Su Ye can lock Flender's computer at any time.

But how can I control the comments in the post?

If Flender's post just now cannot be deleted, William will soon find that Flender has locked the computer by himself.

He has seen it in the post.

Just now Flender invited William together to deal with Qingyun Technology's official website.

As for the third step, it doesn't matter if it is a little late.

Now the most tangled is the second part.

Although Su Ye is capable enough, he has never tried how to attack a website.

After thinking about it, it should be to obtain the identity of the administrator, and then attack... maybe.

At that time, if you have management rights such as posting and deleting posts, it should not be a problem to completely delete this post.

You can even log in to Flender's account directly.

Delete all the messages just now.

After thinking of an idea, Su Ye started to act.

This time, he still intends to borrow the name of Han Huang Chen Yi.

After locking Flender's computer, a dazzling crown appeared on Flender's computer out of thin air.

Here is Su Ye's message:

【Anyone who offends my Dragon Han Tianwei will be punished no matter how far away】

"Wtf, what the hell is going on."

"Who made a tattered crown on my computer."

"Also, what does this string of Long Hanwen mean?"

Flender could only be helplessly furious.

At this time, Su Ye, after locking Flender's computer, logged into his account, and deleted all the posts involving words such as Longhan and Qingyun Technology.

After completing these tasks, Su Ye had a flash of inspiration.

He also changed the password of the forum.

You're done.

This matter seemed difficult, but Su Ye felt very relaxed when he performed it.

It would be great if all the hackers we encountered in the future could be solved so easily.

The next step is to track down William's whereabouts.

However, because William had never attacked the websites of himself and Qingyun Technology, at this time Su Ye could not obtain the operation records of the other party at all.

And if you get it from Animal Husbandry, you need Su Ye to obtain the administrator authority of the website.

Although it will never be a fluke, this animal husbandry home is a real forum for people to provide breeding knowledge and exchanges with the same industry.

It is very likely that it is the task release platform of that mysterious organization.

Wanting to attack such a well-defended Fangzhan in a short period of time, Su Ye didn't think he could do it soon.

It will even scare the snake.

It seems that now he can only rely on his own manual methods to track down William's trail.

Su Ye closed several software, leaving only one software that reminds the firewall of an attack.

This is to avoid excessive consumption of the computing power of your computer's CPU when running those software.

At this time, Su Ye was very fortunate that he chose to buy a computer worth 80,000 yuan when he started the company.

Sure enough, in this world, you will be rewarded for your efforts, if you don't see any rewards now.

It's not that God is treating you badly.

It might just be that you need to work a little harder, or be a little more patient.

God rewards hard work.

In the future, we will continue to implement the current policy of being friendly to employees.

Didn't Li Ming call him immediately when he realized that he was being used by someone?

Although this is just the reaction of one person, it represents the mentality of most employees of Qingyun Technology.

Work hard every day so that your talents can be utilized, and at the same time be worthy of the wages and bonuses Su Ye gave them.

In the current Qingyun Technology, the monthly income of the most ordinary employees can reach more than 6,000 yuan steadily.

In Jiangcheng, where the average salary is only over 2,000, it can definitely be regarded as a clear stream in the business world.

As for the person who leaked the company information, Su Ye is still waiting.

Perhaps the other party was collecting key evidence that Zhou Zihang used Li Ming to steal commercial secrets.

That's right, Su Ye is like this.

Always look at the world with a kind heart.

However, Su Ye will never be polite to those who are not worthy.

Such as Flender, Ivantov and the soon to be found William.

Speaking of the name William, Su Ye thought of a song he had heard before called William Castle.

If he remembers correctly, this song is a typical British style song.

So, this William is British?

Su Ye summed it up and decided to narrow the scope.

After all, most of the countries in the world where hackers are more famous are people from Europe and America, rather than looking for a needle in a haystack by themselves.

It's better to gamble on luck.

Now narrow it down to one country.

As a veteran capitalist country, England has a few powerful master hackers hidden among the people, which is entirely possible.

To understand this, Su Ye will directly transfer to the England telecommunications department (I don't know if there is one).

He now knows the conclusion, the other party is William, and he has logged on to the website of the animal husbandry home just now.

If the network signal record of the other party's browsing and posting can be found in the process, then the reverse search can basically determine who William is.

The time in England is about 8 hours later than the time in the imperial capital of Longhan.

It should be in the afternoon.

As we all know, the people in England don't work as hard as the people in Longhan.

They need leisure, need and afternoon tea.

This kind of living habit is something engraved in their bones, just like the diligence of the Longhan people.

Flender sent William a message just now, and the other party did not respond to two consecutive messages.

This is absolutely impossible for a hacker if he sees the no-reply message.

For half an hour before and after, the other party did not respond at all.

