Rebirth of Cyber ​​Hegemony

Vol 3 Chapter 974: : Enlargement: Cloud Antivirus

"Chen Yu, I got the secret message that Microsoft might do it on us again."

"Hasn't Microsoft been working on us all the time?"

"I mean the same virus attack last time."

360 person in charge Zhou Hongyi came to Chen Yu's office.

It is impossible for Microsoft to fail to disclose such a big move.

But even if he got the news, Zhou Hongyi was still extremely nervous.

It seems that this time is obviously much more dangerous than the last time.

"Coming again?"

Chen Yu frowned.

Microsoft's suppression of Huanyu Technology is really all the time.

Seeing that the three major game manufacturers have brought a lot of benefits to Huanyu Technology, some software and hardware companies have also joined Huanyu's camp. Unexpectedly, so soon, Microsoft's next wave of attacks will come again.

"Yes, it is said that Microsoft has contacted several top antivirus software companies in the world."

"Antivirus software company?"

Chen Yu was taken aback for a moment, and subconsciously said, "Aren't they anti-virus? They can make drugs?"

"They not only know how to make drugs, but they are also masters in drug making."

Zhou Hong smiled helplessly.

In fact, they have a lot of masters in 360, but they have been very low-key.

And in order to better serve users, 360 has been absorbing all kinds of outstanding hackers from all over the world.

If you don't even know the number of hacker attacks, how can you prevent these hackers?

Like Li Jun, the author who made the panda burning incense before, Zhou Hongyi absorbed him to 360.

"Uh……"

Chen Yu slapped his head: "I didn't turn around."

"Can it stand it?"

"It's choking."

Zhou Hongyi shook his head: “We used Microsoft’s strength to attack us before. It was difficult for us to deal with, let alone they united so many top security giants. I believe that these giants must have been cooperating and continuously researching us during this period of time. Huanyu system. Maybe it will give us a fatal blow."

"Have you talked with Li Jun to see if he can make a super panda to burn incense."

"Can't figure it out."

Zhou Hongyi shook his head depressed.

The last virus attack was a panda burning incense secretly developed by Huanyu Technology to temporarily interrupt Microsoft's attack.

However, this time it is absolutely impossible to think about it.

"Microsoft has patched the vulnerabilities exploited by panda incense burning. In addition, the top anti-virus software companies have thoroughly studied panda incense burning, and even launched a series of panda incense burning special killings. Their operating mechanism for panda incense burning , The route of infection... wait, I'm already familiar."

"Then make something better."

"We also want to, but this one can't be met."

Chen Yu doesn't know much about technology, but Zhou Hongyi, who has a lot of research on technology, understands how difficult it is.

If you learn from the experience of the last panda burning incense, even if you can make a series of viruses, it is absolutely impossible to spread to the world as quickly as the last time. They have blocked this road to death. If there is no other discovery, it is basically impossible.

"On the contrary, we need to worry that some of the top system security companies will bring us a virus that looks like a panda burning incense."

Although Microsoft has been attacked by Panda Burning Incense before, its reputation is not known.

But no matter how bad Microsoft's reputation is, you still have to use Microsoft Windows.

This is not because you don't want to change the operating system, you really want to change it but can't change it.

Not to mention other countries, even domestic, it is not so easy to get rid of windows completely.

But for newly launched operating systems, that's not the case.

They can't get rid of windows, but they can definitely replace the Huanyu system in the first place.

After all, when they replaced the Huanyu system, they were actually trying.

If you use it well, of course you will continue to use it.

If it is not used well, the probability of changing back to windows is very high.

"Cannon, what do you think now?"

"Is there any idea, I can only recruit troops from all over the world, and dig my feet in various system security experts. However, I guess it can't stand it. After all, Microsoft's strength is not blown out, and they have joined a series of top global players. Security company. This time, they just want to launch the strongest offensive against us. If we can't stand it, it is estimated that the road ahead will be really difficult."

Chen Yu nodded.

He knows the current situation.

In fact, the PK between Microsoft and Huanyu Technology, until now Microsoft has not had much to deal with Huanyu Technology.

To block the online games of Huanyu Technology, Huanyu Technology can also use Internet cafes to support it.

Moreover, they can also launch more powerful games to fight against the Microsoft Windows market.

Especially now that the three major game companies have announced their participation in the Huanyu camp with high profile, this has also stopped Microsoft's ban.

But if it doesn’t act like this, then Universal System will sooner or later grab the windows market step by step.

Then, it is better to concentrate all the resources and give Huanyu Technology a grim note.

