Chapter 975: Why is it so hard to steal an account?

"The virus was wiped out on the way?"

"Yes. ”

"Don't need users to check and kill themselves?"

"No, you don't. ”

"Wait...... Chen Yu, you let me think about it. ”

This brand-new concept had some impact on Zhou Hongyi's ideological outlook.

Originally, in his concept, in order for a computer to be antivirus, it must first download the antivirus software, then the antivirus software provides the signature code, and then the user downloads the virus database, and then checks and kills. This is not just what 360 antivirus does, but all antivirus companies around the world do the same.

But now, Chen Yu's concept has completely subverted Zhou Hongyi's understanding.

Users don't need to download a virus database.

Even users don't need to do it.

All of this is done in the server.

"My God......"

Zhou Hong first felt that this was incredible, and directly wanted to say that it was impossible.

However, he is familiar with computers, but he knows that it is theoretically possible.

The Internet not only has the function of communication, but also the function of processing information and computing.

In the past, a series of kills could only be done locally, but now there is no need to be local at all, and he only needs to go through the network.

Through the network, the backend server already knows whether you have been poisoned or not, and whether the virus has come to your computer.

"Chen Yu, can you tell me more?"

There is some confusion in the brain, and for the time being, Zhou Hongyi still doesn't understand a little.

"To put it simply, it's actually a little bit similar to anti-spam. We get a lot of spam every day, but we had no choice but to manually delete them one by one. But then someone came up with a way to label some spam emails with certain characteristics, and when such emails are sent to a certain amount, they will classify them as spam. ”

"Trojans and viruses are the same, in fact, they all have similar characteristics, in the past, personal PCs and computers could only be manually checked and killed, and some could not be checked and killed without downloading the virus database. However, if we build big data, we can identify these viruses at the first time and kill them as soon as possible. This means that before the virus has even started to spread, our servers have destroyed it. ”

"Of course, our servers require a lot of computing power. Without such capabilities, we would not be able to analyze and kill massive amounts of viruses and data. ”

Chen Yu is not an expert in cloud antivirus.

He knew that it wasn't just what he had just mentioned that would be the real way to do it.

In this case, it involves the identification of viruses, the analysis of massive data, the feedback of a large number of clients, the super server, the massive financial support, and the opening of the entire system.

However, such a concept is undoubtedly new and the most effective.

Once formed.

In the future, network security can be improved by at least 90%, and even in the future, computers will hardly need to think about whether they will be infected with viruses or Trojan horses.

"I'm grass, Chen Yu, I really want to open your head and see, what are your brains made of?"

"Open it and you'll see a big piece of brain. ”

"Fuck off. Sister, I was defeated by you, you guy, who has no skills at all, actually came up with such a new idea. ”

Zhou Hongyi was extremely excited in his heart.

Although what Chen Yu said was not particularly detailed, some of them were even technically wrong.

But what Chen Yu said about the concept and direction, Zhou Hongyi undoubtedly understood.

In fact, he has always felt that traditional antivirus software has a fatal problem.

In the face of a massive number of viruses, is it possible that the virus database is constantly updated every day?

You must know that from the existing data analysis, the number of a series of viruses and Trojans in the world has broken tens of millions or even reached the level of 100 million.

An average computer really can't download so many virus databases.

Even if it can be downloaded, the computer will have to be completely occupied by so many resources of antivirus software.

At this time, the cloud antivirus that Chen Yu said opened a new path for Zhou Hongyi.

"Don't talk about this, how about it, can you get it?"

"It's complicated, but, okay. But ......"

"But what?"

"There are two problems now. ”

"What's the problem?"

"We need a lot of servers. ”

"Buy. ”

"The other is that we may not have enough bandwidth to support our calculations. ”

The most important thing in cloud computing is networking.

Cloud security is impossible without the support of the network.

The higher the network speed, the better the cloud security.

