HK022 bet

Font Ke's eyes looked around the security company, and the technicians led by Ma Yong looked very ugly.

Steal the teacher!

Shi Lei actually insulted them like this!

Even with Ma Yong, the old fritters who have been mixed in the workplace for more than ten years can't help but be a little angry.

"Mr. Shi, in this way, you will definitely be able to recover all the data in our server?"

Shi Lei nodded proudly.

"Of course!"

"If you can't recover, what then?"

Ma Yong sneered and said, "You don't have to pay taxes if you talk big!" ”

"It's like a fart, let it go, forget it!"

Shi Lei raised his eyebrows, "What if I recover all the data?" ”

"Don't say anything to apologize!"

"Your apology is apologizing, Brother Shi is not rare at all!"

Ma Yong hesitated for a moment, but Shi Lei was too young, so young that people couldn't believe it, he did have excellent skills!

"Mr. Shi, what do you say?"

"After all, Mr. Shi, you're still a student!"

Ma Yong squinted at Shi Lei, and his tone was quite sarcastic. The words even revealed the taste of bullying Shi Lei's poor boy!

Shi Lei rolled his eyes, looked at Feng Ke and said, "Mr. Feng, I can help you recover the data of the server!" ”

"However, given the situation of your servers, the data recovery fee this time is a bit expensive!"

Falco said expressionlessly: "How much?" ”

Shi Lei raised three fingers, and the lion opened his mouth and said, "Thirty thousand!" ”

"No problem!" Falco didn't even blink an eye!

Shi Lei muttered to himself in his heart, could it be less?

Although he regretted it a little, Shi Lei was not the kind of villain who sat on the ground and raised the price, he turned his head to look at Ma Yong.

"Director Ma, why don't we bet the 30,000 yuan!"

"If I recover the data, you can give me another 30,000 yuan!"

Ma Yong hesitated.

Shi Lei sneered: "Director Ma, don't you dare? ”

"What don't you dare!"

Ma Yong held his head high and said in a mocking tone: "However, Mr. Shi, if you can't restore the server, as a poor student, how can you pay me 30,000 yuan?" ”

Before Shi Lei could speak, Sun Feng took the initiative to speak: "I'll help the stone pay!" ”

"Although I just opened a small repair shop downstairs, I can afford 30,000 yuan!"

Shi Lei looked at Sun Feng with emotion, "Brother Feng, thank you!" ”

"Stone, we've known each other for several years, if you lose this time, you'll have to help Brother Bai work in the future!"

Sun Feng said teasingly.

Shi Lei nodded heavily.

"Mr. Feng, you all go out!"

"I'm going to start recovering data!"

Falco did not hesitate, and directly greeted the people from the IT department, as well as Sun Feng, and walked out together.

Shi Lei stopped: "Brother Feng, what are you doing out of the city?" ”

Sun Feng was stunned for a moment, then laughed and stayed.

When Fenco and the people from the IT department walked out of the city, Sun Feng asked, "Stone, are you sure that kid?" ”

Shi Lei smiled and took out his USB flash drive.

"Brother Feng, didn't you see my strength last time?"

Sun Feng snorted, "Last time? ”

"Last time, it took you nearly four hours to recover sixty-two photos, right?"

"What kind of strength is this!"

Shi Lei rolled his eyes, "Brother Feng, I really don't know how to prop up the repair shop if you don't know anything about it!" ”

"Tell you, the reason why I used so much time last time was because I didn't have any off-the-shelf recovery software!"

"For four hours, more than 90 percent, I was writing data recovery software!"

Sun Fenghu said suspiciously: "Stone, you mean that it won't take too much time to recover data this time?" ”

Shi Lei nodded casually, "Brother Feng, you find a computer and play minesweeper!" ”…,

"I'll recover the data first!"

Sun Feng nodded helplessly, minesweeper or something, it's really annoying!

Shi Lei sat in the swivel chair, first opened the security policy of the server, made some changes, and then used antivirus software to successfully contain the malicious viruses lurking.

Then, he plugged the USB flash drive into the server's USB port, and then ran it directly in the USB flash drive, the 'deep recovery' software he wrote himself.

To be honest, Shi Lei didn't know how many data files had been deleted in the security server.

It is estimated that if you ask Ma Yong, that guy will not tell Shi Lei, and will even ridicule Shi Lei.

It's just that Shi Lei didn't plan to ask.

Although I don't know what files need to be recovered after looking around the security, Shi Lei has his own way.

Some of the modules in the deep recovery written by Shi Lei himself apply a completely new theory from 2012.

In the era of 06 years, it is simply a fantasy!

For example, delete the file timeline technique.

The deep recovery software will first establish a timeline based on all the files and the time they were deleted.

For example, file A, the deletion time is January 1 of 06; B file, deleted on February 2, 06; C file, deleted on September 9, 06.

