Desperate Hacker

Chapter 192 The Job of a Data Scientist

Chapter 192 The Job of a Data Scientist

"Mr. Chen, everyone is asking if you have to work overtime tonight?"

When Chen Qingfeng was suddenly interrupted by someone else, he suddenly raised his head and realized that the surroundings had become dark.

Chen Qingfeng looked outside. At this time, the lights outside were starting to come on.

"what time is it?"

"It's almost 7 o'clock!"

"We don't need to work overtime in our company. You can go back and spend time with your family!"

"But you are still busy here, we..."

"Don't worry about me. I'm not all busy with work. I told you at the beginning that our company doesn't work overtime. I told you not to worry about me. You don't need to accompany me today! By the way, help me turn on the lights!"

Liu Nan turned on the light uneasily, and then slowly exited the office.

At this time, everyone standing outside was watching his every move.

I saw Liu Nan looking at everyone with a serious expression at first.

Then he raised his only hand and suddenly waved it.

For a moment, everyone's faces showed excitement.

Then not long after, the office area was empty!
Chen Qingfeng spent a whole day learning the basic operating steps of the Cisco system, and at the same time he was busy understanding the puzzles laid by his opponents.

To be honest, being a hacker is nothing.

As long as you understand the basic principles of the Internet, the rest is just experience and arsenal.

Chen Qingfeng's basic knowledge is relatively solid, and he has been a front-line programmer for so many years.

As for the weapons arsenal, he had a lot of those gadgets he took from the CIA last time, but they haven't been put to use yet!
The operating systems contained in the previous zero-day vulnerability include not only common Windows, or Mac OS and Linux, which are considered more secure, but of course there are also some other operating systems.

For example, some system vulnerabilities applicable to industrial operating systems.

Of course there are also vulnerabilities regarding network equipment.

Cisco was once the largest Internet company by market value in its early years.

At the end of the 90s, the scene was unparalleled.

At that time, Chen Qingfeng had heard that in China, as long as you obtain CCI certification, it almost means a high salary, which means you can lie down and enjoy life for the rest of your life.

However, only 10 years later, the mainstream domestic network equipment has changed from Cisco to domestic brands.

Nowadays, Cisco certification is still very popular.But the value has been greatly reduced.

When Chen Qingfeng was in college, the school provided exam subsidies from Cisco. If he took the ccna or ccnp certification exam, he could get certain discounts with his student ID card.

To be honest, Chen Qingfeng also used some simulation software from Cisco to complete his network courses at that time.

Although he did not sign up for the certification exam, Chen Qingfeng gradually recalled the knowledge he learned back then.

And now he is studying how to deal with these guys who come to make trouble on his territory.

……

As long as you have money in Xiangjiang, you can meet true love anytime and anywhere.

The women in Lan Kwai Fong are particularly fond of foreigners.

At this time, the members of the Apocalypse team who succeeded in the sneak attack were having fun everywhere.

Except for one person.

This person is Susan.

After everyone left, she was the only one left in the hotel.

It's not that she doesn't like socializing.

Simply because she is the only data expert on the entire team.

Network security was considered the only option for Internet security many years ago.

However, nowadays, many people have realized that data is actually what needs to be protected.Why do you say that?

Because data will become more and more valuable in this era.

Can you imagine a group of patients who have been ill in the hospital for a long time and suddenly one day receive an advertisement for a drug that targets their disease.

After being told by doctors that they are dead, will they use their last glimmer of hope and spend their only savings to give it a try?

If someone can get the data of hospital patients, summarize and collect the patients with some of these diseases, and then use various methods to expressly imply a certain expert or scholar or a special treatment method to these people on the Internet.

Will these people be fooled?

Similarly, it is said that during World War II, relevant U.S. departments could calculate the displacement of a battleship through the fan-shaped ripples on the back of the battleship.

Imagine if someone obtained data related to the production, storage and transportation of weapons in a certain country, or even the production, storage and transportation of certain rare metals.

Will it be possible to deduce the production and research and development progress of a certain country's high-precision weapons?
Is this why Susan is so special to the entire team?

In fact, although all the members of the team were not convinced by her, they could not live without this woman.

At this time, Susan is collecting and sorting out the data that has been stolen.

"Wow!"

At this moment, she was looking at a pile of boring data in front of the computer screen, but a delighted smile appeared in the corner of her eyes.

In this operation, they specially selected a university, a government department, and several corporate websites to attack.

Of course, these companies are large and small, and their purpose is to confuse their opponents.

Of course, some of them are meant as tests.

However, at present, the official website of Zhejiang University has not obtained anything except some student registration information.

This information is very useful. After being packaged on the Internet, it is estimated that it will be bought by buyers who know the goods very quickly.

As for what the person who bought the data will do in the end, it is not something Susan can consider.

In addition, the most important thing is some important data about the country.

The attack on the Department of Agriculture did leak some data, but the data is messy.

Susan quickly sorted it out and found that the data had been found on the public Internet.

She couldn't help but feel a little disappointed.Sure enough, the execution efficiency of government departments is the same.

Things that have been made public are still stored on the server and stored as confidential, causing their efforts to be in vain.

Strangely, however, there is very little data available from the Department of Agriculture.

This made Susan feel a little surprised.

But then, the effect of the attack made Susan satisfied.

Because these data come from a domestic medical company called Yufeng Intelligence.

Data from medical companies is definitely the best source of data.

Susan did a rough survey of some of the data, and she had already imagined in her mind the scenario of pharmaceutical companies waving banknotes to buy data from her.

Finally, Susan focused her attention on a company called Evergreen Technology.

But after she saw the company's data, she immediately felt a different style.

This company has some customers with names that are clearly not Chinese.

Because the name is completely Westernized or Southeast Asian style.

Susan took a look, and some of the information showed that the data source came from the Philippines or Thailand.

She investigated the source and found that Evergreen Technology was a gaming company.

What a pity!Most of the game's customers come from countries with lower spending power. Although these data are detailed, their value is greatly reduced!

Now it’s time for Susan to maximize the benefits of this data!

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like