Ressurring Network Controversy

Chapter 975, how to be so difficult

();

"The virus is eliminated in the way of communication?"

"Correct."

"Don't you need to kill yourself?"

"No need."

"Wait ... Chen Yu, you let me think about it."

This new idea has some impact Zhou Hongyi's thoughts.

Originally in his philosophy, the computer should antichelly, first download anti-virus software, then the anti-virus software provides a signature, then download the virus library, then kill. This is not just 360 anti-virus software, all of the world's anti-virus software companies do.

But now, Chen Yu's philosophy is completely subverting Zhou Hongyi's understanding.

Users do not need to download the virus library.

Even users don't need to kill.

All all operations are only completed in the server.

"Oh my God……"

Zhou Hong began to think this is incredible, and I can't say it directly.

However, he is familiar with the computer, but it is known that this is possible.

The Internet not only has the function of communication, but also, he also has processing information and computational functions.

Previously a series of kills can only be in the local, but now it is not required to be locally, he only needs to pass through the network.

Through the network, the background server already knows that you have poisoned, the virus is not to your computer.

"Chen Yu, can you talk about it again?"

There are some chaos of the mind, and there are still some don't understand it.

"Simple, that is, this is actually something similar to anti-spam. Our email will receive a lot of spam every day, but we have no way to remove this spam manually. But later Some people think of a way, they set some spam to a certain feature. When such a message is sent to a certain amount, he is set to spam. "

"Trojans are the same, in fact, they all have a similar feature. In the past, the personal PC computer can only manually kill themselves, and some have not downloaded the virus library and can't kill. However, if we build big data, we can first Time recognizes these viruses, and the first time will kill him. This also reached the virus has not started spreading, and our server will give him. "

"Of course, our server requires superior computing power. If there is no such ability, we cannot analyze massive viruses, data, and check."

Chen Yu is not allowed to be a special expert on cloud killing.

He knows that in this, it is really not only just what he mentioned just now.

In this regard, it will involve the identification of viruses, analysis of massive data, a large number of client feedback, super server, massive fund support, and the opening of the entire system.

However, this concept is undoubtedly new, and it is most effective.

One but formed.

Future network security can at least more than 90%, even after the computer does not need to consider whether there is a virus or Trojan.

"My Grass, Chen Yu, I really want to open your head and see what your brain is doing?"

"Open you will see a large slurry."

"Roll out. Sister, I am defeated by you, you have a guy that you have a little technology, I have come up with such a new idea."

Zhou Hongyi is very excited.

Although Chen Yu said is not particularly detailed, even there is still a fault.

However, Chen Yu said the concept, direction, and no doubt, Zhou Hong, I understand.

In fact, he has always felt that traditional anti-virus software has a fatal issue.

Is it constantly updated a virus library in the face of massive viruses?

You must know that from existing data analysis, a series of viruses in the world, and the number of Trojans have been broken or even a hundred million.

One ordinary computer is really unable to download so many virus libraries.

Even if you can download, the computer has to be allocated by the antivirus software to allitely.

At this time, Chen Yu said by the clouds, but opened a new road to Zhou Hongyi.

"Don't pull this, how can you get it?"

"Although it is very complicated, but, line. But ..."

"But what?"

"There are two problems now."

"what is the problem?"

"A server we must need."

"buy."

"The other is that our bandwidth may not be enough to support our calculations."

Cloud computing is the most important thing to network.

Without the support of the network, cloud security can not be implemented.

The larger the network rate, the better the cloud security effect.

But in 2005, although the speed has increased much, there is still a lot of distances than the later generations.

"This is also simple, we distribute a series of servers across the country to achieve the optimal network rate."

"My grass, this is a huge amount of money."

"Nothing."

"But our 360 is free, you can't make too much money in your business."

"Nothing, we have a game."

"What is the relationship with the game?"

"I have made Zou Wei to make a accelerator called Xunyou, although this accelerator is different from cloud security, but in fact, in some places, it is still connected, for example, servers all over the country. At the time, I considered only this accelerator only Our , but now I am ready to open, everyone can use it. Of course, this is a charge. "

"How is this software charge?"

"Temporarily 10 yuan for a month."

"I am afraid this fund will still not support our cloud of virus."

"This is just temporary, and then we can actually pick other business. For example, some large sites should be erected server, but the server cost is too large, the operation is also complex, they can't help him, then we can help him, our server You can give them as a server. Or, all the data on their website is our server to calculate him. "

"what……"

This is said that Zhou Hong placed the light.

This is just a single anti-virus software business relative to the previous cloud security.

The anti-virus software business is stronger, he is only a single business, and the profitability is not strong.

Moreover, 360 is still free, there is not much profitable space for the time being.

But at this time, the cloud computing acts as a server of a series of websites, which is a huge business.

Don't think this business is just some telecommunications companies or some small network corporate rental services.

Some small websites naturally do not have much funds, can you some large sites?

Their needs of the server are extremely large.

Website like 12306 Railways in the past.

This website looks just a website of a network train ticket, but this site sometimes can have billions of data requests.

One of the large websites like this is a big money to make a server. Even if it is the cost of a horror, there is no technology.

With this, it is better to find some cloud service companies.

