Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 908 Computer virus

I learned an interesting story from the old executive Charlie.x Chinese x novel...

I heard that when the construction of the Candlelight Building in Fengzhong was about to start, my grandfather Guo Muzhou invited a group of old Taoists from China to help select Feng Shui treasure land suitable for building the building.

Because those Taoist priests lived in the mountains and forests all year round, they all vomited when they were on the plane for the first time.

After recuperating for several days and helping to choose a place, geology experts from the University of California found that that place has a coastal landform and is not suitable for building skyscrapers.

The way of thinking in the East and the West conflicted, and the people on both sides had a big fight in languages ​​that they could not understand, and finally chose to build the Candlelight Building in the Wind.

When Han Xuan heard this, he was helpless. He probably found several Chinese people like his grandfather who were addicted to Feng Shui.

A building worth hundreds of thousands of tons is built on a soft landform. It is estimated that half of it will collapse...

At this moment, Christopher's cell phone suddenly rang.

The eberry mobile phone is produced by our own company, so these employees take it for granted some benefits. Ordinary employees only need to give a cost price to buy blueberry mobile phones from within the company.

They didn't know that it was a cost price, they just thought it was discounted. The company and the supplier signed a confidentiality agreement. The outside world had no idea what the cost price of manufacturing an H-one mobile phone was. Only a few senior management and scientific researchers knew it.

For senior executives at the company's supervisor level, each of them has two free mobile phones as benefits and is delivered to them on the day of release.

Not far from Nvidia's production workshop is the Blueberry Mobile Phone Manufacturing Factory.

Construction is underway there 24 hours a day, and blueberry phones are continuously produced to prepare for their second release in late August.

I don't know what he was saying to others, but his face looked serious. After Christopher hung up the phone, Han Xuan asked: "What's wrong?

If there is an urgent matter, please leave first and I'll take a look.

I might have to go to Stanford University in the evening, and Harris asked me to treat him to a meal."

“It’s the company’s business.

The technical department said that someone was spreading the worm virus again, causing hundreds of users to paralyze the software. They called our company to complain."

Christopher's expression was just helpless, not anxious.

Because since the release of the O chat software, several similar incidents have occurred, and habits have become natural.

In the past, most of these Internet worms were spread by email. Since the number of users of o chat software has increased day by day, those people have turned their attention to this popular live chat software, and o replaced email and became their favorite target of attack.

Hackers around the world often come to harass Hope Technology's website. The most serious time, the company's website was paralyzed for four hours before it returned to normal.

There is never a shortage of smart top hackers in the world. Even if Hope Technology has a powerful security team, it is inevitable that a group of people will find vulnerabilities and besiege them.

Executive Anthony didn't know what the so-called worm virus was, so he asked Christopher.

Christopher replied: "Worms are malicious programs that can exploit system vulnerabilities and self-propagate through the network.

They use O chat software to automatically send malicious messages or files to users' contacts to achieve widespread dissemination purposes.

In addition to attacking the O chat software itself, it can also attack users' computers, use Trojan viruses to steal information from other users' computers, or simply damage their information.

Some time ago, we also discovered a virus that could steal O-software user accounts. Fortunately, we discovered and made up for the loophole in time, otherwise the harm it could cause is quite great…”

It is still in the early stages of Internet development, and the people from Hope Technology Company have never talked about this to Han Xuan.

Therefore, he subconsciously ignored the importance of antivirus software.

In the early 2000s, live chat software such as qq and msn were also affected by computer viruses. As antivirus software became increasingly perfect, the situation improved slightly.

Now hope Technology's software is far ahead in the industry and has become the target of attack that hackers use to prove their strength and make fun of.

Han Xuan asked Christopher: "Companies and software are often hacked? Is the situation serious?"

Old Charlie said: "It's still within the control range.

Money is just a small problem, and some users have questioned the safety of our company's products, which is not good for reputation."

Christopher nodded in agreement and said, "We are trying to solve it. We just made up for a loophole. Those hackers will come up with new ways to attack, which is simply unpredictable.

Once my friend sent me a link, and after clicking it, I found something was wrong. I almost got poisoned even my computer, not to mention other ordinary users.

An announcement was issued last week, reminding them not to open unknown website links randomly, especially the most viruses in restricted websites."

“…restricted level.”

Han Xuan looked strange, thinking that this thing appeared very early, so he coughed lightly and continued, "It's not a solution to continue like this."

I think our company should start developing an antivirus software..."

"That thing.

Antivirus software has appeared now, but it has not been used on a large scale.

That antivirus software is very complicated to operate and is not suitable for ordinary computer users. It is an antivirus software specially developed for professionals."

Christopher replied to Han Xuan:

"There was an employee of the company who proposed this idea before, and we are trying to develop it.

The principle is very simple. First, extract a piece of representative code from the virus and place it in the software virus database.

By opening permissions by the user who installs antivirus software, let it search on the computer hard drive to check whether the file contains the virus characteristic code in the virus database.

If the virus characteristic code is found to correspond to the virus, you can determine which virus is hidden in the file.

This method is the simplest and most practical, but it requires a lot of manpower and material resources to maintain and upgrade, and the virus database needs to be continuously updated to be effective.

In addition, there are also technical difficulties. Not all users use the same desktop operating system..."

"Don't worry, after Microsoft's indos1995 is launched, those messy desktop operating systems will almost be defeated by it.

Our company only needs to develop two operating systems from Microsoft and Apple.

As for the problem of too much overhead, we can implement a free experience policy for users in the early stage, and then charge these antivirus software after one or two years.

There is no free lunch in the world, I believe users can understand..." (To be continued.)
Chapter completed!
Prev Index    Favorite Next