However, although the speed of the Internet has improved a lot in 2005, there is still a long way to go compared with later generations.

"It's also simple, we have a series of servers spread across the country to achieve the optimal network speed. ”

"I'm going to spend a lot of money. ”

"It's fine. ”

"But our 360 is free, and we can't make much money in the business for the time being. ”

"It's okay, we still have games. ”

"What does this have to do with the game?"

"I asked Zou Tao to make an accelerator called Xunyou, although this accelerator is different from cloud security, but in fact, it is still common in some places, for example, servers are deployed all over the country. At the time, I was thinking about making this accelerator only available for our masturbation, but now I'm ready to open it up and make it available to everyone. Of course, this is a chargeable one. ”

"How much does this software cost?"

"10 dollars a month for the time being. ”

"I'm afraid this amount of money still can't support our cloud antivirus. ”

"This is only temporary, and we can actually take on other businesses later. For example, some large websites want to set up servers, but the cost of the server is too large, the operation is also complicated, and they can't set it up, then we can help them, and our server can be used as a server for them. In other words, all the data on their website is calculated for him by our server. ”

"Huh......"

Saying this, Zhou Hong's eyes were shining.

Compared to the previous cloud security, this is just a single antivirus software business.

No matter how strong the antivirus software business is, it is only a single business, and the profitability is not strong.

Besides, 360 is still free, and they don't have much room for profit for the time being.

But at this point, having cloud computing act as a server for a series of websites is a huge business.

Don't think that this business is just some telecom companies or some small network companies server leasing business.

Some small websites naturally don't have much capital, but what about some large websites?

Their demand for servers is incomparable.

Like the website of the Ministry of Railways of the previous life 12306.

This website may seem like just a website that uses train tickets, but it sometimes has billions of data requests a day.

The first one on a large website like this is that it costs too much money to set up a server by itself, even if it is a terrible cost to rent, and second, there is no technology.

Rather than that, it's better to find some cloud service companies.

In his previous life, Ali undertook the cloud data service of the railway website.

Of course, that's not all.

In the future, with the continuous development of cloud computing, it will be used in storage, medicine, finance and insurance, e-commerce, search, education, ...... There will be tremendous development.

"Chen Yu, will we still do anti-virus in the future?"

"It's up to you. ”

Chen Yu smiled.

But he understands that with Zhou Hongyi's vision, he will definitely be able to see the future of cloud computing business, which will definitely explode the current antivirus.

Perhaps, Huanyu Technology will have to set up a new department in the future.

This department is cloud computing.

No, it's not called cloud computing, it's called Universal Cloud.

Huanyu Cloud ...... Thinking about it, Chen Yu was a little excited.

Even Google has not yet come up with the concept of cloud computing.

In the future, cloud computing and cloud services will definitely become the master of Huanyu Technology.

"Okay, let's not talk about that, you are responsible for cloud antivirus, and the strength of Microsoft and a large number of top security giants in the world should not be underestimated. ”

"Don't worry, we may not be their opponents before the cloud antivirus comes out, but how can we have dozens of tricks with them. After these dozens of tricks are over, our cloud antivirus is also launched. ”

"Okay. ”

Chen Yu nodded.

However, he did not rest there.

Anti-theft and anti-virus has always been a constant battle.

Huanyu Technology can't completely put anti-theft on anti-virus software.

In fact, the major businesses themselves can do a series of operations.

For example, Chen Yu asked the major game departments to make the secret protection card before.

Now Chen Yu feels that it is not enough to have a secret card.

Gamers will use the secret card, but some YY account players, they may not use the secret card.

So what to do at this time?

In fact, it is not impossible, for example, YY can provide a more secure guarantee and identify the user's Internet IP address.

As long as the user's Internet IP address is different from the local one, then, YY will prompt the user, and then launch an anti-theft test.

Chen Yu communicated this idea with Li Nan and them, and YY and other departments adopted Chen Yu's suggestions as soon as possible.

