In the morning, Guan Ti ran to the 66th floor again, and when he passed by Ding Xiaodai, he patted her head. wwW!qUAnbEn-xIaosHuo!coMDing Xiaodai was attacked unexpectedly, and wanted to shout, but saw that the other person had gone far away, so she could only puff up her cheeks, cover her head, and glare at his back with grievance and resentment.
Wen Nuan took this scene in nonchalantly and continued to work with her head down.
Ding Xiaodai glanced at her, as if he wanted to get up and walk over, hesitated for a moment, and finally turned back.
Zhan Nanxian asked in the president's office, "How is it?"
Guan Ti patted the file bag in his hand and said, "It's all here. The evidence is irrefutable and there is no way to hide it."
"Ask him to come up, and ask Gao Fang to come as well."
When Guo Ruqian, deputy manager of the technical department, was invited up by Ding Xiaodai over the phone, Zhan Nanxian, Gao Fang and Guan Ti were already waiting in the conference room.
Guan Ti spoke first.
"Because the company's network security and protection system uses the most advanced technology in the world, no one has been able to do it so far. When someone accesses Qianyu from the outside or inside, or even breaks into Qianyu's firewall and tries to remotely control a computer in the company, it can not trigger the tracking alarm I set at all."
Once the alarm is triggered, a text message will be sent to his mobile phone in real time. In the past few days, his mobile phone has not received any alarm messages at all. From this, it can be concluded that the tampering of Wen Nuan's computer was not caused by hackers outside who forcibly broke through the firewall to attack, but must have been done by internal employees of the company.
"The only way to remotely control the warm laptop without triggering the computer's protection system is to plant a Trojan horse in her laptop in advance. This puzzled me because no one in the company could touch her computer on the 66th floor without being discovered."
The only exception is that Wen Nuan downloaded or installed the Trojan virus on her laptop herself, and this Trojan virus must be a new type of program that cannot be detected by the antivirus software in her laptop.
"At first I didn't understand how you did it, until Nan Xian asked me yesterday why I didn't email him the latest Yizhong plan. Then I suddenly realized that I didn't send an email that day but copied it to Wen Nuan using a USB drive. The Trojan program should be in that USB drive."
He always casually threw that USB flash drive on his desk. Perhaps Guo Ruqian accidentally overheard his conversation with Wen Nuan that day and knew that he was going to copy files up, so he secretly copied the invisible Trojan program he wrote into his USB flash drive while Wen Nuan was away. When Wen Nuan connected the USB flash drive to her laptop and copied the data out, the Trojan was brought into her computer.
"The day before yesterday at 12:15 p.m., during your lunch break, you went to an Internet cafe near the company to surf the Internet, remotely activated the Trojan horse to manipulate Wen Nuan's computer, accessed her email, and sent Yi Zhong's plan to Zhu Linlu. After you were done, you killed the Trojan horse, and before you exited, you erased all the access records you left in her laptop, leaving no trace at all."
Originally, Guo Ruqian had done it without anyone noticing, and he had quietly deleted the Trojan in the USB drive. So even if the three of them suspected him, no one could prove that he was the one who did it based on speculation alone without any substantial evidence.
"Unfortunately, you were careless. Although you erased the records in Wen Nuan's notebook, you were in a hurry to leave and carelessly forgot to erase the records in the Internet cafe. The document in my hand is the record of all your operations on Computer No. 18 in the Paradise Internet Cafe from 12:15 to 12:35 that noon. In addition, there is a CD. From the time you entered the Internet cafe to the time you hurriedly left because of a phone call, the entire process was recorded by the camera in the Internet cafe that was originally used to monitor thieves."