Ali of the past life undertake the cloud data service of the railway website.

Of course, this is not only just.

In the future, with the continuous development of cloud computing, in storage, medicine, financial insurance, e-commerce, search, education ... will have a huge development.

"Chen Yu, will we do anti-virus in the future?"

"Look at you."

Chen Yu smiled.

He understood that Zhou Hongyi's eyes, he certainly saw the future of the cloud computing this piece of business, the absolutely complete anti-virus.

It is said that Huanyu Technology has to set up a new department.

This department is cloud computing.

No, not called cloud computing, called Huanyu Yun.

Huanyu Yun ... I want to think, Chen Yu has some excitement.

Now there are no cloud computing this concept yet.

In the future, cloud computing, cloud service, and Huanyu technology can definitely become the dominance.

"Okay, don't say these, cloud killing this piece of you is responsible, Microsoft and a large pile of top security giants in the world can not be underestimated."

"Reassured, we may not be their opponent before the cloud kill, but how can we have a dozens of tricks with them. After these few tricks, our clouds are also launched."

"Row."

Chen Yu nodded.

However, he did not relax.

Anti-theft anti-virus has always been a long-lasting battle.

Huanyu technology can't completely put the anti-theft in anti-virus software.

In fact, the major business itself can do a series of operations.

For example, Chen Yu makes the secret card that makes all major game departments.

Now Chen Yu feels that the light has a secret security card is not enough.

Gamers will use secret security cards, but some YY account players, they may not use secret card.

So what should I do this time?

In fact, there is no way, such as YY can provide a more secure guarantee to identify the user's Internet IP address.

As long as the user's Internet IP address is different from the local, YY will prompt the user and then launch the anti-theft test.

Chen Yu communicated such an idea to Li Nan, YY and other sectors adopted the recommendations mentioned by Chen Yu.

......

In the next few days, Chen Yu sat in the office and kept the Microsoft's actions.

In fact, Microsoft's movements have begun after they have contacted major top security companies around the world.

The first step, they also learned Huanyu Technology.

First, in the hacker website heavy gold reward ring system all kinds of vulnerabilities.

Then hang a series of Trojans, viruses in a series of small movie websites.

Have to say, this trick is not said to be useless.

When many people download small movies, they still recruited.

However, there are not many people in the middle.

This makes Microsoft and the major anti-virus software companies are somewhat strange.

Some viruses have been tested with Trojans, as long as they are placed in a ring system.

Reality feedback to them is that it is so bad.

For example, Trojans.

Either Trojan is cleared, or even if it is not cleared, it seems that the game password that is stolen is fake.

If you cleared, you will not be studied, it should be the 360 ​​of Huanyu Technology.

But there is no clearing to the account, what is going on?

I just wanted to not pass.

But later, they found a fact that they were unbearable.

"Huanyu secret insurance."

This is the secret card for Huanyu Technology's business account for all subsidiaries of Huanyu Technology.

This secret security card is mainly provided for online games.

Because there are many equipment in online games, it is easier to become the presence of the hairdress.

As a result, in order to reduce the hairdress of Huanyu Technology online games, they came up with an idea of ​​secret card.

This security card has two types.

One is a secret card that recharge earning.

In addition to the user needs to enter an account password, in addition to the user needs to enter the password in the secret card.

According to reason, the password in this secret card can also be stolen.

But it is not possible.

Because the password in the security card is dynamic.

The recharged security card has corresponding coordinates, and the coordinates per input are different.

This is a primary version.

More advanced version, it is a super dynamic password for 15 seconds.

This advanced version is no longer a recharge, but a small electronic instrument for official selling.

This instrument is bound to the user's account, and each time the account will generate a dynamic password.

And, this dynamic password will be randomly regenerated in 15 hours.

Can you imagine this kind of anti-theft technology?

Don't say that you have a Trojan in their computer, even dozens of hundreds of Trojans, you can't stole him.

"Sister, there is such a trick."

"I said that how to lose to Huanyu technology in China, the means of this anti-theft, and the blizzard is twice."

"Niuk, I have some accounts for Huanyu Technology's account."

A "destroying group" consisting of a Microsoft and the major top network security companies have some crazy.

They have always thought that they were the most top hackers in the world, computer experts.

Unexpectedly, let them happen to steal a game account.

This is just a face of red fruit.

However, they quickly reorganized the flag.

As the elite in the global computer world, they cannot be knocked down by such difficulties.

They calm down, analyzed the drawbacks of Huanyu Technology.

They acknowledge that Huanyu Technology does have many people in many online games.

But not everyone, not all players used.

Especially those who are not game accounts, like YY account, circle account ... etc Moreover, this may have a heartache if the game account is stolen. Despite their thieves, the circle account does not have too much economic value, and the general hacker does not want to happen to the thieve.

But their hacking is not for money, they are in order to combat the Huanyu system.

One retest, and it is a series of Trojans.

unfortunately……

This time, there is still a small account than the previous account.

"what happened?"

"Do you have anyone who play YY uses security?"

"It's impossible."

Safety experts are thrown.

Try to log in the YY account with the password.

System prompts that the address you log in is incorrect with usual use account address, please complete the anti-theft test.

(This chapter is over)