Chapter 170: What do you do with collecting so much information related to car accidents?
In the corridor, Chu Yanhuan lowered his head and flipped over the photos he had taken, smacking his lips with satisfaction, "The structure of each photo is very good, I take pictures of a really good level!" But how did this kid's abdominal muscles train so well? It's weird and jealous! ”
She put away her phone, pushed open the door of the study, and swept her eyes in front of the desktop next to the desk, and walked over.
After the computer was turned on, Chu Yanhuan was surprised to find that Li Siyan's desktop was equipped with a Cyborg Hawk system.
Cyborg Hawk is a dedicated system for penetration testing with a wide variety of intrusion software.
Only an expert knows that these software can easily hack into a target computer.
As far as she knows, Li Siyan is just the owner of a film and television company, why does he have a hacker system installed on his computer?
Chu Yanhuan's heart was filled with layers of doubts, and his good-looking fingers quickly tapped on the keyboard, searching for the files on his computer's hard drive.
It didn't take long for her to find a familiar file name with only three abbreviated letters on it - LDY.
Chu Yanhuan had a shocked look in his eyes, and he quickly clicked on the folder with the mouse.
In the folder, she not only found the account she used and the information related to hacker L, but also found some investigative information about the car accident five years ago.
Why was Li Siyan interested in the car accident five years ago?
He was neither a prosecutor nor a victim, so what was he doing collecting so much information about the car accident?
I heard that he is the old son of the old man Li, and he is particularly favored in the Li family, and it is said that he has been studying abroad since middle school, and only returns to China every winter and summer vacation.
They shouldn't have any intersection, why did he collect clues about the scene of the car accident, why did he pay attention to hacker L, and what was his purpose?
Chu Yanhuan stared at the computer screen and thought for a long time, and suddenly a flash of inspiration flashed in his head.
Don't...... Is he the boss behind the scenes who wants L and threatens to take L's life?
Chu Yanhuan thought of this possibility, and a cold murderous aura gradually condensed in his eyes.
If it was really him, then he was the murderer who indirectly killed Chu Yange!
And she will never let go of the murderer!
Chu Yanhuan's hand holding the mouse tightened, and he looked through another folder again, and found that there were many folders named in foreign languages, and the only folder named after Chinese characters was particularly conspicuous.
The name of the folder is Underground Fighting Arena.
This is the most famous underground fighting arena in Hwaseong, which brings together the strongest fighters and boxers from all over the world.
The underground fighting arena is a black boxing trading place on the edge of the law, which receives many gamblers every day, and the liquidity of each match is as high as hundreds of millions of yuan.
However, no one knows who the boss behind the fight ring is, and all the affairs of the fight ring are handled by a man named Lu Liangchuan.
In addition to the accounts, there are also detailed information about the fighters in the folder, and one of the fighters' information has a note on the back of the "Amnesia from the car accident five years ago".
Chu Yanhuan stared at this line of words, and the expression in his eyes changed several times in an instant.
This man wasn't generally interested in the car accident five years ago!
She pulled the corners of her mouth coldly, scanned all the information at a glance, and after noting down the location of the fighting ring, she crossed out the documents with her hand.
In order to prevent being detected by Li Siyan, before shutting down the phone, Chu Yanhuan quietly implanted a virus into his computer.
As soon as he turned on the next time, the virus activated immediately and quickly infected his computer.
At that time, all the data in it will be erased, and the hard drive will be automatically formatted and restored to factory settings.
The traces of her use of this computer will also disappear.