Hk022 Bet
Feng Ke looked around the security company, and the technicians headed by Ma Yong looked very ugly.
Steal the teacher!
Shi Lei insulted them like this!
Even with Ma Yong, an old fritter who has been in the workplace for more than ten years, he can't help but feel a little angry. "Mr. Shi, in this way, you will be able to restore all the data in our server?"
Shi Lei nodded proudly, "Of course!" [
"If the law is restored, what should I do?" Ma Yong sneered: "You don't have to pay taxes when you talk big! It's like farting, let it go, and forget it!"
Shi Lei raised his brows, "If I restore all the data, what should I do? Don't say apology! Your apology is not uncommon for Brother Stone!"
Ma Yong hesitated for a moment, but Shi Lei was too young, too young to believe, he did possess excellent skills! "Mr. Shi, what do you say? After all, Mr. Shi, you are still a student!"
Ma Yong squinted at Shi Lei with a sarcastic tone. The words even revealed the taste of bullying Shi Lei's poor youth!
Shi Lei rolled his eyes, looked at Feng Ke and said, "President Feng, I can help you restore the data on the server! However, given the situation of your server, the data recovery fee this time is a bit expensive!"
Feng Ke said with an expression: "How much?"
Shi Lei raised three fingers, and the lion opened his mouth and said, "Thirty thousand!"
"No problem!" Feng Ke didn't even blink his eyes!
Shi Lei muttered to himself in his heart, could it be less?
Although a little regretful, Shi Lei is not the kind of villain who sits on the ground and raises the price. He turned to look at Ma Yong. "Director Ma, why don't we bet the 30,000 yuan! If I restore the data, you can give me another 30,000 yuan!"
Ma Yong hesitated.
Shi Lei sneered: "Director Ma, don't you dare?"
"What dare you not!" Ma Yong raised his head and said in a mocking tone: "However, Mr. Shi, if you can restore the server, as a poor student, how can you pay me 30,000 yuan?"
Before Shi Lei could speak, Sun Feng took the initiative and said, "I'll pay for Shishi! Although I just opened a small repair shop downstairs, I can still afford it for 30,000 yuan!"
Shi Lei looked at Sun Feng moved, "Brother Feng, thank you!"
"Stone, we've known each other for several years. If you lose this time, you'll have to work for Brother Bai in the future!" Sun Feng joked.
Shi Lei nodded heavily. "President Feng, you all go out! I'm going to start restoring data!"
Feng Ke did not hesitate, and directly greeted the people from the t department, as well as Sun Feng, and went out together.
Shi Lei stopped him and said, "Brother Feng, what are you doing out there?"
Sun Feng was stunned for a moment, then he laughed and stayed.
When Feng Ke took the people from Department T and went out, Sun Feng asked, "Stone, are you sure you are?"
Shi Lei laughed and took out his USB flash drive. "Brother Feng, didn't you see my strength last time?"
Sun Feng pouted, "Last time? Last time, it took you nearly four hours to restore 62 photos, right? What kind of strength is this!"
Shi Lei rolled his eyes, "Brother Feng, I really don't know you, you don't have any technical knowledge, how can you support the repair shop! Tell you, the reason why it took so much time last time is because I don't have a ready-made recovery. Software! Four hours, more than 90 percent, I was writing data recovery software!"
Sun Feng said suspiciously: "Stone, do you mean that it won't take too much time to restore the data this time?"
Shi Lei nodded casually, "Brother Feng, find a computer and play minesweeper! I'll restore the data first!"
Sun Fengnai nodded, minesweeping or something, really annoying!
Sitting in the swivel chair, Shi Lei first opened the server's security policy, made some changes, and then used antivirus software to successfully contain the lurking malicious virus. Next, insert the USB flash drive into the USB port of the server, and then directly run the 'deep recovery' software written by himself in the USB flash drive.
To be honest, Shi Lei didn't know how many data files were deleted in the servers of Look Around Security. It is estimated that if you ask Ma Yong, the guy will not tell Shi Lei, and even ridicule Shi Lei. However, Shi Lei did not intend to ask.
Although he didn't know what files needed to be recovered, Shi Lei had his own way. In-depth recovery written by Shi Lei himself, some of the modules apply the new theory in 2012.
In the era of 2006, this is simply a fantasy!
For example, delete the file timeline technique.
Deepin Recovery software will firstly establish a timeline based on the time of deletion of all files.