Su Ye boldly guessed that William must be caught up in something important.

How did he know, it was because the task time was still long.

William has already achieved financial freedom and freedom in life by relying on his own hacking skills.

At this time, I was watching TV in the living room with my family.

"Fuck!"

"This information flow is huge."

Su Ye was amazed.

Unlike the Internet users of the Longhan Empire, if the Internet users in England want to go online, the products of their country are, to be honest, lackluster.

To put it bluntly, there are not many Internet companies in England.

They need to use a certain social software in Germany for a while, then they need to use a certain application program in France, and finally they need to use the input method and browser of the beautiful country.

Only in this way can the normal Internet access function be realized.

This is why Su Ye said that the information flow is relatively large.

The main thing is that the information requests and acceptances across are overwhelming.

In contrast, the domestic Internet industry in Longhan has just started.

However, because of the vastness of the land, the abundance of resources and the multitude of people, various Internet products already exist.

Portals, search engines, game entertainment, instant messaging, etc. are all available.

Although these products may seem relatively immature to foreigners, the netizens of Longhan are also very immature.

Coupled with the speed of cross-border Internet access, even a wealthy local tycoon like Su Ye can't bear it, let alone ordinary Internet users.

Therefore, in Longhan's country.

It is very easy to find a piece of international information, because everyone seldom visits foreign websites.

Su Ye had a headache, but took the time to use the thinking editor to make a software for classifying information flow.

Just like narrowing down the scope just now, let’s first gather together the individual data information that England sent to request the beautiful country to receive.

Then filter one by one.

As the saying goes, thinking determines the way out.

When Su Ye clicked to start screening, the software had already found it within 5 minutes.

A communication request was sent from England, and the Meiguo Animal Husbandry Home was responsible for receiving a total of 11 messages.

"It's done!"

"Now even if William cannot be found, other members of that mysterious organization can be found."

"William is the priority, though."

Su Ye began to analyze the 11 pieces of information one by one.

This is wrong, I only browsed for 11 seconds before exiting, and then entered a chess and card website to play games.

This is not right, Su Ye could see that the other party really asked a question about animal husbandry after entering the website.

"Four cows in my pasture have common limb and foot disease. Two of them have recovered, but the other two can't be cured anyway. Do you have any good suggestions?"

Su Ye originally thought that such posts would be deleted by the background management staff of the mysterious organization.

In the end, he didn't expect that the other party actually replied.

"Because the occurrence of limb and foot disease is often closely related to the breeding environment, environmental management should be the first step. On the one hand, the inspection of cow bed nails must be thorough..."

This, I am stupid!

This reply was so professional, Su Ye couldn't help but sigh in his heart.

It is also too difficult to be the background administrator of a mysterious organization.

If Su Ye wanted to build a website that could hide his whereabouts in the future, he would definitely choose to make a game or an online forum as a cover.

After almost 10 minutes of screening, 3 IPs were finally determined.

These three IPs all entered the animal husbandry house about half an hour to an hour ago.

Su Ye saw that the other party not only directly participated in Flender's reply to that post, but also chatted with someone in another post.

It's just that Su Ye couldn't find another post.

In order to verify, Su Ye went back to Flender's computer to see his operation path just now.

Sure enough, this guy also has a record of entering another thread multiple times.

But, that post just disappeared.

Su Ye turned her head and glanced at the wall clock on the wall. It was almost nine o'clock at this time.

If you don't hurry up, the other party may return to the computer at any time.

Su Ye directly broke into the opponent's network.

These three IPs are consecutive numbers, and Su Ye estimates that there are three interruptions in the same LAN.

Foreigners still know how to play, one person operates three computers.

Su Ye felt that he could catch the opponent all in one go.

As a relatively staid and cautious Englishman, William has the same advantages or habits as others.

He will not be like that arrogant guy Flender, who thinks that he is invincible, just set up a firewall and pull it down.

At the entrance of the network, William set up two strong firewalls.

At the same time, two firewalls are also set up at the network distribution port of each computer.

In other words, if Su Ye wanted to break into William's computer, he would need to break through at least 8 firewalls before he could enter the other party's computer.

More importantly...

In order to avoid this kind of situation where his computer would be attacked when he was not at home, William, a master of bridge construction from Niujin University, is a master.

Let the firewall siren on the computer connect to every appliance in the house, including his cell phone.

As long as someone attacks, the computer will turn on the switch to inoculate a certain electrical appliance after 15 seconds without William's response.

If there is still no response after 30 seconds, the computer will send a text message to William's mobile phone asking him to go home and a friend is looking for him.

Unfortunately, when Su Ye was looking for the core of William's Firewall, he found this siren.

Do you want to change the alarm program for the other party?

Su Ye thought maliciously.

But this is something to wait for. Now we have to make a software that can block the alarm program.