......

In the following days, Chen Yu sat in his office and watched Microsoft's movements.

In fact, Microsoft's move began after they contacted the world's top security companies.

In the first step, they also learn the tricks of Huanyu Technology.

First of all, a large amount of money was offered on the hacker website for various vulnerabilities in the Huanyu system.

Then hang a series of Trojan horses and viruses in a series of small movie websites.

I have to say that this trick is not useless.

When many people download small movies, they still get tricked.

However, the number of people who were recruited was not large.

This makes Microsoft and the major antivirus software companies a little strange.

These viruses and Trojan horses have been tested by them, as long as they are placed on the Huanyu system.

But the result of the actual feedback to them is that the effect is so poor.

For example, Trojan horses.

Either the Trojan was cleared, or even if it wasn't, it seems that the stolen game password is fake.

If it is cleared, I will not study it, it should be the 360 of Huanyu Technology that has played a role.

But if you haven't been cleared, you can't get your account back, what's going on?

At first they couldn't figure it out.

But then they looked through the investigation and found a fact that drove them mad.

"Huanyu Secret Protection. ”

This is the secret card for the business accounts of all subsidiaries of Huanyu Technology.

This card is mainly for online games.

Because online games have a lot of equipment, they are most likely to become the existence of stolen numbers.

So, at that time, in order to reduce the number theft of Huanyu Technology's online games, they came up with the idea of a secret card.

There are two types of PIN cards.

One is to recharge the password card to earn and give.

In addition to the password that the user needs to enter the account password, he also has to enter the password in another layer of the password.

It stands to reason that the password in this PIN card can also be stolen.

But it can't be.

Because the password in the PIN card is dynamic.

The password card given by recharging has corresponding coordinates, and the coordinates entered are different each time.

This is the junior version.

The more advanced version is the super dynamic password that changes every 15 seconds.

This premium version is no longer a top-up gift, but a small electronic device officially sold.

This instrument is tied to the user's account, and a dynamic password is randomly generated every time the account is entered.

In addition, this one-time password will be randomly generated after 15 minutes.

Can you imagine this outrageous anti-theft technology?

Don't say that you let their computer get into a Trojan horse, even if you hit dozens of hundreds of Trojan horses, you can't steal his number.

"Sister, there are such tricks. ”

"I said how Blizzard lost to Huanyu Technology in China, just this anti-theft method, Blizzard is 108,000 miles away. ”

"Niu Cha, I have some accounts that I can't do about Huanyu Technology now. ”

The "Destruction Team" composed of Microsoft and major top cybersecurity companies is a little crazy.

They have always considered themselves to be the best hackers and computer experts in the world.

I didn't expect that they wouldn't be able to steal a game account.

This is simply a slap in the face of Chi Guoguo.

However, they soon regrouped.

As the elite of the global computer industry, it is impossible for them to be defeated by such difficulties.

They calmly thought about it and analyzed the shortcomings of Huanyu Technology.

They admit that Huanyu Technology does have a lot of people using secret cards in many online games.

But not everyone, and not all players, use it.

Especially those that are not game accounts, like YY accounts, circle accounts...... Wait, although these don't have much economic value and can't sell for much money, if they are stolen, they are also a big trouble. Moreover, it may be heart-wrenching to have your game account stolen. Although they steal these YY accounts, circle accounts don't have much economic value, and ordinary hackers don't want to steal such accounts.

But they are not stealing numbers for money, they are here to fight the Huanyu system.

After a reorganization, a series of Trojan horses appeared.

Pity......

This time there were fewer compromised accounts than the last time.

"What's going on?"

"Could it be that all these people who play YY use secret protection?"

"Impossible. ”

The security experts were cornered.

Try to log in to the YY account with the stolen password.

The system prompts that the address you are logged in to is incorrect from the address of your usual account, please complete the anti-theft test to unblock it.

(End of chapter)