Reborn 2005: The Internet Myth

Chapter 17 Registering Several Domain Names

Wang Dalong has been in this industry for many years, and naturally knows that this business is obviously more profitable than board distribution. If the software is really as effective as Wang Zheng said, maybe he can use this to get to the next level.

Wang Zheng asked him to go to Qingchun Internet Cafe to actually experience the billing system, so that he could better communicate with customers.

Although it was a temporary idea to cooperate with Wang Dalong, this big brother is very nice and has such a close relationship, so it is indeed worthy of long-term cooperation. Moreover, he is originally engaged in accessories distribution and has a wide range of customer channels.

Anyway, Wang Zheng's purpose is to occupy the market as soon as possible, obtain funds to do other businesses, and simply share some profits. It is more important to speed up the process of capital accumulation.

In 2005, there were too many profitable businesses.

Not to mention the distance, now that Huo Rong is safe, we have to set up the stall as soon as possible.

After seeing off Wang Dalong and waiting for the master from Beilian to come over and pull up the network cable, it was time to have dinner.

There is a small kitchen in the apartment, which is very convenient.

I bought some vegetables from the supermarket downstairs, made two simple dishes, and also packed a bottle of dry red wine.

Even though we are alone, we can still celebrate the fact that we have burned the bottom of the pot.

In the next 20 years, Wang Zheng never lacked a girlfriend, but he was running around following projects every day, and in the end he was unable to settle down and get married.

I have practiced some cooking skills, but of course I can't compare with professional chefs. I can make ten or eight home-cooked dishes without any problem.

As long as a single man is not lazy, he can actually live a happy life.

After dinner, Wang Zheng began to install systems on the computer and server respectively.

The desk is big enough to accommodate two 19-inch monitors, keyboard and mouse.

The computer chose to install the win7 system, which has higher compatibility with the software. Four 1G memory sticks that cost a lot of money have worked, and the operation is relatively smooth.

The MS2008 version system was still installed on the server. During the installation process, he suddenly thought that he needed to find time to replace the server system on Feiyang Internet City back to MS2003 as soon as possible to avoid leaks.

After installing the server of "Shocking", I did not switch immediately. It is best to wait until around 8 o'clock in the morning to avoid players getting offline.

With VPN services and corresponding security policies in place, the servers of Qingchun Internet Cafe and Feiyang Internet City can be directly connected to him through the VPN virtual private network. From now on, Wang Zheng can perform remote maintenance here at any time.

The management side, server side and database of "Cloud Network Billing System" are also indispensable.

After all, he has a share of the Internet cafe, so the database of Internet cafe users naturally needs to be backed up with him, so that future accounts can be settled at a glance.

Uploading user data in real time also adds a guarantee to the Internet cafe. Once the server of the Internet cafe has a serious failure and causes data loss, it can be restored from it without affecting the operation of the Internet cafe.

After finishing these trivial matters, Wang Zheng changed back to his office computer and started applying for a domain name.

A domain name is the name of an address on the Internet.

Since IP addresses are inconvenient to remember and cannot display the name and nature of the address organization, the boss designed the domain name address and mapped the domain name and IP address to each other through the DNS system, making it easier for people to access the Internet without having to go

Remember a string of IP addresses that can be read directly by the machine.

If you think of "accessing a webpage and entering a domain name" as looking up a contact, DNS is equivalent to a phone book. You can directly dial the "phone number" and access the webpage more conveniently.

Domain names need to be registered and renewed every year.

And some domain names are of great commercial value, such as 360. The transaction value of this domain name at the time was 17 million U.S. dollars. Two years ago, QQ. This domain name was successfully purchased through Penguin's continuous deception, and it also cost about 100,000 U.S. dollars.

Wang Zheng mainly wants to take advantage of the fact that there are still many good domain names and register all the businesses he plans to launch in the future to avoid wasting money in the future.

Of course, if there is a relatively well-known domain name in his memory that happens to be unregistered, he can also invest in it.

