Chapter 141: Psychological Suggestion Can Kill!

Yang Weifei did not hesitate, took out his ID card and driver's license from his bag, and handed them to Hao Feng.

Hao Feng put them on the table and patted them with his mobile phone.

Lu Lingling quickly browsed the contents of Yang Weifei's laptop and found no hacking software.

But she took care to write down the computer's model and other technical parameters.

Then stood up, opened the wardrobe in the bedroom, and checked Yang Weifei's clothes:

"Director Yang, how many clothes do you have? Too little, right? ”

Lu Lingling asked while looking for the clothes worn by the "wild wolf".

Yang Weifei replied with a smile:

"Men don't have a lot of clothes, unlike you women, who have a lot of clothes. But no matter how much it is, it's not one less. ”

All three laughed.

As expected, Hao Feng and Lu Lingling did not see anything they were looking for, such as fake ID cards, other driver's licenses, masks, head coverings, Ji Xiaomei's clothes, etc.

"Director Yang, I'm sorry to bother you, let's go."

Hao Feng had no choice but to say hello and leave.

Driving on the road, Hao Feng sighed:

"This guy is too sophisticated, and his IQ is absolutely high."

"But even though one thing has not been found, the suspicion that he is a 'wild wolf' has not been ruled out."

Lu Lingling said: "I'll go back, check his ID card and driver's license, and see if there is any situation?" ”

Hao Feng shook his head and spoke:

"He's so cunning that he won't leave a flaw in this."

"It seems that you still have to work detecting hackers and deciphering the files in Cao Xingwang's computer, otherwise it will be difficult for us to catch this cunning 'wolf'."

"Okay, go back, I'll focus on conquering this fortress."

Hao Feng and Lu Lingling returned to the unit and went to find new clues.

Lu Lingling walked into her office, turned on the computer, and immersed herself in hacking techniques.

After studying for a while, she felt that there were many techniques she didn't understand, so she called Zhu Jianjun, director of the Internet Investigation Division of the Public Security Bureau:

"Zhu, are you making progress here?"

She has entrusted this work to the Cyber Investigation Division to assist in the investigation.

Zhu Jianjun replied: "Not yet." However, it is certain that Cao Xingwang and Lin Debin's computers have been hacked. ”

"Also, the county government's surveillance system has been hacked three times, which is also the work of hacking software."

"But we searched and searched, and we couldn't find where the hacking software came from. No hacking software was found in the computers of the 19 computer masters in the county government, and no trace was found. ”

Zhu Jianjun was a little ashamed and said:

"This shows that this hacker's computer technology far surpasses ours, and he also has quite a lot of experience in counter-reconnaissance, which makes us dizzy."

Lu Lingling hung up the phone and called another computer expert to ask:

"Professor Lin, let me ask, how does the hacking software remotely control the other party's computer?"

Professor Lin is a newly invited doctoral student in electronic software from the Cyber Investigation Department, named Lin Xiaobin.

Lin Xiaobin, who is 35 years old in Chinese New Year's Eve, went abroad to study for a doctorate, and after graduation, he returned to serve the motherland and became a professor at Nanjiang University.

After Cao Xingwang found a hacker in his computer, the Cyber Investigation Department asked him to help.

But he worked hard to detect this hacker, and five days later, no clues were found, and he also felt very ashamed and uneasy.

"Lu Jian, I can't tell you on this phone, come over and I'll teach you in person."

"Okay, Professor Lin, I'll come right over."

Lu Lingling hung up the phone, said something to Hao Feng, and went down to drive to the Public Security Bureau.

When she arrived at the Public Security Bureau, she walked directly into the office of the Internet Investigation Department and asked Lin Xiaobin for advice.

"Land inspection, hacker software is this way to remotely control the other party's computer system."

Lin Xiaobin operated on the computer to show her, and Lu Lingling sat down beside him and looked at the computer screen seriously.

"This is a powerful hacker simulation software, which can simulate the process of hackers operating the computer like in the movie, including typing code and appearing a variety of tall pop-ups, and you can customize the code color, background and Lo whimsical o pattern."

Lin Xiaobin used a hacker simulation software to demonstrate to Lu Lingling:

"When watching movies on the Internet, we can see this hacker operating system, when hitting the keyboard, some data is rapidly rotating on the computer, it is really handsome, this software can be said to be a full 'flirting artifact'!"

"How? The first step is to open the installed eektype

On the main interface, we can see the operation tips on the upper left and the function buttons on the right. ”

"When you first start using it, you may be a little confused, we can click "F2" according to the prompts, and the help interface will pop up, showing the role of each key, and you can start the operation. ”

In the second step, there is a "" ☰ button in the lower right corner, click it to enter the settings interface, where you can modify the text, color and format of the interface. ”

"The third step, click on DLData in the upper right corner, and you will see an interface similar to the one in the movie that is being downloaded. After clicking on it, various data will appear. You can also type code, and then you can become a hacker and be able to hack and manipulate each other's systems. ”

"Oh, that's how it works."

Lu Lingling picked up the mouse in surprise and followed Lin Xiaobin's prompts to operate it again:

"In this way, that computer master compiled hacking software to hack Cao Xingwang's computer, and he could see the password of his mailbox, and then open his mailbox and see his email."

"Yes, he can also use his personal name to send an email to Cao Xingwang."

Lu Lingling stopped the operation, looked at this handsome young professor, and discussed with him:

"If this computer expert finds top-secret emails in Cao Xingwang's mailbox, for example, a person with special connections who sends him emails about economics and women, he can use this person's identity to intimidate and threaten Cao Xingwang, suggesting or even forcing him to commit suicide by jumping off a building."

Lin Xiaobin nodded and said:

"It's entirely possible! I studied psychology in college, and I know that psychological suggestion can also kill! ”

"There's an example of this, and this is a case that happened in the United States."

One night, a couple of college students took advantage of his friend's unpreparedness and wrapped him in cloth bags and carried him to an abandoned railroad track at a nearby train station. They hid to the side, and none of them spoke, hiding from the side to watch the joke. The man in the sack was so frightened that he could feel himself being placed on the rails. ”

Soon after, the train left the station, the earth began to shake, and the man heard the rumbling of the locomotive. Several college students saw the person in the cloth bag writhing desperately, and when the train got closer and closer, they suddenly saw that the person in the cloth bag did not move. ”

The students came to the side of the cloth bag and opened it to see that his friend had been scared to death.