For example, for the file, the deletion time is January 1, 2006; for the b file, the deletion time is February 2, 2006; for the file, the deletion time is September 9, 2006. Then, delete the file timeline, there are three points, the first January 1st, and the last September 9th.
As long as he has this timeline, Shi Lei can find out the specific time of the recent large-scale deletion of files.
Before a malicious program repeatedly copies and deletes junk files, it will first delete all stored files on the server. As long as you find the specific time of the first large-scale deletion of files, you can use this time point as a benchmark to restore previously deleted files including this time point.
As for the deleted records after this point in time, Shi Lei will only randomly select some recovery records, and then check to see if they are junk files before making a judgment.
Looking around the security server, it does not use non-x86 servers, but uses general x86 servers, and only belongs to department-level servers.
The main difference between the so-called x86 server and the non-x86 server is the instruction set, which can also be said to be different in the operating system.
The x86 server is commonly referred to as the p server. In general, the x86 server uses the ntel processor and the winws system, and uses the s complex instruction set.
This kind of server has a wide range of applications. Although the compatibility is good and the price is cheap, the shortcomings are also very obvious, the stability performance is poor, and the security performance is even worse! [
Non-x86 servers generally use the rs reduced instruction set, and some use the ep parallel instruction code.
This type of server is a high-end thing!
They are expensive, closed systems, and at the same time have good stability, excellent performance, and a high degree of safety. Mainly used in the core business of large enterprises. For example, the financial industry, the telecommunications industry, the absolute giant industry!
x86 servers, roughly speaking, are divided into four levels.
Entry-level servers, such servers, actually have little performance gap with ordinary personal computers.
Even some small companies and small businesses simply buy a high-performance personal computer to act as a server.
For example, the two machine emperors that Shi Lei saw in Sun Feng's repair shop last time can be used as entry-level servers.
The second level of servers, workstation servers. Although workstation servers are more powerful than entry-level servers, they are still low-end servers after all!
The third level, the medium server, is the department-level server currently being used by Surround Security. This type of server has high performance and high price, and is often used by medium-sized enterprises. Independent departments of large enterprises also often use servers of this grade.
As for the fourth-class enterprise server, it is actually a real high-end server. Servers of this level are generally non-x86 servers, and most of them use the lnux system or the unx system.
In 2006, enterprise-class servers were usually only used by large high-tech enterprises.
Shi Lei muttered to himself contemptuously while looking at the timeline of the deleted files. "What a stingy. A large enterprise that is close to high technology actually uses a department-level server! I thought it was an enterprise-level server. I can leave a backdoor and borrow computing resources. I didn't expect it to be a scumbag!"
Sun Feng was on the side, working hard to sweep mines, and when he heard Shi Lei muttering, he said casually, "Stone, what are you talking about?"
Shi Lei said quickly: "Nothing! The data will be restored soon!"
Sun Feng was taken aback and looked at the time in the lower right corner of the computer, only ten minutes had passed. "So fast?"
Shi Lei said, "How fast? If it wasn't for looking around the security junk servers, it would take at most five minutes! The amount of data they have is very small, just some customer information and financial statements. There is not much data."
Sun Feng stared at the USB flash drive plugged into the server's USB port, as if he was looking at a peerless beauty. "Stone, for such an easy job, how dare you ask for thirty thousand?"
Shi Lei snorted, "Brother Feng, there is an old saying, those who are difficult will not, those who will meet are not difficult! I have mastered this technique, so you feel relieved! If you hand it over to other data recovery studios, although they can recover, But they need at least a week, and the price is definitely higher than me! I have less time to restore data than others, and the fee is lower than others, very kind!"
Sun Feng looked at Shi Lei enviously, "Stone, you still have a bright future in terms of technology!"
Shi Lei smiled and said, "Brother Feng, wait a while without your benefit!"
On the monitor, in the Deepin Recovery software interface, the recovery is complete. Shi Lei pulled out the USB flash drive, put it in his pocket, walked to the door, and shouted. "President Feng, it's done!"
Feng Ke walked over quickly, and there was another person who was faster than Feng Ke. This person was Ma Yong!
After Ma Yong ran in, he immediately sat down in front of his computer and started to use the internal management software to inquire various information from the server.
No matter what he queries, all the data is clearly displayed on the display!
"How is this possible! It's only twenty minutes in total! Impossible!"
Ma Yong roared in disbelief!