Then, there are three points in the timeline of deleting files, the first of January and the last of September 9.

As long as he has this timeline, Shi Lei can find out the specific time when the files were recently deleted on a large scale.

Malicious programs, before repeatedly copying and deleting junk files, will first delete all the files stored on the server.

As long as you find the specific time of the first large-scale deletion of files, you can use this point in time as a benchmark to recover previously deleted files, including this point in time.

As for the deletion records after this point in time, Shi Lei will only randomly select some restorations, and then check whether they are junk files and then make a judgment.

The server of the surround view security does not use a non-X86 server, but a general X86 server, and it is only a departmental server.

The so-called x86 server, and the non-x86 server, the main difference is in the instruction set, which can also be said to be the operating system.

X86 server, is commonly known as PC server, in general, X86 server, using Intel processor and windows system, using CISC complex instruction set.

This kind of server has a wide range of applications, although the compatibility is good and the price is cheap, but the disadvantages are also very obvious, the stability performance is poor, and the security performance is even worse!

Non-x86 servers, generally using RISC reduced instruction set, but also using EPIC parallel instruction code.

This kind of server is a high-end thing!

They are expensive, have a closed system, and at the same time have good stability, excellent performance and a high degree of safety.

It is mainly used in the core business of large enterprises.

For example, the financial industry, the telecommunications industry, the absolute giant industry!

X86 servers, roughly speaking, are divided into four levels.

Entry-level servers, this kind of servers, in fact, are not much different from ordinary personal computers.

Even, some small companies and small enterprises simply buy a high-performance personal computer to act as a server.

For example, last time Shi Lei, in Sun Feng's repair shop, the two machine emperors he saw could be used as entry-level servers.

The second level of servers, workstation servers.

Although the workstation server is more powerful than the entry-level server, it is also a low-end server after all!

The third level, the medium server, is the departmental server that Surround Security is currently using.

This type of server, with its higher performance and higher price, is often used by medium-sized enterprises. …,

Independent departments of large enterprises also often use servers of this grade.

As for the fourth-tier enterprise-level servers, they are actually really high-end servers.

Servers of this level are generally non-x86 servers, and most of them use Linux or Unix systems.

In '06, enterprise-level servers, normally, were only used by large high-tech enterprises.

Shi Lei looked at the timeline of the deleted file while talking to himself with disdain.

"What a miser, a large enterprise that is on the side of high-tech, actually uses departmental servers!"

"I thought it was an enterprise-level server, I could leave a backdoor and borrow borrowed computing resources, but I didn't expect it to be a little scum!"

Sun Feng was on the side, trying to sweep mines, and when he heard Shi Lei's muttering, he said casually: "Stone, what are you talking about?" ”

Shi Lei hurriedly said: "It's nothing! ”

"The data is almost restored!"

Sun Feng was startled and looked at the time in the lower right corner of the computer, it had only been more than ten minutes.

"So fast?"

Shi Lei said speechlessly: "This is still fast? ”

"If it weren't for the spam server that looked around the security, it would probably only take five minutes at most!"

Sun Feng looked at the USB flash drive plugged into the USB port of the server with bright eyes, as if he was looking at a peerless beauty.

"Stone, such an easy job, you dare to ask for 30,000?"

Shi Lei sneered, "Brother Feng, there is a saying, those who are difficult will not, and those who will will not be difficult!" ”

"I've mastered this technique, so you feel easy!"

"If I give it to other data recovery studios, although they can recover it, it will take at least a week, and the asking price is definitely higher than mine!"

"My data recovery time is shorter than others, and the fee charged is lower than others, which is very kind!"

Sun Feng looked at Shi Lei enviously.

"Stone, you still have a future if you know how to do it!"

Shi Lei smiled and said, "Brother Feng, wait a while, your benefits are indispensable!" ”

On the monitor, in the interface of the Deep Recovery software, it is already displayed that the recovery is complete.

Shi Lei pulled out the USB flash drive, put it in his pocket, and then walked to the door and shouted.

"Mr. Feng, it's done!"

Fenco hurriedly walked over, and there was another person, faster than Fenke's footsteps, this person was Ma Yong!

After Ma Yong ran in, he immediately sat down in front of his computer and began to use internal management software to query all kinds of information from the server.

No matter what he is querying, all the data is clearly displayed in the monitor!

"How is this possible!"

"It's only been twenty minutes!"

"Impossible!"

Ma Yong roared in disbelief!

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

PS: The current recommended vote, 2426, before eight o'clock in the evening, 2550, that is, just more than 100 tickets, a total of more than 1,000 book friends who collect and read this book, one-tenth of the book friends, each voted for one vote and also killed, then add more!

Favorites, recommendations, member clicks, tips, reviews, book reviews, and everything!

Thank you! Thank you!

β€”β€”

【Reward thanks】Xiao Song 8888, (scarecrow), Momo L, reward 100