"Moreover, Microsoft has also learned to be smart, and they have begun to hang Trojan horses on various websites, and many users of our Huanyu system have been recruited."

Zhou Hong cursed.

But despite the scolding, I have to say that this trick is really insidious.

Even if this trick was devised by Huanyu Technology itself, there is no way to crack it.

Microsoft windows users will download small movies, and Huanyu system users will also download small movies.

"Haha, Microsoft has applied what it has learned."

"You can still laugh. You did this trick. Now you can't think of a solution."

"Who said I can't figure it out."

Chen Yu said: "I came up with the insidious trick, and I have a solution."

"Can you solve it?"

Zhou Hongyi couldn't believe it: "These educational videos are all actively downloaded by users. This is an initiative to run Trojan horses and viruses. Our anti-virus software is useless even if it's awkward."

"In fact, it is easy to solve this problem."

After thinking about it, Chen Yu called Xie Zhang over.

Xie Zhang is in charge of 5173.com. He also acts as an agent for some games and is also responsible for the management software business of Internet cafes.

"Xie Zhang, I think our Internet cafe management software has to add a function."

Chen Yu told Xie Zhang.

"Mr. Chen, do you think our Internet cafe management system is still imperfect?"

"right."

Chen Yu nodded: "Mr. Zhou told me just now that there are many users in Internet cafes who like to download small movies and educational films. Do you have a solution."

"this……"

Xie Zhang was a little embarrassed.

This is a spontaneous action of an Internet cafe user, and how can he find a solution.

This phenomenon is very common, not only for ordinary users, but also for Xie Zhang.

Everyone is young.

Young people naturally have a lot of energy that cannot be vented.

So in addition to venting in the game, naturally you have to download some small movies and educational films.

So where to download?

Internet cafes are the first place all users come into contact with.

Don't think that there are a lot of people in Internet cafes, why are you embarrassed to download, how embarrassed to watch small movies?

Too underestimated the psychological endurance of many netizens.

Not to mention a large number of people in Internet cafes, even if there are a few sister papers on the side, all users can see it at ease.

"Look, Xie Zhang can't help it, right."

Zhou Hong spread his hands.

If this trick were not so overcast, it would have been impossible for the original Blizzard to be killed by Huanyu Technology without any room for counterattack.

Of course, it's not just Blizzard. Now Chen Yu's trick is also threatening the Microsoft operating system from time to time by various Trojan horses and viruses.

But now, in turn, it's Huanyu Technology's turn.

It's just that Chen Yu is calm and natural: "You guys, how come there are no unsolvable things in this world?"

"There are always more solutions than difficulties."

"A lot of netizens like to download small movies in Internet cafes, so can't we give the Internet cafe management software a one-key restore function?"

Chen Yu suddenly proposed a solution.

"one click recovery?"

Zhou Hong was taken aback.

"Yes, as long as the Internet cafe user gets off the computer, all the small movies and educational films he downloaded will be deleted with one click and restored to the original Internet cafe settings."

This trick is naturally a new feature added to the management software of Internet cafes in later generations.

This function is actually to solve the security problem of Internet cafes.

At that time, there were too many hacking, poisoning, and Trojan horses in Internet cafes.

However, the owner of an Internet cafe cannot restrict every user.

So what to do?

Some programmers thought of a good idea, that is, to implement a one-key restore function in the Internet cafe management software.

As soon as this function comes out, regardless of whether you downloaded a small movie or a game before, or what you are doing, it will be cleared.

In this way, it does not interfere with Internet cafe users' access to the Internet, and at the same time ensures the security of the Internet cafe system, achieving two goals with one stone.

"I'll go, Mr. Chen, you are a good man."

Xie Zhang was confused for a while, but after a while, he understood completely.

"Nima, Chen Yu, you are such a talent, I can say that I have convinced you."

Zhou Hongyi also admired Chen Yu at this time.

Such an insidious trick that drove the world crazy, it was restored by Chen Yu's little trick with one key to clean it.

"Xie Zhang, when will this feature be developed?"

"One day."

"Okay, do it."

The one-key restore function is not a new feature.

It is not only available on Huanyu system, in fact, there has been a one-key restore function on windows system for a long time.

This function is actually the same as the idea used by Internet cafes.

It is also for system security.

If there is a virus in the system, a Trojan horse, or a system crash, or even slower.

Just come to a one-key restore, restore to the point in time you think is safe.

At the same time, one-key restore is simpler and more convenient than reinstalling the system.

It's just that this function is good, but it also has some troubles in addition to the previous users.

