Chapter 268(1/2)
268
No one would have thought that a weapon software package from the Fifth Force Headquarters was being tested in a love hotel that focused on love.
At this moment, the table in the room is filled with loose computer accessories.
A power supply, a keyboard and mouse, two solid-state drives, two memory sticks, three motherboards, and three different CPUs.
The two roommates looked at the thin man with glasses in front of them, and inevitably had a trace of evil thoughts in their hearts.
If you grab the software and rush out of the door, the other party may not be able to catch up.
The most important thing is that he may not dare to call the police on this thing.
However, this thought only passed by for a moment.
Especially before testing is completed, any idea is extremely dangerous.
The tests being carried out now are likely to determine the future wealth of several people.
Soon, through the modification of the software package, the data on the computer CPU and graphics card chip had changed.
When the bespectacled man nodded to indicate that the information had been modified, everyone quickly powered off the computer.
After the power outage was completed, everyone quickly disassembled and transplanted the computer CPU to another motherboard. At the same time, the graphics card was also transferred.
However, the solid-state drive containing the system was not used again.
At this time, I chose to use another solid-state drive with the in7 system installed.
This time the hardware transfer has been completed and two completely different systems have been used. If it is found that the information has been modified, it means that this software is truly effective.
After all, the modification software circulating on the market can only be modified under the system. And any time you restart after the modification is completed, the previous information will return to its original position.
Even such modifications can only modify a small amount of information content.
And now, the information just entered was completely witnessed by the two roommates.
Plug in, turn on...
The computer quickly enters the in7 screen!
One of the students quickly plugged in the USB flash drive and copied all the mainstream testing software in the USB flash drive.
For each software test, all the displayed content is the information just entered.
Even after the computer restarted several times in a row, the information just entered was still displayed, showing Minions and Minion graphics cards!
When they saw that Intel's information was successfully overwritten, the two students were extremely shocked.
However, the two people did not give a conclusion immediately, but continued to test other chips and graphics cards they brought.
Since only three motherboards were brought, and all of them were fourth-generation CPU motherboards, we could only choose fourth-generation CPUs for testing.
However, there is plenty of room for choosing a graphics card.
The two people brought a total of 20 graphics cards, 10 each for AMD and N cards.
The test continued until that night, and the final results showed no information errors at all.
It is enough to prove that this software package can indeed modify the chip information.
When the test was finally completed, the three people looked at each other and smiled in unison.
Perhaps it's been a long time, from wanting to take advantage of others when they first saw this software, to this moment the two students no longer had the initial evil thoughts.
I feel that the thin man with glasses in front of me is a good friend.
At least in terms of mutual communication and conversation, there are no barriers or conflicts.
"I will transfer the money to you now. After the transfer is completed, the software will be ours." The completion of the test means that you pay and deliver the goods.
The thin-eyed man nodded without saying a word.
Soon, the message was sent to Su An's mobile phone.
Just ten minutes later, a certain coin worth two million US dollars appeared in the dark web account of the thin man with glasses.
"You are very good
Buyer, it was a pleasure doing business with you. Goodbye!" The man with glasses said no more nonsense and walked out of the hotel directly carrying his computer bag.
At this time, there is a backup copy of the software package on each of the two solid-state drives.
For safety reasons, the two classmates quickly packed up and moved.
Among them, I just used a USB disk to copy and copy, and I made six or seven USB disks.
Even for absolute safety, after the four people met, they chose two different post offices in Tokyo and directly filled in the boss's address for mailing.
In addition, a copy will be mailed to you after you return to China.
After a few people settled all this, they did not immediately choose to return to China.
Instead, start dividing the remaining banknotes!
This time, in addition to paying five million US dollars, Su An also paid an additional two million yuan.
At this moment, several people decided to have a good time in Tokyo.
Beauties that I have only seen in movies before can now be seen in real life, and you can even enjoy life by spending some money.
You must enjoy life while you are young.
Anyway, we have money, and we even have a golden hen that can lay golden eggs.
"Do you think we should take it out and resell it? If this thing is sold to a female businessman in China, any share of it can fetch him at least two million yuan." Software is extremely easy to be copied and is fragile.
The program package provided by the glasses man does not have any encryption measures.
As long as the transaction is copied, it can be used normally without any obstacles during the process.
The boss spent more than five million U.S. dollars, and in addition to hacking more than three million U.S. dollars, they also got an additional program package that they could copy at will.
"No, the four of us must reach an agreement. This thing cannot be sold privately under any circumstances! Unless you don't want to live anymore.
I know that once something like this is sold to those graphics card dealers, it will be sold at a high price and easily earn two to three million, just like playing.
But if this happens, we will no longer want to live quietly for the rest of our lives.
Although the dark web cannot know the information of both parties to the transaction, it can show that both parties have completed the payment.
At this moment, people who see this message will definitely be very curious as to who successfully bought this software.
There are also more people who will be curious about whether this software is as described by the seller.
Once this kind of software starts to be copied at will on the market, at least the whole world will know that this transaction on the dark web is real and effective.
Especially the large-scale proliferation of this software comes from flower growers. Once our information is leaked, what kind of action do you think the Fifth Combat Force will take against us?
Maybe you think I am unfounded, but this worry is not groundless.
If you are from the Fifth Combat Force, Cyber Command.
Even if the other party finds out that we are just a buyer and not a seller, do you think they will believe that we only purchased this software package?
And what is the source of this software package? We don’t know the secret?
Did the staff take it out of the office building privately, or did hackers invade and steal such secrets?
I think it's most likely that the staff brought it privately.
We can imagine that the Fifth Combat Force office building must be tightly guarded, but people like Snowden must appear in endlessly.
If there is one, there are two, so it is not surprising that someone brought it out.
But the question is, is this the only weapon bag he carries?
If many weapons packages are leaked, will the Fifth Combat Force think that we also purchased other weapons?
Even on the territory of other countries, those agents and spies are doing their dirty work wantonly.
I don’t want to live in fear for the rest of my life, especially just for a mere two to three million yuan.
we now
We already have enough money, and we are young enough now.
We have surpassed 99% of the young people in the country. Aren't you still dissatisfied?
Do you have to wait until one day when the agents and field personnel of the Fifth Combat Force arrest your parents and threaten you with their lives, will you feel afraid?
If you sell these software privately, I will surrender immediately." Some people have a very clear attitude that they are not willing to sell this software privately no matter what.
People who originally had some ideas could only silently put away their thoughts when faced with the remarks of their classmates.
The classmate is right. If one day the Fifth Army wants to know how much they bought, will they really send field personnel to point guns at their heads?
If I told him that I just purchased a program package, would those people believe it?
Even if those people believe that they have pointed a gun at their heads, will they let them go home safely?
What's more, will these agents and field personnel let their families go?
After all, it is not difficult for these agents and field personnel to find out all their information.
To be continued...