Rebirth of Cyber ​​Hegemony

Chapter 974: Zoom In: Cloud Antivirus

"Chen Yu, I got secret news, and Microsoft may attack us again."

"Hasn't Microsoft been hitting on us all the time?"

"I'm referring to the same virus attack as last time."

Zhou Hongyi, the head of 360, came to Chen Yu's office.

With such a big move by Microsoft, it is impossible to fail to disclose half of it.

But even after getting the news, Zhou Hongyi was still extremely nervous.

It seems that this time is obviously much more dangerous than the last time.

"Again?"

Chen Yu frowned.

Microsoft's suppression of Huanyu Technology is really all the time.

Seeing that the three major game manufacturers have brought a lot of benefits to Huanyu Technology, some software and hardware companies have also joined the Huanyu camp. Unexpectedly, so soon, Microsoft's next wave of attacks will come.

"Yes, Microsoft is said to have contacted several of the world's top antivirus software companies."

"Antivirus software company?"

Chen Yu was stunned, and subconsciously said: "Aren't they anti-virus, they can make it?"

"Not only do they know how to make drugs, but they are also masters at making drugs."

Zhou Hongyi smiled helplessly.

In fact, they have a lot of masters in 360, but they have always been very low-key.

And in order to better serve users, 360 has been absorbing all kinds of excellent hackers from all over the world.

If you don't even know the number of hackers' attacks, how can you prevent these hackers?

Like Li Jun, the author of Panda Burning Incense, Zhou Hongyi absorbed him into 360.

"Uh……"

Chen Yu patted his head: "I didn't turn around."

"Can you stand it?"

"Enough.

"

Zhou Hongyi shook his head: "It was very difficult for us to attack us with the strength of Microsoft before, not to mention that they have united so many top security giants. I believe that these giants must have been cooperating and constantly studying us during this period of time. The Huanyu system. Maybe at some point, it will give us a fatal blow."

"Have you talked to Li Jun to see if he can come up with a super panda to burn incense?"

"Can't figure it out."

Zhou Hongyi shook his head depressedly.

The last virus attack was the panda burning incense secretly created by Huanyu Technology, which temporarily interrupted Microsoft's attack.

But, this time, it is absolutely impossible.

"Microsoft has patched the vulnerabilities exploited by Panda Incense. In addition, major top antivirus software companies have thoroughly researched Panda Incense, and even launched a series of Panda Incense special kills. , the route of infection... wait, I'm already familiar with it."

"Then do something a little more awesome."

"We also want to, but this one is unattainable."

Chen Yu doesn't know much about technology, but Zhou Hongyi, who has a lot of research on technology, understands how difficult it is.

Learning from the experience of burning incense with pandas last time, even if you can still produce a series of viruses, it is absolutely impossible to spread to the world as quickly as last time. They have blocked this road, and if there is no other discovery, it is basically impossible.

"On the contrary, we need to worry that these top system security companies will give us a virus like a panda burning incense."

Although Microsoft has been attacked by panda burning incense before, its reputation is not known how much.

But no matter how bad Microsoft's reputation is, you still have to use Microsoft's windows.

It's not that everyone doesn't want to change the operating system, but they can't if they really want to.

Not to mention other countries, even domestic ones, it is not so easy to get rid of windows completely.

But for new operating systems, that's not the case.

They can't get rid of windows, but they can definitely replace the universal system at the first time.

After all, when they replaced the Universal System, they were actually trying.

If it works well, it will of course continue to be used.

If it is not used well, the probability of switching back to Windows is very high.

"Cannon, what are your thoughts now?"

"What can I think, I can only recruit troops all over the world and poach all kinds of system security experts. However, I guess I can't stand it. After all, Microsoft's strength is not blown out, and they have joined a series of world's top Security company. This time, they just want to launch the strongest offensive against us. If we can't resist it, it is estimated that the road ahead will be really difficult. "

Chen Yu nodded.

He knows the current situation.

In fact, the PK between Microsoft and Huanyu Technology has hit so far that Microsoft has not had too many ways to deal with Huanyu Technology.

To block the online games of Huanyu Technology, Huanyu Technology can also support it through Internet cafes.

Moreover, they can also launch more powerful games to fight against Microsoft's windows market.

Especially now that the three major game companies have made a high-profile announcement to join the Huanyu camp, which has also stopped Microsoft's ban.

But if it doesn't act like this, then Universal System will sooner or later grab the Windows market step by step.

Then, it is better to concentrate all the resources and give Huanyu Technology a slap in the face.

