Reborn 2005: The Internet Myth

Chapter 14 The ambition of the network security market

To put it bluntly, the function of 3271 software is quite simple. After installation, a new search bar is generated under the address bar of the browser. By entering Chinese, you can directly enter the website or get a search results page.

For example, by entering the word "Penguin" you can directly enter the Penguin official website without having to enter the complicated .xxxxxxx... This is a very creative software, and it is free of charge.

So how did it make a lot of money for Zhou Hongyi? To put it bluntly, it forces Internet companies to pay. For example, on Penguin, Taobei and other websites, you have to pay, otherwise I won’t redirect you.

Basically, it means collecting protection fees. And how to collect this money? He collects it according to the number of jumps!

Later, in 2002, Robin Li's Qiandu company developed rapidly, which resulted in no one willing to use 3271 even if it could not be uninstalled.

Everyone is doing Chinese search. Qiandu has the technology, team and patents, and the search results are very accurate. However, 3271 is nothing but uninstallable, so 3271's business slowly declined, and by the end of 2003, it was completely

Sold to Yihu Daxia.

Through this transaction, Zhou Hongyi became the head of Xihu Daxia. Xihu had money and technology at the time, but Zhou Hongyi did not change his stubbornness and quickly changed 3271, changed it, and made Ruihu

When Assistant Tiger came out, he looked quite rogue.

At this time, many people imitated him and created this kind of rogue toolbar. When users opened their browsers, half of the screen was filled with various toolbars, seriously affecting their online experience.

This is also the origin of Zhou Hongyi’s title as “The Godfather of Rogue Software”.

At this time, Feng Qingyang went to Yihu to beg for help, skipped Yihu Daxia, and directly reached a deal with Yihu headquarters. The Thief Group exchanged 40% for 1 billion U.S. dollars plus all the assets of Yihu Daxia.

No one expected that Qihu would just sell Qihu Daxia and completely withdraw from the Daxia market.

Of course Zhou Hongyi doesn't want to do it. Good guy, I've only been here for a year and a half. The contract has been signed for three years, and you're selling all my assets?! But in the end, my arms couldn't twist my thighs, and we had several unpleasant quarrels.

And disperse.

In August 2005, just last month, the transaction between the two parties was completed, and Zhou Hongyi resigned at that time. However, due to the non-compete agreement, he could not work in an Internet company within a year, so he found someone else to help register Qihu.

Technology, he then obtained control of the company through investment, thereby avoiding the non-competition agreement imposed by Xihu.

Riding a tiger, riding a tiger, doesn't mean riding on the head of a tiger. The funniest thing is that Zhou Hongyi is a disgusting person. The domain name of his company's website is fuxkyaho.!

It's a little bit of a thing. People in the Internet industry actually know a little bit about it, and they just talk about it as a joke.

But for Wang Zheng right now, there is a more critical thing. Next year Zhou Hongyi will definitely start working on security, which is the "famous" 365 computer assistant.

When promoting this thing, the emphasis was on "I can kill rogue software", that's right! He completely killed his previous 3271 and Yihu Assistant... It was at this time that Zhou Hongyi and Feng Qingyang got married.

A great revenge was taken.

Although 3271 and Xihu Assistant are rogue software, they now belong to our Thief Group. How do we expect them to divert traffic to our core business Taobei? Just kill them if you say so.

Finally, Feng Qingyang said bluntly: I will never cooperate with 365!

The reason why I pay attention to this news is that Wang Zheng has ambitions for the network security market.

The "Huorong Security Management System V3" he used for Internet cafes can be said to be a peak that cannot be surpassed within ten years after its introduction to the market.

Thinking of this, open the USB flash drive and rummage through the folder "Network Security".

There are not many softwares stored here, but most of them are related to Huorong. For example, "Huorong Security Personal Edition V9.0", "Huorong Vicious Trojan Killing Tool", "Huorong Internet Behavior Management", and "Huorong

Rong Safety Management System Server》.

In fact, there is no charge for the personal version of Huorong, but Wang Zheng’s version is a paid professional version. The company bought it for customers when doing projects, and he conveniently saved it in a USB flash drive, which is simpler and easier to use.

Testing of the program is very necessary. He must check it carefully and there must be no place where it is revealed when the thing was developed.

After testing it for five minutes, I found that the personal version is useless.

The personal version must be connected to the Internet, and functions such as virus library, patch library, pop-up blocking system repair, etc. all need to be downloaded from the server. Huorong Security Company has not been established yet. Where can I download it? It is unrealistic.

He doesn't even know how to modify the configuration file or change the server address.

The professional version is the version that Wang Zheng installed in the Internet cafe. In fact, it is the personal version that adds a local virus signature library and various security tools, making it more concise and efficient. At the same time, users who purchase the professional version can set up their own services.

end, easy to manage.

Because many units are not allowed to connect to the external network at all, the function of vulnerability repair cannot be used at all, and cloud anti-virus is nonsense, so the only solution is to set up a server by yourself.

Before this, the systems in Internet cafes were all fully updated versions. They only needed the three functions of anti-virus, pop-up blocking and attack defense. They are all built-in with the client and can be used directly. There is no need to register an account to connect to the cloud virus database.

and cloud vulnerability patch library. So he was too lazy to install the server program, not to mention there were not so many server resources.

But something went wrong when Wang was testing the vulnerability scanning function... Vulnerabilities were scanned, 13 in total, all discovered after 2007, and there was actually a vulnerability discovered in 2017.

The vulnerability description clearly states the release date, number and other information of the required patch.

My claws are numb now, what should I do?

He wants to block these vulnerabilities and not detect them, but he doesn't know how!

After thinking about it for a while, I decided to set up the Huorong security server first before talking about it.

Installation is very simple, just 'next step' all the way.

Open Huorong Security, fill in the server IP in the configuration, click ‘OK’, and the connection is successful.

Two lines of words are displayed on the software interface: The cloud virus database is connected successfully. The cloud vulnerability patch database is connected successfully.

Hmm? This server has a vulnerability patch library? Update it and try it. Because it is on the local machine, it is very fast and there are not even 13 vulnerabilities left.

Wang Zheng opened the folder of the server program, rummaged through it, and found the folder where vulnerability patches were stored. More than 1,600 patch packages were placed neatly.

But what's the use of this? It doesn't solve the actual problem.

If this software is released and all the vulnerabilities are eliminated, wow! More than ten vulnerabilities were only discovered after 2007, and the patches are complete.

I'm afraid it's not that I'm going to be fucked out by everyone, and that there won't even be any scraps left!

I was about to close it and think of another solution, but accidentally clicked on a patch package, huh?!

Wang Zheng took a closer look and saw a box in the installation interface that clearly read "Security Notice: MS12-077".

After carefully looking through this box, the patch name, vulnerability code, threat level, vulnerability description, vulnerability principle and repair method are all available.

I don’t feel sleepy anymore after seeing this!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like