Chapter 975: Why Is It so Difficult to Steal an Account?
"The virus was wiped out while it was spreading?"
"right."
"Don't need users to check and kill themselves?"
"unnecessary."
"Wait...Chen Yu, let me think about it."
This new concept has some impact on Zhou Hongyi's ideology.
Originally, in his concept, if a computer needs to be anti-virus, it must first download anti-virus software, then the anti-virus software provides the signature code, and then the user downloads the virus database, and then scans and kills. This is not only done by 360 antivirus software, but also by all antivirus software companies in the world.
But now, Chen Yu's concept has completely subverted Zhou Hongyi's understanding.
Users do not need to download virus database.
Even the user does not need to be killed.
All operations are done only in the server.
"Oh my God……"
Zhou Hong thought this was incredible at first, and wanted to say it was impossible.
However, he, who is familiar with computers, knows that this is theoretically possible.
The Internet not only has the function of communication, but also has the function of processing information and computing.
In the past, a series of killings could only be performed locally, but now it does not need to be locally at all, he only needs to go through the network.
Through the network, the background server already knows whether you have been poisoned and whether the virus has come to your computer.
"Chen Yu, can you say more?"
There was some confusion in his mind, and for the time being, Zhou Hongyi still didn't quite understand something.
"Simply, this is actually somewhat similar to anti-spam. We receive a lot of spam every day in our emails, but before we had no choice but to manually delete these spam one by one. But then Someone came up with a way, they marked some spam with certain characteristics, and when such an email was sent to a certain amount, it was designated as spam."
"The same goes for Trojans and viruses,
In fact, they all have similar characteristics. In the past, personal PC computers could only be manually checked and killed, and some could not be checked and killed without downloading the virus database. However, if we build big data, we can identify these viruses at the first time, and kill them at the first time. This has also reached the point where the virus has not yet started to spread, and our server will destroy it. "
"Of course, our servers need super computing power. Without such capabilities, we would not be able to analyze and kill massive viruses and data."
Chen Yu is not an expert on cloud antivirus.
He knows that in this one, the real realization of this function is not just what he just mentioned.
This will involve virus identification, massive data analysis, massive client feedback, super powerful servers, massive financial support, and the opening of the entire system.
However, such a concept is undoubtedly new, and it is the most effective.
Once formed.
In the future, network security can be improved by at least 90%, and even in the future, computers will hardly need to consider whether they will be infected with viruses or Trojan horses.
"I mean, Chen Yu, I really want to open your head and see, what does your brain do?"
"Open it and you'll see a big piece of brains."
"Fuck off. Sister, I was beaten by you. You, a guy with no skills at all, came up with such a brand new idea."
Zhou Hongyi was extremely excited.
Although what Chen Yu said was not particularly detailed, some were even technically wrong.
But the concept and direction Chen Yu said, no doubt Zhou Hongyi understood.
In fact, he has always felt that traditional antivirus software has a fatal problem.
Faced with a large number of viruses, is it that the virus database has been continuously updated every day?
You must know that from the existing data analysis, the number of a series of viruses and Trojans in the world has exceeded 10 million or even 100 million.
An ordinary computer really cannot download so many virus databases.
Even if it can be downloaded, the computer must be completely occupied by so many resources of antivirus software.
At this time, the cloud antivirus mentioned by Chen Yu opened a new path for Zhou Hongyi.
"Don't talk about it, how about it, can you do it?"
"It's complicated, but, okay. But..."
"But what?"
"There are two problems right now."
"what is the problem?"
"A server that we must need a lot."
"purchase."
"The other is that our bandwidth may not be enough to support our calculations."
The most important thing in cloud computing is the network.
Without the support of the network, cloud security cannot be achieved.
The higher the network speed, the better the cloud security effect.
But in 2005, although the speed of the Internet has increased a lot, there is still a lot of distance compared with the later generations.
"This is also simple. We distribute a series of servers all over the country to achieve the optimal network speed."
"Damn it, it's going to cost a lot of money."
"fine."
"But our 360 is free, and we can't make much money in business temporarily."
"It's okay, we still have games."
"What does this have to do with the game?"
"Before, I asked Zou Tao to make an accelerator called Xunyou. Although this accelerator is not the same as cloud security, it is actually similar in some places, for example, deploying servers all over the country. At that time, I considered making this accelerator only for We use Lu and Lu, but now I am going to open it up for everyone to use. Of course, there is a fee.”
"How do you charge for this software?"
"Temporarily 10 yuan a month."
"I'm afraid this amount of money still can't support our cloud antivirus."
"This is only temporary. In fact, we can take other services later. For example, some large websites need to set up servers, but the cost of the servers is too high and the operation is too complicated. They can't support them. Then we can help him, our server It can be used as a server for them. In other words, all the data on their website is calculated by our server for him.”
"what……"
After saying this, Zhou Hong's eyes were full of light.
Compared with the previous cloud security, this is just an antivirus software business.
No matter how strong the antivirus software business is, it is only a single business and its profitability is not strong.
Besides, 360 is still free, so they don't have much profit margin for the time being.
But at this time, letting cloud computing act as a server for a series of websites is a huge business.
Don't think that this business is just a server rental business for some telecom companies or some small network companies.
Some small websites naturally do not have much money, but what about some large websites?
Their demand for servers is enormous.
Like the website of the Ministry of Railways in the previous life 12306.
This website seems to be just a website for online train tickets, but sometimes this website can have billions of data requests a day.
The first one on a large website like this is that it is too expensive to set up its own server, even renting it is a terrible cost, and the second is that there is no technology.
Instead, it is better to find some cloud service companies.
