”
Charles: "I went bankrupt, my wife left with my children, and I went back to my parents' house to earn a living. My house was taken by the bank, I had no place to live, and I applied to be on duty in the laboratory. And then...... I spent a week packing all the data from the lab, secretly putting it on the hard drive, and then taking it with me! ”
I can fully imagine how Charles has been through this week. The laboratory of new life, is that just a joke? The high-tech security measures are very strong, and Charles has been tense for more than 100 hours a week, almost every minute.
I stared at Charles: "What about the data?" ”
Charles glared at me: "Where's the money?" ”
Rachel came over, snapped, and put a stack of checks on the table: "You can make a price." ”
"Wow!" Charles was startled.
But soon, he gritted his teeth again and said, "This, although I got the data, the data is encrypted......"
Rely on your sister! I want to smoke!
Charles explained: "Don't get me wrong, the data is not encrypted by me. ”
Depend on! Smoke more!
We've gone to great lengths to save you from the sea of suffering, is it just for a encrypted hard drive?
I stared at Charles.
Charles continued: "The data in the lab is inside the computer, controlled by a large central computer. Any lab data that is executed, copied, copied, or otherwise managed to be backed up and moved will be encrypted. ”
"Then, data decryption, you need, submit an application to the computer at the headquarters, and after passing the manual review, the headquarters will retrieve the database, so as to extract it, and send the decryption key to us."
Charles continued: "The central computer, every Monday at 6 a.m., automatically restarts, then self-checks, analyzes suspicious operations in the internal network, issues an alert, and then reports to the person in charge of the laboratory. I just seized this point in time, and the operation was successful. ”
I see, this thing, if you want to decrypt it, it's very simple. It's about finding the designer of this security system.
Otherwise, as written in hacker novels, swish, a few pulls on the keyboard, a few clicks of enter, and a few clicks of entry will decrypt it.
Trifling! Jokes the same!
The most important point is to figure out the encryption algorithm rules of this key.
This thing, there must be a pattern.
For example, if there is a variable X, and the initial assignment is 5678, then every second that passes, the variable X will be automatically multiplied by the function Y, and the function Y may be a date function or some custom. Finally, the value of XY is assigned the constant Z. This Z is the key.
And this series of computing mechanisms comes from triggering events, that is, copying, replicating. (It's more complicated, this, show it to the program ape.) )
Therefore, find the designer of this system and figure out the rules of the encryption algorithm, only in this way can it be possible to crack the key on this hard disk.
And the more critical point of breaking the key is the point in time.
That is, Charles, at what time, in batches, copied this batch of data.
Because, no matter what kind of algorithm, one thing must be clear. It is 'time', that is, the operation rules of the key, which has a great relationship with the point in time!
I looked at Charles, and I said, "Hard drive, encrypted." It's of no use to us! Let's go! ”
Charles was stunned......
"Sir, don't you want to cooperate?"
I spread my hands and said, "Encrypted things, we don't have a supercomputer fleet to run, to achieve the so-called forced decryption, I, how to deal with it." ”
Charles gritted his teeth and said: "I can tell you who the designer of this system is, and then, I will provide you with the time point, when the time comes, you get the algorithm rules, and then find someone who is proficient in computers, and soon, you can crack the key." ”
I laughed: "Then why don't you tell us soon?" ”
Charles spreads his hands: "I need money!" ”
I turned my head: "Rachel, send off!" ”
Charles: "Okay, I'm losing!" Don't do that! No...... Let me tell you, the designer of the system is not an American, but a German-Chinese, and the other party is a woman, named Yue, Jiang! ”
Jiang Yue!
I rubbed it! You're a girl, you're still a computer whiz.
Charles: "Yue, Jiang, is only responsible for the core architecture of the system and the design of the encryption algorithm, the specific code processing, generation, and debugging, which are completed by the Indians in New Delhi, but not one Indian, but hundreds, each of whom writes a piece of code, and finally this month, Jiang, is responsible for the final summary and compilation. ”
After a little turn, he finally ran to the Germans again.
Jiang Yue! The rules of encryption are in her hands.
This game is so difficult!
I said to Charles, "Ms. Jiang is such an important person, how can I get close to her?" Tell me, do I have a way to get close? ”
Charles gritted his teeth again and said, "This...... I can't help it. ”
I'm speechless!
Rachel, send-off!
Charles stretched out his hand and said, "NO, NO...... The hard drive is here for me, it's for me. ”
As he spoke, Charles reached out and took out a TB SSD from Samsung.
"All the data, the encrypted stuff, is here. There's no backup, just this one! I beg you, find me a safe place. ”
I took the hard drive, handed it to Rachel and said, "Inspect it!" ”
Rachel replied that it was okay and turned to go to the study.
Twenty minutes later, Rachel returned.
"The data is 167 GB in total, and it is being backed up. As he said, all that was displayed were encrypted, unrecognizable files. Also, there are more than 80 packets in total. ”
I looked at Charles, "What are they?" ”
Charles: "UNIX-based database reports, documentation reports, videos of experiments, molecular formulas, and so on, a bunch of things. (PS: UNIX is a powerful, high-end application, operating system, not an interface with an amiable interface, Windows and Android.) )
Two hours later, the data was backed up.
I took my phone and called the demon Qi.
"Brother, I'm going to send you someone."
The demon hehe: "Is it the one who gave the new life a headache this morning?" ”
I replied, "Yes." ”
Demon Man: "Your inside line?" ”
Me: "Exactly, unintentionally planted willows, willows are shady." ”
Demon Man: "OK, you can send it over." ”
On my side, as soon as I picked up the phone, Rachel ran up to me from the door and said, "Sir, we are surrounded. ”