Defect another world

Chapter 417 Accident!To be caught now?

Chapter 417 Accident!To be caught now?

The complete desktop is displayed immediately.This employee obviously has a desktop cleanliness, and there is almost nothing on the desktop except "My Computer" and "Browser".

Meng Fei's manual "hacking" operation is to hack the customer service system. He wants to find the information of those players who have experienced the "twelve hours" nightmare in the game like him.

Although this office area is not a customer service department, it is also a common operation for operators to log in to the customer service system to check user feedback.

It's hard to say just the web page address of the customer service system.Without special training or instruction manuals, it is impossible for him as a "new employee" to learn by himself as soon as he comes in.

Fortunately, he has supernatural powers.

"scanning."

Suddenly all the character strings in the entire PC flashed in his mind.He grabbed some keywords.

"customer service".

"customer feedback".

"Stuck".

"complaint".

Wait, after some filtering, he found something from the URL history of the browser, and after opening it, the Cloud Leopard Entertainment "VoC" system appeared on the screen.

Continue to search.

"BUG Name: Twelve Hour Nightmare."

"Feedback channels: in-game complaints, telephone complaints, and website complaints.

"Number of complaining users: 31.

"Symptom:
"A very small number of feedback players claim that the system will freeze for 3-10 seconds when the game exits.

"When players describe system card owners, their consciousness is confined in the game system and cannot leave the game, and they experience a long wait ranging from a few hours to dozens of hours, during which they have a strong sense of panic.

"All players only appeared once, there were no players who reported this bug multiple times.

"On June 8021, 6, a post appeared on the Peak Game Forum describing this phenomenon in detail, calling it a 'twelve-hour nightmare'.

Some malicious and rhythmic players and competitors’ malicious operation hype caused a great negative response to this matter, causing a certain degree of panic among players, and the monthly activity of players fell by 10% that month.

"At present, the author himself has deleted this post. We have also contacted other websites for reposting, and it has been deleted.

"Processing Status:
"(1) The test team could not reproduce.

"(2) Some players have been contacted, and it is found that most players refuse to cooperate with the investigation, and a small number of players cannot be contacted.

"(3) The only two players who cooperated with the investigation were tested on the equipment and reproduced the environment, and found no problems with the software or hardware, and failed to reproduce the BUG.

"Follow-up plans:
"The authenticity of this BUG is doubtful, and the possibility of malicious players complaining about defrauding compensation or competitors deliberately fabricating incidents cannot be ruled out.

"Continue to observe. If complaints continue to increase or if reproducible players are found, we can continue to investigate."

The idiots of the Yunbao Group really didn't expect the problem to be in the hardware.

In fact, it was the same with Meng Fei.He has encountered countless software bugs in his life.But what about hardware bugs?not a single one.

Most people suspect that there is only one reason why there is a BUG in the hardware, and that is that the root cause of the problem has not been found for a long time, and they have no choice but to blame it.

If it weren't for the superpower of "scanning", and the chip of the Chiwu people was not as tightly sealed as the ionized nucleus of the Lynx Group, it would be absolutely impossible for him to break open the chip of the Chiwu people and find something wrong inside.

And with things like BUG, ​​no one can tell whether it is intentional or unintentional.

Qingmang is now using chips designed and manufactured by Taotie people, Chiwu people, Xiezhi people, and even Hinoshima people from the country to the people.

If they have been like this, then it is not surprising that all kinds of bugs in these chips broke out at the same time when the war broke out.

At that time, everything was paralyzed, and he still played with a ball?

"It seems that this matter has nothing to do with Yunbao Entertainment. It's just that the Chiwu people tampered with the chip?"

Meng Fei pinched his chin and thought.

His conclusions don't necessarily hold.Because neither the customer service department nor the technical department that comes to investigate customer complaints may know the whole picture of the matter.

If someone from the top management of Yunbao Entertainment is doing some secret experiments with Renyi Institute, they will not let the people below know.

The attached form below is a detailed list of complaining customers.

Most of the complaining users have a user ID, in addition to a mobile phone number to contact, and no other information.But for Meng Fei, having a mobile phone number is enough to find these people.

Several players did not provide cell phone numbers.There are only 27 mobile phone numbers in this information.

The computers here can neither connect to the external network, nor even have a USB socket, and can't even insert a USB flash drive to copy files.

In order to keep their user information, Yunbao Entertainment has really done the ultimate in preventing data leakage.

If there is any loophole, it is the mobile phone screen capture.People like Meng Fei only need a dozen or so mobile phone numbers, which can be displayed on the screen, and a photo can be taken away.

At least the kind of thing that tens of millions of game player data is stolen at one time will definitely not happen.Unless armed robbery, directly carry away the machine.

Meng Fei didn't need to take out his phone to take a picture.

"scanning."

After a scan of his system, these numbers were copied into the system like a data file.

Wait, what is this number?

Sure enough, as he expected, among the 31 users, one number was the mobile phone number used by Fan Bu that he had seen in the file!
Fan Bu's mobile phone number was recorded in the file.And the entire case file was scanned into the system by him.Keyword search comparisons can be found immediately.

This shows that there may be a certain relationship between the "twelve-hour nightmare" phenomenon and Fan Bu's "superpowers make games become reality".

The investigation of the case is in the right direction.

After everything was over, Meng Fei was about to lock the screen and leave when he suddenly heard a rather surprised question from behind.

"Excuse me?"

No way, is there someone behind?

Someone actually came back?
It's only five minutes past eleven, and the meeting has only started for five minutes. Why did you come back?
This unscientific!

It's like being caught!
In fact, the office worker standing behind Meng Fei thought it was unscientific.

Five minutes after the meeting started, he found that he had forgotten the VGA-to-HDMI adapter, and the laptop could not be connected to the projector.

In such a company that is careful about data security and even prohibits the use of wireless screen projection, such troubles cannot be avoided.

But when he came back, he saw a young man with curly hair and a beard sitting majestically at his desk, still looking at his computer!

This has never been seen before in his many years of moving bricks.But the first thing he thought of was not that someone was stealing data, but he thought in panic: Could it be that I was fired suddenly just now, is this the person who came to replace me?

Although it is said that one month's notice is required for layoffs, it is common to take over your computer and let you go immediately at the moment of notification.This can prevent employees from doing retaliatory things in the final stage, such as "deleting the library and running away".

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like