Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 104 Proof (Part 2)

"Okay, since you want me to tell you, then I will tell you, who am I to say that the performance of your security system has not improved but declined? It's nothing. Mr. Lin must have told you what happened last night, otherwise

Otherwise, you wouldn't rush over here today to upgrade the system. Unfortunately, I was the one who arrested Hu Bing and that bullshit vampire angel.

People who have arrived, is this qualified enough? If not, then let me tell you, when your staff were installing the system, I was nearby and used my laptop to easily hack into your so-called upgrade.

Security system later." Yang Yiwei took out his notebook directly from his bag, looked at Li Yifeng and sneered and said.

"Are these enough?" Yang Yiwei asked after seeing the shocked expression on Li Yifeng's face.

"Even so, why do you say that our security performance has declined? You can invade the security system. I admit that you are a very powerful hacker, but I am afraid that the security systems of all security companies in the world cannot prevent the intrusion of all hackers, right?

You are a super hacker, I admit it, but just because you can break into our security system

, just say that the performance of our upgraded security system has not improved, but has declined. This is a naked accusation! I admit that our technology may not be as good as yours, but even so, you cannot insult me ​​and our Yingfeng Network Security like this.

All security personnel." Li Yifeng also jumped up, looking as if he was really angry.

Li Yifeng's look made Yang Yiwei almost vomit. To be honest, Li Yifeng didn't know what was going on with his company's security system. Is it possible? Moreover, the topic was changed so shamelessly that it directly escalated to contempt for the entire Yingfeng network security staff.

How high is it? But whether he really knows it or not, it has nothing to do with Yang Yiwei.

"Insulting you? Framing you? If Lin Ruohan hadn't been my classmate and I worked here, I would have been so full that I would have framed you? What's the benefit of framing you? Since you want evidence, I'll give you the evidence.

." Yang Yiwei opened his laptop without saying anything. The page above was still the analysis report page after the auxiliary system calculation and analysis. Yang Yiwei directly grabbed the computer screen and turned the laptop to face Li Yifeng.

Then he pointed at the analysis items on the computer screen and said: "Do I need to say more about the rest? This is from the previous security system. This is what you call upgraded. Let me talk about this item first. What you added

What is in the so-called Trojan library and virus library? It’s nothing more than a few things that are all passed

Are there any advanced technologies for the latest virus Trojans? You are in the field of network security, so I don’t need to tell you this, right? The anti-virus software used by ordinary users now, and this backward method of matching Trojan libraries, is outdated. You

Am I wrong to add it here for big customers like us?"

Li Yifeng opened his mouth and wanted to say something, but in the end nothing came out. No one sitting here was a layman. The only layman who could be considered a layman was probably Fatty Liu. And people like Li Yifeng obviously used to be technical.

He couldn't refute what Yang Yiwei said, and he couldn't refute it.

"Moreover, your operating command sets can be integrated, right? I don't know what's the use of separating them so much? Do you want us users to feel more cumbersome and safer? Everyone is doing it.

Technically, there’s no need to say more about these, right?” Yang Yiwei sneered again, pointing to yet another analysis.

"Mr. Yang." The person who interrupted Yang Yiwei this time was not Li Yifeng, but a person next to Li Yifeng. This person quickly stood up and introduced himself: "Mr. Yang, my name is Sun Peng, and I am the developer of this security system.

One, I don’t refute the previous one, but regarding the integration of these operating instruction sets, we have tried it. If integrated, many functions will conflict, so we have to separate them, instead of what you said, for

Make it appear more cumbersome and safer."

Yang Yiwei squinted his eyes. The evidence was so abundant. This person even jumped out to talk about this issue. Could it be said that they really cannot be integrated? In fact, Yang Yiwei ignored one issue, that is, the analysis of the auxiliary system was absolutely correct, but Yang Yiwei

I forgot that the auxiliary system was analyzed completely on the basis of a civilization that is simply beyond the earth. Yang Yiwei also ignored that many functions can be realized in the auxiliary system, but they cannot be realized on the earth for the time being.

, or that no one has implemented it yet.

"Since you admit that your technology is not as good as mine, then skip this point. Then you will not refute the following, right? What is the use of these redundant systems? At least I don't see any use, although its functions

It seems to have increased, but these increased functions make the entire security system vulnerable to at least

There are nine more! Is this a fact? More importantly, you don’t deny that the framework of this system is basically the same as that of the original security system, and there haven’t been many changes to this, right?” Yang Yiwei’s rhetorical question made Sun Peng obey.

After a few words, his face turned purple and he sat down awkwardly without saying the last word.

No one present is an idiot. The examples listed by Yang Yiwei can be seen by anyone who understands computer technology. However, it is not easy to see these problems and study them thoroughly! Because the security system has

The sealed and cracked packages produced by Yingfeng Internet Security were analyzed so thoroughly that even the source code may have been leaked! These things were originally impossible for Xingmeng Jewelry Store to see!

Even if this system is customized by Xingmeng Jewelry Store from Shadow Front Security, it is the same! Because Shadow Front Security can completely use it as a pretext for their core security. This is not a secret. For example, Symantec,

McAfee, Kaspersky and other world-famous network security companies basically use this excuse.

But now Yang Yiwei not only saw these things, but also compared them. Li Yifeng didn't say the reason, nor did the so-called system writer Sun Peng, because they knew it well and Yang Yiwei could see it.

In addition to what Yang Yiwei said before, he is the person who hacked into the entire security system countless times. It is obvious that such an encrypted package has been cracked by others, so that such core information can be seen.

Cracking encrypted packets is not the same as cracking website passwords or other encryption, because such encrypted packets are like secret codes from World War II. Even if you intercept them, you can't decipher them without the original codebook.

.Especially with the assistance of modern supercomputers, it is more difficult to crack such encryption, but of course it is not impossible. Brute force cracking is also possible. The problem is to use brute force to crack such a password. With the assistance of supercomputers,

I'm afraid it will take several months.

Li Yifeng and the others didn't know how Yang Yiwei did it, but they couldn't tell such embarrassing things. If they did, they would be laughed out of the industry.

************************

Do you have the tickets? Do you have the collections? I’m naked and begging for recommendations!!!
Chapter completed!
Prev Index    Favorite Next