"And Microsoft has also learned to be smart, and they have also begun to hang Trojan horses on various websites, and many users of our Huanyu system have been recruited."

Zhou Hongyi cursed.

But although he scolded, I have to say that this trick is really insidious.

Even if this trick was thought up by Huanyu Technology itself, there is no way to crack it.

Microsoft Windows users will download small movies, and Huanyu system users will also download small movies.

"Hehe, Microsoft has applied what they have learned."

"You can still laugh, you made this trick, and now you can't think of a solution."

"Who said I couldn't figure it out."

Chen Yu said: "I came up with the trick, and I have a solution."

"Can you solve it?"

Zhou Hongyi couldn't believe it: "These educational films are all downloaded by users on their own initiative. They are actively running Trojan horses and viruses. Even our antivirus software is useless."

"Actually, it's easy to solve this problem."

After thinking about it, Chen Yu called Xie Zhang over.

Xie Zhang is in charge of 5173.com. He also acts as an agent for some games and is also responsible for the management software business of Internet cafes.

"Xie Zhang, I think our Internet cafe management software needs to add a function."

Chen Yu told Xie Zhang.

"Mr. Chen, do you think our Internet cafe management system is not perfect?"

"right."

Chen Yu nodded: "Mr. Zhou told me just now that there are many users in the Internet cafe who like to download small movies, small educational films, etc. Do you have a solution?"

"this……"

Xie Zhang was a little embarrassed.

This is the spontaneous action of Internet cafe users, how can he find a solution.

This phenomenon is very common, not only ordinary users have done this, but also Xie Zhang in the past.

Everyone is young.

Young people naturally have a lot of energy that cannot be vented.

So in addition to venting in the game, naturally you have to download some small movies and small educational films.

So where to download?

The first place that all users come into contact with is Internet cafes.

Don't think that there are a lot of people in the Internet cafe, why are you embarrassed to download or watch small movies?

Too underestimate the psychological endurance of the netizens.

Don't say there are a lot of people in the Internet cafe, even if there are a few girls on the side, all the users can see it with peace of mind.

"Look, Xie Zhang can't help it, right?"

Zhou Hong spread his hands.

If this move was not so dark, the original Blizzard would not have been killed by Huanyu Technology's move without any room to fight back.

Of course, not only Blizzard, but now Chen Yu's trick also makes Microsoft's operating system threatened by various Trojan horses and viruses from time to time.

But now, in turn, this move is also the turn of Universal Technology.

It's just that Chen Yu is calm and natural: "You guys, how can there be nothing in this world that can't be solved?"

"There are always more ways than difficulties."

"A lot of netizens like to download small movies in Internet cafes, so why don't we have a one-click restore function for the Internet cafe management software?"

Chen Yu suddenly proposed a solution.

"one click recovery?"

Zhou Hong was taken aback.

"Yes, as long as the Internet cafe user gets off the computer, all the small movies and small educational films he downloads will be deleted with one click and restored to the original Internet cafe settings."

This move is naturally a new function added to the Internet cafe management software in later generations.

This function, in fact, is also to solve the security problem of Internet cafes.

Because at that time, there were too many cases of hacking, poisoning, and Trojan horses in Internet cafes.

But it is impossible for Internet cafe owners to restrict each user.

So what to do?

A programmer came up with a good idea, that is, a one-key restore function in the Internet cafe management software.

As soon as this function comes out, no matter whether you downloaded small movies or games before, or what you are doing, all are cleared.

In this way, it does not interfere with the Internet cafe users' Internet access, and at the same time ensures the system security of the Internet cafe, killing two birds with one stone.

"I'll go, Mr. Chen, your move is awesome."

Xie Zhang was confused for a while, but after a while, he completely understood.

"Nima, Chen Yu, you are really talented, I have convinced you."

Zhou Hongyi also said to Chen Yu with admiration at this time.

Such a sinister trick that drives the world crazy, was actually restored to a clean break by Chen Yu's little trick one by one.

"Xie Zhang, when will this function be developed?"

"One day."

"Okay, let's do it."

The one-key restore feature is nothing new.

It is not only available on the Universal system, in fact, there is already a one-key restore function on the Windows system.

This function is actually the same idea used in Internet cafes.

Also for system security.

If there is any virus in the system, there is a Trojan horse, or the system crashes, or it slows down.

Directly to a one-click restore, restore to the point in time you think is safe.

At the same time, one-key restore is simpler and more convenient than reinstalling the system.

It's just that this function is good, but there are some troubles in the previous users' use.

For example, after one-click restoration, many more important data are also cleared.

