Chapter 908 - Computer Virus
I learned an anecdote from the old executive Charlie. Pen, fun, and www.biquge.info
I heard that when the Candle Flame Building in the Wind was just about to start, my grandfather Guo Muzhou invited a group of old Taoist priests from Huaxia to help select a feng shui treasure suitable for building a building.
Because of the perennial living in the mountains and forests of those Taoist priests, they all got airsick and vomited on the first plane.
After a few days of recuperation and helping to choose a place, geologists at the University of California found that the area was a coastal landform that was not suitable for skyscrapers at all.
Eastern and Western ways of thinking clashed, and people on both sides quarreled in languages they didn't understand, and finally chose to build the Candle in the Wind Mansion there.
Han Xuan was helpless when he heard it, and it is estimated that there are a few Chinese Americans who are addicted to feng shui like his grandfather.
Hundreds of thousands of tons of buildings are built on soft soil, and it is estimated that only half of them will collapse......
Just then, Christopher's cell phone suddenly rang.
Blueberry mobile phones are produced by their own company, so these employees naturally have some benefits, ordinary employees buy blueberry mobile phones from within the company, only need to give the cost price.
They didn't know that it was the cost price, they just thought it was discounted, the company signed a confidentiality agreement with the supplier, and the outside world did not know what the cost price of manufacturing an HX-ONE mobile phone was, and only a few company executives and researchers knew it.
At the top of the company's executive level, each person received two free mobile phones as a benefit, which was delivered to them on the day of sale.
Not far from NVIDIA's production workshop is the Blueberry mobile phone manufacturing plant.
Work is underway 24 hours a day, producing a steady stream of blueberry phones in preparation for a second release at the end of August.
I don't know what he's talking to, but his face looks quite serious, and after Christopher hung up the phone, Han Xuan asked, "What's wrong?"
If there's something urgent, you can go first, and I'll take a look.
There might be a trip to Stanford University in the evening, and Harris asked me to treat him to dinner. ”
"It's a matter from the company's side.
The technical department said that someone was spreading worms again, causing hundreds of users to be paralyzed, and they called our company to complain. ”
Christopher's expression was just helpless, not anxious.
Because since the release of the WOW chat software, there have been several similar incidents, and it is natural to get used to it.
In the past, most of these Internet worms were spread by email, but since the number of users of WOW chat software has grown, those people have set their sights on this popular live chat software, and WOW has replaced email as their favorite target.
Hackers around the world have also come to harass Hope's website, with the worst of which took four hours to get back to normal.
There is no shortage of smart top hackers in the world, and even if HOPE Technology has a strong security team, it is inevitable that a group of people will find vulnerabilities and besiege them.
Executive Anthony didn't know what his so-called worm was, and asked Christopher.
Christopher replied, "A worm is a malicious program that can exploit a system vulnerability and propagate itself through a network.
They use the WOW chat software to automatically send malicious messages or files to the user's contacts for the purpose of spreading widely.
In addition to attacking the WOW chat software itself, it can also attack the user's computer, using Trojan viruses to steal data from other users' computers, or simply damage their data.
Some time ago, we also found a virus that can steal the user account of WOW software, fortunately it was discovered in time to make up for that vulnerability, otherwise it can cause considerable harm......"
It is still in the initial stage of Internet development, and the people at HOPE Technology have never told Han Xuan about it.
Therefore, he subconsciously ignored the importance of antivirus software.
In the early 2000s, instant messaging software such as QQ and MSN were also plagued by computer viruses, but the situation only improved slightly with the improvement of antivirus software.
Now that Hope Technology's software is far ahead of the industry, it's no surprise that hackers are being targeted for their own amusement and prowess.
Han Xuan asked Christopher: "The company and software are often hacked, is the situation serious?"
Old Charlie said, "It's still under control."
Money is only a small issue, and some users have questioned the safety of our company's products as a result, which is not good for word of mouth. ”
Christopher nodded in agreement and said, "We're trying to figure out a way to solve it, we just closed a loophole, and those hackers will come up with new ways to attack, it's just impossible to prevent it."
Once my friend sent me a connection, only to click on it and realize that something was wrong, and it almost poisoned my computer, not to mention other ordinary users.
Last week, an announcement was issued to remind them not to open links to unknown websites, especially the most viruses in the restricted websites. ”
“…… X-rated. ”
Han Xuan's face was strange, thinking that this thing appeared so early, he coughed lightly and continued: "It's not a way to go on like this.
I think our company should start developing an antivirus software......"
"That thing.
Antivirus software has appeared, but it is not used on a large scale.
The antivirus is very complicated to operate and is not suitable for the average computer user, and it is an antivirus software developed specifically for professionals. ”
Christopher replied to Han Xuan:
"An employee of the company came up with an idea for this, and we're trying to develop it.
The principle is very simple, first extract a representative piece of code from the virus and put it in the virus database of the software.
By allowing the user to install the antivirus software, it can search the hard disk of the computer to check whether the file contains the virus signature code from the virus database.
If you find that the virus signature code corresponds to the virus, you can determine which virus is hidden in the file.
This method is the simplest and most practical, but it requires a lot of manpower and material resources to maintain and upgrade, and the virus database needs to be constantly updated to be effective.
In addition, there are technical challenges, and not all users use the same desktop operating system......"
"Rest assured, when Microsoft's Windows 1995 comes on the market, those messy desktop operating systems will almost be crushed by it.
Our company only needs to develop for two operating systems, Microsoft and Apple.
As for the overhead, we can initially implement a free trial policy for users, and wait until a year or two later to charge for these antiviruses.
There is no such thing as a free lunch in the world, and I believe that users will be able to understand ......" (To be continued.) )