The cloud network billing software requires a domain name. I originally wanted to register wangba, but I checked that it had already been registered, so I searched for it in English cloud, but to no avail.

Inexplicably, I thought of icloud, which is pretty good. Although this top-level domain name is no longer available, it has not been registered.

There is nothing more to say, just register directly. Use it first, and then you can sell it to the Big Apple at a high price.

Huo Rong's full spelling was relatively long, so he successfully acquired three important domain names, ./.et, with hu as the second-level domain name. The registration fee was 59 yuan, and the annual renewal fee was more than 80 yuan.

After registering, Wang Zheng inexplicably thought of Zhou Hongyi's 365. After checking, 365. and 365. had been registered, but 365. had not.

The website of Qihu Technology is still listed on fuxkyahoo., so I quickly registered it. If I don’t mention whether I can sell it to Zhou Hongyi at a high price, the value of the domain name itself is very high.

It took an hour to register about a dozen /et domain names, most of which were intended for practical use.

After registering the domain name, you still need to bind the IP address and create a web page so that users can access it normally.

However, making web pages is not within Wang Zheng's ability. He can just find someone to do it later.

After sorting out the domain name matters and documenting them, Wang Zheng began to search for information about "system vulnerabilities."

As we all know, you can make money by discovering Microsoft system vulnerabilities.

There are two types of buyers of system vulnerabilities. One is Microsoft itself. They give corresponding bonuses according to the degree of danger of the vulnerability. Of course, the amount is relatively low, especially in 2005, the maximum was only 10,000 US dollars.

The other type is hackers.

Some hackers buy vulnerabilities for reputation, and the prices they offer are relatively low.

Some hackers will spend a lot of money to buy vulnerabilities, and then use the vulnerabilities to create viruses or Trojans to benefit from them.

The value is uncertain; some serious vulnerabilities can be sold for millions of dollars.

To be honest, Wang Zheng felt that the profit from selling this thing to hackers was far less than that from selling it to Microsoft.

Because Microsoft will issue a thank you announcement to thank someone for submitting a system vulnerability or the like.

Wang Zheng wants to launch Huorong Security as his first Internet business, and reputation is still very important. It is best to become famous with one shot, then with the second shot, and with the third shot, and completely establish "Huorong" on the Internet. of fame.

Taking advantage of the trend to establish a company and launch "Huorong Security" is very NICE.

Entering Microsoft Daxia's website, Wang Zheng easily found the page of MSRC, which is the Microsoft Security Response Center, and found the entrance to submit vulnerabilities here.

Registration is quite convenient. At this time, most website registrations use email as a verification method, and Microsoft is no exception.

After registering an account with the nickname Huo Rong, he immediately submitted three system vulnerability descriptions with a high threat level, and also copied the solutions.

These vulnerabilities were discovered in 2007 and affected systems including win2003 and winXP.

I soon received an automatic reply from Microsoft in my mailbox, to the effect that we have received it, please wait, we will send you the money in time after verification.

Turn around and continue picking up the patch package.

This is not an easy job. Because Wang Zheng installed systems other than winxp and win2003, he had to install two virtual machines first, install the original systems respectively, and then use "Huorong Security" to scan.

Computer performance is inherently insufficient, and installing a virtual machine will make it even slower, causing the operating system on the virtual machine to run like a PPT.

It's okay, what else can it do?

In accordance with the principle of ignoring all vulnerabilities before 2006, Wang Zheng compared the names of vulnerabilities after 2006, first found the patch package, and then removed the documents from the patch package.

He also has to read the document carefully. He can't understand the code and so on, but he can still explain it.

The purpose is to avoid causing an own mistake.

Microsoft is an interesting company. Some of their vulnerabilities appear because they updated a previous vulnerability.

In other words, they found that the door was broken, so they sent a patch to repair it. But they accidentally opened a window.

Then send out another patch to fix the windows.

After picking up these patches bit by bit, it was already late at night.

Sure enough, no one can succeed casually! Sleep!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like