After discussion, the carrot alliance decided to put the money into the cold bird's account first, and there was nothing else they could do at this time. Besides, the cold bird's tone and sugar-fried chestnut attitude made them more confident that their data had been copied.The transaction data is archived and stored, and the transaction money is then transferred to Cold Bird's account, and the transaction is completed as long as sugar fried chestnut hands over the details of the loophole and the copied data.
10 million dollars to buy a loophole, for the Carrot Alliance, a bit of a loss, but after seeing the power of the loophole, they feel that the money is well spent. As long as this super-heavyweight loophole is available, they can convince more forces to support the carrot's big platform strategy, and even bring in those institutions that have the right to set Internet protocol standards. General loopholes, if not on the hardware, or on the protocol.
When the cold bird saw the money in the account, it quickly took a picture and sent it to the second master at the first time.
Hu Yifei was dizzy and did not expect that gold would really fall from the sky. He rubbed his eyes, rubbed and rubbed his thighs, and he believed that he really had 10 million yuan, but at present the money was still lying in other people's accounts. Hu Yifei called it a regret. Why should he put his own money in other people's pockets? it's so unreliable.
He quickly passed on his prepared loophole data and "copied data" to Sugar Fried Chestnut and said, "you give it to the carrots, and I'll find you when I'm done with the account!"
With that, Hu Yifei directly turned off his phone and rushed out of the dormitory to open an account at the bank. When he got out of the building, he found that he had lost track of time. It was dark for a long time now, and the bank was already off duty at night.
He had some movement at this time, and he couldn't sit still when he went back, so he called Liang Xiaole and asked Liang Xiaole to come out and accompany him for a walk.
Cold bird staring at the name of this compressed file called "loophole data", the chicken is shaking, it is this loophole, can step through the ZM 107level within an hour, can make overbearing carrots bow for peace, can scare super hackers into impotence, premature ejaculation and hemiplegia, now, it is placed in front of themselves, do you want to open it or not?
Cold bird's heart is very tangled, the second master did not hesitate to give him the loophole information, how much trust, the loophole is to be sold to carrots, how can he peek, but the cold bird really can not resist this temptation, he wants to know, in the end what kind of loophole, can be so strong.
"maybe the second master gave it to himself just to show it to himself!" In the end, the desire for the god of war came to mind, and the cold bird decided to open the package and take a look.
When he clicked on it to understand the compression, the compressed package immediately became two files, one or the compressed file, whose name had not changed, also called "loophole data", and the other was a text document called "File description". The cold bird opened it and wrote: "the file is more important, so I have compressed it a few more times, so please rest assured to decompress it!"
Cold bird on the forehead sweat, the second master is really talented, important files to engage in multiple compression, you directly encrypt ah, think so in your head, but the hands are not idle, he continues to click on the decompression, who knows inside or those two files, a compressed package, a file description.
Decompress for more than ten times in a row. It's still the same. The cold bird was so anxious that its palms began to sweat. It feels like that endless wrapping paper. It took a long time to tear it down. I didn't see what was inside.
Death sent a message at this time. Urged to ask: "Bird God." When will the data on loopholes in sugar fried chestnuts be transmitted? "
The cold bird was startled. I wiped my sweat. So I passed this compressed package to death. After that, he settled down. Take a few deep breaths. Continue to unwrap the wrapping paper. In the end, I was numb when I took it apart. It was only then that I finally saw that what was decompressed was not a compressed package. Into a text document. One is called loophole data. One is called data backup.
"Goo!" The cold bird moves again. There was a strange sound in the throat. He opened the loophole with a tremble. It was set in front of the computer at that time.
The loophole steps are clearly written in the file: "Please move the mouse to the lower left corner of the screen." Click the start button. Select 'turn off computer'. Select close from the pop-up menu. The shutdown can be performed. Note: this vulnerability applies to Microsoft operating systems. "
The cold bird almost fainted in front of the computer. This is a real loophole. The best in the loophole. He hurriedly opened the "data backup" again. It was written inside: "guarantee: I now guarantee." In the process of hacking into the carrot database server. No data copy operation has been done. All the data has been emptied. I also did not peek at its data content. The above content is true and effective! "
"poof." Cold bird spurted out a mouthful of blood, fainted on the keyboard, he hated it, why the second master will be so …. What about humor?
In the carrot alliance, several senior officials lay on the conference table, watching death hurriedly decompress and decompress, almost dazzled, and they would definitely leave if it were not for the temptation of the general loophole to support them.
Finally, death gasped for breath, the file was finally decompressed, and the calm boss approached a few points at this time and signaled death to open it.
"Why?" When the first document was opened, someone exclaimed, and then the conference room fell silent.
Then open the second file, "huh?" There was another cry of surprise, and then there was silence again.
All the people are stupid there. Look at me, I look at you, they all look incredible. How is it possible to buy a shutdown guide for Microsoft system for 10 million dollars and a guarantee that they have not even signed their names? this is not an illusion, is it?!
"Boo!" Death hit the table with a punch, then shook the computer screen in front of him and roared angrily, "who can tell me what's going on?" Where is the loophole data I asked for? " In the fury of death, he directly picked up the monitor and hit it on the floor with a bang. "my 10 million, I bought such two words of nonsense!" It's too much to deceive others! "
The conference room was silent, and it was obvious that everyone was teased by the sugar-fried chestnut, and everyone looked at the boss, hoping that he would come up with an idea.
The boss sat there, his face cloudy and sunny, and it was obvious that his heart was doing strenuous activity. after half the sound, he stood up gloomily and said, "contact the Atomic Energy Agency immediately and say we can provide clues to the intruders."
"Sugar fried chestnuts are so haunted that hunters may not be able to catch him!" Death understood the meaning of the boss, but found it difficult to work.
"one hunter may not be good, but a group of hunters may not be bad!" The boss was ruthless, and he had never been teased like this before. "just say that we know that someone has a general loophole and can hack into any device on the Internet. We carrots are willing to take out our hacked two servers for hunters to study, and we will provide all the clues we have!"
"it's easy to do!" Death clenched his fist, "but we don't have any information on sugar fried chestnuts!"
"We don't, cold birds do!" A glimmer of hostility flashed in the boss's eyes. "also, sugar fried chestnuts will appear at the Wolf Summit, this is the clue!"
Death was suddenly enlightened and said, "I know what to do!"