Ali in the previous life undertook cloud data services for railway websites.
Of course, that's not all.
In the future, with the continuous development of cloud computing, there will be huge development in storage, medicine, financial insurance, e-commerce, search, education...
"Chen Yu, will we still do antivirus in the future?"
"Look at you."
Chen Yu smiled.
However, he understood that from Zhou Hongyi's perspective, he would definitely be able to see the future cloud computing business, which would definitely destroy the current antivirus.
Maybe, Huanyu Technology will have to set up a new department in the future.
This sector is cloud computing.
No, it's not called cloud computing, it's called Huanyuyun.
Huan Yuyun... Think about it, Chen Yu is a little excited.
Even Google has not yet proposed the concept of cloud computing.
In the future, cloud computing and cloud services, Huanyu Technology will definitely become the master of them.
"Okay, let's not talk about this, you are responsible for the cloud antivirus. The strength of Microsoft and a lot of top security giants in the world should not be underestimated."
"Don't worry, we may not be their opponents before Cloud Antivirus comes out, but how can we play dozens of tricks with them. After these dozens of tricks are over, our Cloud Antivirus will also be launched."
"Row."
Chen Yu nodded.
However, he did not relax there.
Anti-theft and anti-virus has always been a constant battle.
Universal Technology cannot completely put anti-theft on anti-virus software.
In fact, major businesses themselves can do a series of operations.
For example, the secret security card that Chen Yu asked major game departments to come up with before.
Now Chen Yu feels that having a secret security card is not enough.
Game players will use secret security cards, but some YY account players will probably not use secret security cards.
So what to do at this time?
In fact, it is not impossible. For example, YY can provide a more secure guarantee and identify the user's Internet IP address.
As long as the user's Internet IP address is different from the local one, YY will prompt the user, and then launch the anti-theft test.
Chen Yu communicated this idea with Li Nan and the others, and YY and other departments immediately adopted Chen Yu's suggestion.
...
In the following days, Chen Yu sat in the office and kept observing Microsoft's actions.
In fact, Microsoft's action has already begun after they contacted the world's top security companies.
In the first step, they also learned the tricks of Huanyu Technology.
First of all, the hacker website offered huge bounties for various loopholes in the Huanyu system.
Then hang a series of Trojan horses and viruses in a series of small movie websites.
It has to be said that this trick is not to say that it is useless.
When many people download small movies, they are still tricked.
However, not many were recruited.
This makes Microsoft and the major antivirus software companies a little strange.
They have tested these viruses and Trojans, and they only need to put them on the Universal system.
But the result of reality feedback to them is that the effect is so poor.
Such as Trojan horse programs.
Either the Trojan has been removed, or even if it has not been removed, it seems that the stolen game password is fake.
The ones that are cleared will not be studied. It should be the 360 of Universal Technology that played a role.
However, if the account is not cleared and the account cannot be stolen, what is going on?
At first they couldn't figure it out.
But after a search, they discovered a fact that made them extremely mad.
"Huanyu Secret Security."
This is the secret security card issued by Universal Technology for the business accounts of all subsidiaries of Universal Technology.
This secret card is mainly provided for online games.
Because online games have a lot of equipment, it is most likely to become the existence of stolen accounts.
Therefore, in order to reduce the number theft of Huanyu Technology's online games, they came up with the idea of a secret security card.
There are two types of security cards.
One is the secret security card for recharging and earning.
In addition to the user's need to enter the account password, he also has to enter the password in another layer of the secret security card.
It stands to reason that the password in this security card can also be stolen.
But not possible.
Because the password in the secret card is dynamic.
The secret security card given by top-up has corresponding coordinates, and the coordinates are different each time.
This is the primary version.
A more advanced version is a super dynamic password that changes every 15 seconds.
This premium version is no longer a recharge gift, but a small electronic instrument officially sold.
This instrument is bound to the user's account, and a dynamic password will be randomly generated every time the account is entered.
Moreover, this dynamic password will be randomly generated after 15 minutes.
Can you imagine this outrageous anti-theft technology?
Don't say you let their computer hit a Trojan horse, even if you hit dozens or hundreds of Trojan horses, you can't steal his account.
"Sister, there are such tricks."
"I said how Blizzard lost to Universal Technology in China. This anti-theft method alone makes Blizzard 108,000 miles away."
"Niucha, I now have some accounts that I can't do with Huanyu Technology."
A group of Microsoft and major network security companies formed a "destroying team" a little crazy.
They always think that they are the top hackers and computer experts in the world.
Unexpectedly, even if they were to steal a game account, they would not be able to steal it.
This is simply a slap in the face of Chi Guoguo.
However, they quickly regrouped.
As the elites of the global computer industry, they cannot be defeated by such difficulties.
They thought about the lock calmly and analyzed the disadvantages of Huanyu Technology.
They admitted that Universal Technology has indeed used secret security cards for many online games.
But not everyone, and not all players use it.
Especially those that are not game accounts, such as YY accounts, circle accounts, etc. Although these have little economic value and cannot be sold for much money, if they are stolen, it will be a big trouble. Moreover, it may be heartbreaking that the game account has been stolen. Although they steal these YY accounts, circle accounts do not have much economic value, and ordinary hackers don't want to steal such accounts.
But their hacking is not for money, they are for attacking the Universal System.
After a reorganization, another series of Trojan horses appeared.
pity……
This time there were fewer accounts than the previous time.
"what happened?"
"Could it be that these people who play YY use secret security?"
"Impossible."
The security experts were persuaded.
Attempt to log in to the YY account with the stolen password.
The system prompts that the address you have logged in is wrong with the address of the account you usually use. Please complete the anti-theft test to unblock it.