4. Reng and Shiv wasted no time in flagging down a taxi, as they had yet to purchase a car after Shubham's accident.
Arriving at the company, Shiv couldn't help but notice the impressive building shining in the sunlight, with the logo "PROTECTOR" proudly displayed. The tagline caught his eye, stating, "WE GIVE YOU SECURITY, YOU GIVE US MONEY."
Finding humor in the bold statement, Reng chuckled and quipped, "Looks like he is not shy about his priorities; even his logo is all about the cash."
In the past,
There was a large building that had different small new projects and start-ups witnessed, here in a small flat there were Rooms which have amidst the bustling tech tools and Different rooms allotted for functions, there was a room "CyberSec Solutions," renowned for its state-of-the-art cybersecurity services data. In this Room, a new graduate boy doing and using his knowledge.
Shiv is a brilliant software engineer with an unparalleled knack for spotting vulnerabilities. He worked on this project for a long time with some friends, but later his friend stole his code and the full project details were sold to a famous USA company. He lost all his hard work, and after this betrayal, he took a break.
So, after graduating and enduring many life changes and betrayals from his friends, he started a new organization that provides security against cyberattacks by other hazardous individuals.
However, this time he has added a lot of protection and a secret code so that if the scenario occurs again, he can take action from anywhere in the world. He added functions like modification history keeper, a new code emerging recorder, record location, and IP address, and the identity of the modifier.
At present,
Shiv delved into the depths of CyberSec's firewall code, he noticed something awry. Lines of code seemed out of place, and a sense of unease crept over him. With meticulous precision, he scrutinized the codebase, tracing every function and variable, searching for the source of his discomfort.
As Shiv delved deeper into his investigation, his doubts about his accident grew stronger. He ran the history keeper code and discovered that the modification date of the firewall's code was the same as when the accident occurred. This finding heightened his suspicions, but he knew that the situation was not as simple as it seemed.
Shiv also discovered the modification IP and address. He traced the IP address back to the main server mainframe computer, which could only be accessed by his personal assistant, whom he trusted wholeheartedly. Despite feeling overwhelmed, Shiv remained calm and took deep breaths as he considered the possibility that someone else might be using his assistant to betray him.
As Shiv continued his investigation, his suspicions deepened. He found evidence that someone had subtly altered the firewall's code, creating a backdoor that could be exploited from within the company's network.
This modification posed a severe threat, as it could potentially allow malicious actors to bypass CyberSec's defenses and cause chaos in their clients' systems. he ran the history keeper code and found a modification date, that date is the same as when his accident happened.
He has some doubts about his accident but it is not this simple seems.
He also found a modification IP and his address. He found that the IP address represented the main server mainframe computer which could be accessed by his only personal assistant whom he trusted from his heart, keeping calm and took long breaths repeatedly thinking to investigate the incident because maybe its not his personal assistant betray, someone else using her.
As Shiv continued his investigation, his suspicions grew. Someone had subtly altered the firewall's code, creating a backdoor that could be exploited from within the company's network.
This modification posed a severe threat, potentially allowing malicious actors to bypass CyberSec's defenses and wreak havoc on their clients' systems.
He discreetly monitored the network activity of other employees, analyzing data packets and observing employee interactions.
His suspicions fell on a junior developer, Vashu, whose behavior had become increasingly erratic in recent weeks before his accidents.
He wants to investigate, but he doesn't want to know anything about their ulterior goal.
Reng emerges from him, and after reading his thoughts, he claims that you may easily monitor their activity by simply transmitting your soul pieces to them.
Remember, I told you you could create a clone, but first, you had to reach the beginning point of soul cultivation.
Shiv inquires, "How much time will it take me to clone?"
Reng stated, "Maximum one month."
Shiv lost interest after hearing Reng's response and eventually remarked, "I will take some steps and write some stopper code for firewall attacks, but these are internal issues. I need to fix them first. When I have the time, I will monitor them.
Reng said " You can cultivate in the office and monitor them leave that to me, although I can't go far away from you, still I can go 500 meters from you, and after your cultivation may be distance increases more.
Let's do it as you say.
Reng said, "You need to talk to your assistant first ".
Shiv walks toward a cabin and knocks. his personal assistant Lila came outside.
Lila "Yes Boss "
Shiv " I got a call from the monitor team, that firewall attack.
Employees from Shiv's office are aware that the monitor team only sends and receives orders from him.
Shiv did this to ensure security and to deter anyone who might try to corrupt them with money.
when she listed the details about the firewall tap she tried to make a delay for his boss. She panicked a little but managed it quickly.
Shiv said "Come to my office, I have to talk to you somethings"
Lila had understood to some extent that her boss had come to know about something.