For example, after one-key restore, many important data are also cleared.

Therefore, most people do not need this one-click restore.

But this is different for Internet cafes.

Internet cafes only need to ensure the security of their computers, and they will not keep the data stored by users on their computers.

Not only do they don't want to keep it, if they don't have this system, they still have to clean it up at every turn.

After all, there are a lot of netizens who like to download things on their computers, and they don’t delete them after downloading.

At this time, the one-key restore function is added to the Internet cafe management software. It can almost be said that you can enjoy the Internet in the Internet cafe in the future.

You don't need to worry about being poisoned anymore, and you don't need to worry about downloading a small movie to poison the computer in an Internet cafe.

"The Internet cafe has been solved, but what about our personal PC Universal System?"

After a brief excitement, Zhou Hongyi asked again.

Although at present, the main business of Huanyu System is in Internet cafes.

But if you just keep staring at the Internet cafe, then the Huanyu system cannot be launched.

Moreover, with the strong involvement of Universal Technology's various games and the strong involvement of Acer and the three major game companies, Universal Systems' market for personal PC computers has gradually risen. Although it still can't compare with Microsoft Windows, it is the most worthy market for Huanyu Technology.

"Our personal PC computer does have some troubles."

Personal PC computers are no better than Internet cafes.

Internet cafes have professional administrators and a series of service companies to serve him.

Internet cafe owners pay attention to computers every day for business and safety.

But a personal PC computer, which is for personal use.

The level of personal computer use is high or low.

Higher ones may be okay, they are more difficult to poison.

But I really want to say that more than 90% of the users of personal PC computers are computer novices.

Some don’t say that they don’t know how to install an operating system, or even download a piece of software.

They can only play YY, watch movies, play games and so on... As for the slowness of the computer, the stuck, the virus appears, they are completely useless, they can only spend the money to repair it.

Of course, the same goes for Microsoft Windows users.

But windows has formed a monopoly, and he is not afraid of losing users.

However, any PC user of Huanyu Technology is extremely precious, and it is distressed for any Chen Yu to leave.

"In fact, it is not impossible, but this method is slightly more complicated."

"Chen Yu, you say."

"Cannon, have you heard of cloud security?"

"Cloud security?"

Zhou Hongyi shook his head: "What is cloud security?"

"This..."

Sure enough, cloud security is indeed a new thing in 2005.

I remember that at the end of 2006, at the World Search Engine Conference, the so-called cloud business only appeared for the first time.

At that time, Google put forward the concept of cloud computing for the first time in the world, which caused a sensation in the whole world.

With the help of cloud computing concepts, a series of cloud services have emerged in China.

For example, like Penguin Cloud, Alibaba Cloud... and so on.

Cloud security is actually a kind of cloud computing.

Chen Yu is not a computer major, and it is difficult for him to explain this theory. However, although Chen Yu is not a computer major, he has the vision of so many years in his previous life.

"That's it, Brother Cannon, if there is a Trojan horse or virus coming out, what shall we do?"

"In the first step, our anti-virus software company will analyze the virus and provide the virus signature. In the second step, the user downloads the virus signature, that is, downloads the virus database, and then it can be checked and killed."

"Is this a bit slow? And if the user keeps not downloading it."

"It's a bit slow. At the time you mentioned automatic downloading, but automatic downloading also has disadvantages."

"Automatic downloading takes up system resources too much."

"Yes."

"Then let's change our mindset, can users not download it."

"Don't download?"

Zhou Hongyi was puzzled: "Chen Yu, did you mean not to download the virus database?"

"right."

"This won't work."

Zhou Hongyi shook his head: "How to check and kill viruses without downloading the virus database~www.wuxiaspot.com~ This is impossible."

Of course, it is not impossible.

For general viruses or Trojan horses, even if you don't download the virus database, you can sometimes find them out.

After all, there are some viruses and Trojan horses that have some characteristics, and the anti-virus software itself can also detect and kill them technically.

But now that viruses and Trojan horses are becoming more and more advanced, pure anti-virus software can no longer be eliminated by hard technology.

At this time, it is necessary to download the virus database to check and kill.

However, there is a brand new concept, but he has subverted the previous anti-virus software play.

After sorting out the words, Chen Yu tried his best to make himself easy to understand: "Then if this virus has been checked and killed in the anti-virus software server, and through the anti-virus software server, the virus has not even entered the personal PC. During the spread of viruses and Trojan horses, they are directly wiped out by the back-end server. Is there no need to download the virus database?"

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like