Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 14

Blame-shifting meeting

Meng Fei was covered in sweat, resisting the feeling of vomiting, and reluctantly sat in his seat.

Fortunately, none of his colleagues in the same group were here. Otherwise, he might have been carried to the infirmary on a stretcher by now.

[Ding dong! Decryption completed. The decrypted file has been entered into the system. Super strong encryption, experience +50!]

Good guy, 10 times the experience value, only 40 experience points away from leveling up.

But if you encounter this kind of super strong encryption every time, you might as well crack a few more normal passwords, otherwise your life will be too long!

"open a file."

There were no words, no images, and no other information that he could understand. He only saw a series of numbers. It was not long, about 180k of content.

The only thing he could tell was that the numbers made sense. Looked like some kind of instruction flow?

Any instruction set is a combination of a bunch of numbers. But even an instruction set that has never been seen before is different from completely random numbers.

When programmers see this kind of number, they will associate it with some kind of instruction.

But instructions require hardware to execute. For example, x86 instructions run on PC processors, and ARM instructions run on mobile phones.

So what is the use of a machine code that he has never seen before and has no explanation?

I almost lost my mind before deciphering it, but it didn’t work?

"Scan this file for any meaningful information."

Meng Fei said in his heart without giving up.

【Scanned successfully.】

[Object type: data file.]

[Size: 183424 bytes.]

[Content: No valid information found.]

Meng Fei was speechless for a while. It seemed that his system was not only limited in computing power, but also not omniscient.

A piece of waste code that no one knows how to use even if it is open source is actually encrypted with a long secret key and is still stored in a double-encrypted version control system?

What's even more exaggerated is that someone specially made a copy of him and killed him just to steal such a purely digital file that he didn't know how to use?

It shows that there are people in this world who can use it.

Meng Fei resisted the urge to extract a few paragraphs and search directly online. If these "instructions" are of great value, searching online is equivalent to broadcasting to the world: "I have the magic weapon, just come and grab it!"

But he suddenly remembered that there was something wrong with this whole thing.

The length of this file is more than 100,000 bytes. Unless someone like him has a system in his brain, it is absolutely impossible to memorize it manually.

Shouldn't the cloner bring a USB flash drive and copy the files and take them away? Even if there is no USB flash drive, the mobile phone can be used as a temporary USB flash drive.

But why does that man have nothing but a hammer?

In fact, you don’t have to take things away, as long as they can be hidden somewhere where you can get them later.

Meng Fei suddenly had an inspiration and began to open the confidential directories of each colleague in the group on the version management system one by one.

Wait, what is this?

He did find the same file, but not in anyone's secret directory, but in his group's secret directory.

A directory that only the group leader has access to?

Could it be that this document is related to the organization of this company? It comes from a confidential project assigned to the group?

There is indeed a ghost in the company.

Meng Fei was still confused when the landline phone on the table beeped.

"Who are you?"

A relieved voice sounded in the receiver: "Meng Fei? You are finally here! Come to the meeting, Conference Room 103!"

Five minutes later, Meng Fei walked into the conference room.

Pushing the door open and entering, he saw a scene he was no longer familiar with in his previous life.

The lights in the conference room were turned off, making the atmosphere a bit dark and dull.

Only the projector made a low and gentle fan sound, shining a dazzling cone-shaped beam of light onto the snow-white screen.

The unadorned PPT with white text on a black background clearly displays two lines of text:

"Main issues at the moment:

“1. Various bugs emerge in endlessly, and customer satisfaction is very low.

"2. The actual development progress lags far behind planned expectations."

This is just an objective description of the current situation, without questioning anyone. But to everyone in the room, these two lines of words are quite eye-catching.

You work overtime and hard every day and night, but what you get in the end are complaints from customers and delays in planning. Who can be happy?

Meng Fei had a completely outsider mentality, but he didn't feel uncomfortable at all. He glanced around and found the only empty seat left to sit down.

He glanced at the young-looking bald man sitting next to him, and couldn't help but feel a thump in his heart.

Mentioned in the predecessor's diary.

At the age of eighteen, he exposed many important vulnerabilities in the operating system, causing the world's largest manufacturers to modify their designs.

At the age of 22, he won the global award in the computer security industry.

At the age of twenty-five, he took the position of chief security architect of Mantis Software.

Luo An, the genius boy from Wutong City!

No, he is no longer a teenager now, he is already the vice president of Mantis Software, so he must be called Mr. Luo.

It was really embarrassing to accidentally sit next to the big boss.

Luo An glanced at the young man sitting next to him, nodded and smiled slightly, then turned back and immediately regained his serious expression and said:

"Liu Gang, you continue."

A guy with slightly curly brown hair and thick beard, who looks like a foreigner and has a gruff voice said:

"I still said the same thing. The development team is short of manpower, with ten people doing the work of twenty. In addition, the communication with the vulnerability team is not close enough."

He immediately glanced at Meng Fei, who had just taken his seat.

"Some people only arrive at the company at 11 or 12 o'clock every day. Even if they don't see anyone in the morning meeting, how do you think they can communicate?"

"Fuck, should I tell you that I was the one who was hit and killed by a car downstairs last night?"

Meng Fei almost burst out with curse words, but he swallowed them back. This matter was too shocking to be said.

"I need to explain this."

Opposite Luo An, a man with a soft tone but a somewhat old-fashioned appearance spoke.

"Meng Fei works overtime until very late every day, so he comes relatively late in the morning."

The person who spoke was named Ouyang Cong, the leader of the vulnerability discovery team. Meng Fei saw in his predecessor's diary that he was one of the few people in the company who could talk to him.

My predecessor usually spent all his time adjusting programs, was taciturn and unsociable.

It is difficult for a person with this kind of personality to get along in the company. Fortunately, Ouyang Cong knows that he can do things, and has always protected this subordinate who is capable but not very good at speaking.

This is a meeting that Mr. Luo suddenly convened for communication between the security development team and the vulnerability discovery team.

Liu Gang is the leader of the development team.

There are ten people in the development team, five people in the vulnerability team, plus VP Luo An, a total of sixteen people, which just fills a small conference room.

"Working hours are not the point."

Liu Gang immediately changed his target.

"The vulnerability team has indeed discovered a lot of bugs. But these bugs are not necessarily issues that customers are concerned about.

“Fixing these bugs takes up our already limited manpower.

"The result leads to the above two results at the same time:

“First, the bugs that users care about have not been found, so there are many complaints and low satisfaction.

"Second, progress has been delayed.

"The solution is also very simple. Cancel the vulnerability group and merge it into the development group. This can enhance development manpower.

"And I can guide them to focus on issues that users care about and avoid internal friction."

Meng Fei understood. This is not communication, this is a real scapegoat and annexation meeting!

He was an outsider, but for some reason he felt angry.

It is obvious that the two major problems were brought up by Luo Ant to the development team. Whether there are many product problems or slow development progress, these are all problems of the development team.

But with Liu Gang's few simple words, all the blame was thrown to the vulnerability team.

And his goal is not just to shirk the blame, but to fundamentally "solve" the problem and directly eliminate the "stumbling block" of the vulnerability discovery team!


Chapter completed!
Prev Index    Favorite Next