Therefore, most people do not need this one-click restore.

But this is different for Internet cafes.

Internet cafes only need to ensure the security of their computers, and they will not keep the data stored by users on their computers.

Not only did they not want to keep it, but if they didn't have this system, they would have to clean it up every now and then.

After all, there are a lot of netizens who like to download things on the computer, but don't delete them after downloading. They have been there for many years, and the whole computer will be blocked by them.

At this time, the one-key restore function is added to the Internet cafe management software. It can almost be said that you can go to Internet cafes to surf the Internet in the future.

You don't need to worry about poisoning anymore, and you don't need to worry that downloading small movies will poison the computer of Internet cafes.

"The Internet cafe has been solved, but what about our personal PC Huanyu system?"

After a short period of excitement, Zhou Hongyi asked again.

Although at present, the main business of Huanyu System is in Internet cafes.

But if you just keep staring at the Internet cafe, then the Universal System cannot be launched.

Moreover, under the strong intervention of various games of Universal Technology and Acer, the three major game companies, the market of Universal System in the personal PC computer side has gradually increased. Although it is still not comparable to Microsoft windows, it is the most worthy market for Huanyu Technology.

"We do have some trouble with our PCs."

Personal PC computers are no better than Internet cafes.

Internet cafes have professional administrators, and a series of service companies serve him.

Internet cafe owners pay attention to computers every day for business and safety.

A personal PC computer is available, which is for personal use.

The level of personal computer use varies.

It may be better if it is higher, and it is more difficult to be poisoned.

But really, more than 90% of the users of personal PCs are computer novices.

Some do not say that they will not install an operating system, and they may not even be able to download a software.

They only play YY, watch movies, play a game, etc... As for the slowness behind the computer, the stuck, the virus, they have no choice but to spend money to repair it.

Of course, the same goes for Microsoft Windows users.

But windows has formed a monopoly, and he is not afraid of the loss of users.

But any PC user of Huanyu Technology is extremely precious, and it would be distressing to lose any Chen Yu.

"Actually, it's not that there is no way, it's just that this method is a little more complicated."

"Chen Yu, say it."

"Cannon, have you heard about cloud security?"

"Cloud security?"

Zhou Hongyi shook his head: "What is cloud security?"

"This is..."

Sure enough, cloud security was indeed a new thing in 2005.

I remember in my previous life, at the end of 2006, at the World Search Engine Conference, the so-called cloud business appeared for the first time.

At that time, Google first proposed the concept of cloud computing in the world, which caused a sensation in the whole world.

With the help of the concept of cloud computing, a series of cloud services have emerged in China.

For example, like Penguin Cloud, Alibaba Cloud, etc.

Cloud security is actually a type of cloud computing.

Chen Yu is not a computer major, and it is difficult for him to explain this theory. However, although Chen Yu is not a computer major, but he has the vision of so many years in his previous life, even if it is professional, he can describe it to him in ordinary words.

"That's it, Brother Cannon, if a Trojan or virus comes out, what should we do?"

"In the first step, our antivirus software company will analyze the virus and provide the virus signature. In the second step, the user downloads the virus signature, that is, downloads the virus database, and then can be checked and killed."

"Is this a bit slow? And what if the user doesn't download it all the time."

"It's a bit slow. You mentioned automatic downloads at the time, but automatic downloads also have shortcomings."

"Automatic downloads take up too much system resources."

"Yes."

"Then let's change the way of thinking, can users not download it?"

"Don't download?"

Zhou Hongyi was puzzled: "Chen Yu, do you mean you don't want to download the virus database?"

"right."

"That won't work."

Zhou Hongyi shook his head: "How to scan and kill viruses without downloading the virus database, this is impossible."

Of course, that's not to say it's impossible.

For general viruses or Trojans, even if you don't download the virus database, you can sometimes find them out.

After all, some viruses and Trojans have some characteristics, and the antivirus software itself can technically detect and kill them.

But now viruses and Trojans are more and more advanced, and simple anti-virus software cannot be eliminated by hard technology.

At this time, it is necessary to download the virus database for killing.

However, there is a brand new concept, but he has subverted the previous antivirus software.

After sorting out his words, Chen Yu tried his best to make it easy to understand: "If the virus has been detected and killed in the anti-virus software server, and the virus has not even entered the personal PC computer through the anti-virus software server, During the spread of viruses and Trojan horses, they were directly eliminated by the background server, so there is no need to download the virus database?"

Chapter 991/1195
82.93%
Rebirth of Cyber ​​HegemonyCh.991/1195 [82.93%]