HK022 Bet(1/2)
Feng Ke looked around the security company. The technicians headed by Ma Yong had very ugly expressions.
Steal a teacher!
Shi Lei actually insulted them like this!
Even a veteran like Ma Yong, who has been in the workplace for more than ten years, can't help but feel a little angry.
"Mr. Shi, you can definitely recover all the data in our server?"
Shi Lei nodded proudly.
"certainly!"
“What if it’s impossible to recover?”
Ma Yong sneered and said: "You don't have to pay taxes when you talk big!"
"It's like farting, if you let it go, forget it!"
Shi Lei raised his eyebrows, "What if I restore all the data?"
"Don't apologize!"
"Brother Shitou doesn't appreciate your apology at all!"
Ma Yong hesitated for a moment, but Shi Lei was too young, too young to be believed. He did have excellent skills!
"Mr. Shi, what do you think we should do?"
"After all, Mr. Shi, you are still a student!"
Ma Yong looked sideways at Shi Lei and his tone was quite sarcastic. His words even revealed the taste of bullying Shi Lei, a poor young man!
Shi Lei rolled his eyes, looked at Feng Ke and said, "Mr. Feng, I can help you restore the server data!"
"However, given the situation of your server, the cost of data recovery this time is a bit expensive!"
Feng Ke said expressionlessly: "How much?"
Shi Lei raised three fingers, and the lion opened his mouth and said: "Thirty thousand!"
"No problem!" Feng Ke didn't even blink!
Shi Lei secretly murmured in his heart, must it be missing?
Although he felt a little regretful, Shi Lei was not the kind of villain who just sits there and raises prices. He turned to look at Ma Yong.
"Director Ma, why don't we bet the 30,000 yuan!"
"If I recover the data, you can give me another 30,000 yuan!"
Ma Yong hesitated.
Shi Lei sneered: "Director Ma, don't you dare?"
"What's wrong with that?"
Ma Yong raised his head and said in a mocking tone: "But, Mr. Shi, if you can't restore the server, as a poor student, how can you pay me 30,000 yuan?"
Before Shi Lei could say anything, Sun Feng took the initiative and said, "I'll help Shitou pay!"
"Although I just opened a small repair shop downstairs, I can still afford it at 30,000 yuan!"
Shi Lei looked at Sun Feng with emotion, "Brother Feng, thank you!"
"Shitou, we have known each other for several years. If you lose this time, you will have to work for Gebai in the future!"
Sun Feng said jokingly.
Shi Lei nodded heavily.
"Mr. Feng, all of you, please get out!"
"I'm going to start recovering the data!"
Feng Ke didn't hesitate and directly called the people from the IT department and Sun Feng to go out together.
Shi Lei stopped him and said, "Brother Feng, what are you doing out there?"
Sun Feng was stunned for a moment, then laughed and stayed.
When Feng Ke took everyone from the IT department out, Sun Feng asked: "Stone, are you sure?"
Shi Lei laughed and took out his USB flash drive.
"Brother Feng, didn't you see my strength last time?"
Sun Feng sighed, "Last time?"
"Last time, it took you nearly four hours to restore 62 photos, right?"
"What kind of strength is this!"
Shi Lei rolled his eyes, "Brother Feng, I really don't know how you, a guy like you, who doesn't know the slightest bit of technology, can support a repair shop!"
"Let me tell you, the reason why it took so long last time was because I didn't have any ready-made recovery software!"
"For four hours, more than 90%, I was writing data recovery software!"
Sun Feng asked suspiciously: "Shitou, you mean that it won't take too long to restore the data this time?"
Shi Lei nodded casually, "Brother Feng, find a computer and play Minesweeper!"
"I'll restore the data first!"
Sun Feng nodded helplessly, minesweeping and other things are so annoying!
Shi Lei sat on a swivel chair and first opened the server's security policy. After making some changes, he then used anti-virus software to successfully contain the lurking malicious viruses.
Then, insert the U disk into the USB interface of the server, and then run the 'deep recovery' software written by himself directly on the U disk.
To be honest, Shi Lei didn't know how many data files had been deleted from the servers of Surround Security.
If you ask Ma Yong, he probably won't tell Shi Lei, and will even ridicule Shi Lei.
However, Shi Lei had no intention of asking.
Although he didn't know what files needed to be restored by Surround Security, Shi Lei had his own method.
Some modules of the deep recovery written by Shi Lei apply the new theories of 2012.
In this era of 2006, it was simply a fantasy!
For example, delete file timeline technology.
Deep Recovery software will first create a timeline based on all files and the time they were deleted.
For example, file A was deleted on January 1, 2006; file B was deleted on February 2, 2006; file C was deleted on September 9, 2006.
Then, there are three points in the timeline of deleting files, the first is January 1st, and the last is September 9th.
As long as he has this timeline, Shi Lei can find out the specific time when files were deleted on a large scale recently.
Malicious programs will first delete all files stored on the server before repeatedly copying and deleting junk files.
As long as you find the specific time of the first large-scale deletion of files, you can use this time point as a basis to recover previously deleted files including this time point.
As for the deleted records after this point in time, Shi Lei will only randomly select some to recover, and then check to see if they are junk files before making a judgment.
The server of Surround Security does not use a non-X86 server, but a general X86 server, and it is only a department-level server.
The main difference between so-called X86 servers and non-X86 servers lies in the instruction set, which can also be said to be different operating systems.
X86 server is what is commonly known as PC server. Generally, X86 server uses Intel processor and Windows system, and uses CISC complex instruction set.
This kind of server has an extremely wide range of applications. Although it has good compatibility and is cheap, its shortcomings are also very obvious, including poor stability and even worse security performance!
Non-X86 servers generally use RISC reduced instruction set, and some also use EPIC parallel instruction code.
This type of server is a high-end gadget!
They are expensive, have a closed system, have good stability, excellent performance, and a high degree of safety.
Mainly used in the core business of large enterprises.
For example, the financial industry, telecommunications industry, absolute giant industries!
X86 servers are roughly divided into four levels.
Entry-level servers, this type of server, actually have little performance gap with ordinary personal computers.
Even some small companies and small businesses simply buy a high-performance personal computer to act as a server.
For example, the two Machine Kings that Shi Lei saw in Sun Feng's repair shop last time can be used as entry-level servers.
The second level of server is the workstation server.
Although workstation servers are more powerful than entry-level servers, they are still just low-end servers after all!
The third level, medium server, is the department-level server currently used by Panshi Security.
This type of server has higher performance and higher price, and is often used by medium-sized enterprises.
The administrative departments of large enterprises often use servers of this level.
To be continued...