Chapter 221: Mobile Phone

Chu Ze sat on top of the suitcase on the ground, looking blankly at the bright lights in the distance, which were the lights for the overnight rescue troops and militia. Although the body is sore, numb and tired, and continues to rest well, the hot and stinging pain from the abrasions and broken skin in the fingers, elbows, knees and other places always drives away the drowsiness.

Besides, his gaze shifted from the remote ruins to the suitcase under the p-shares, and he didn't dare to sleep.

Sitting here now, Chu Ze's heart was still afraid, and he turned his head to look at the other people around him, except for a few people who were already lying on the ground and wrapped in quilts, most of the others were gathered together cautiously and whispered.

After graduating from college, his first job was not satisfactory, Chu Ze returned to his hometown and opened a small electronics store on the first floor of his house, buying some mobile phone mp3 headphones or something, and by the way, he would charge people's phone bills, deduct coins, bee coins or something.

Before the earthquake struck, Chu Ze was brushing a customer's mobile phone system, although now many copycat machines simply come with their own bee mobile phone system, but there are still some original other systems, so Chu Ze's mobile phone store brush business.

Although anyone with a little foundation, according to the basis of operating on a networked computer, can easily brush their mobile phone with the appropriate bee system, as long as the mobile phone hardware is not too bad and there is a usb interface available, but because according to the process of flashing the machine needs to go through step-by-step hardware testing, prepare the adaptation package, download the adaptation package before you can start the relationship between flashing, many troublesome users are more inclined to spend more than a dozen dollars to the mobile phone store to solve this problem.

And it may be more expensive to flash your own machine,The price of different brush packages provided by Bee mobile phone assistant is different,The larger the download, the cheaper,The price of downloading and installing tens of thousands of popular brush packages is as low as 100 bee coins or less,And directly register a new account with your ID number to have 100 bound bee coins as a gift,It is free。

However, whether you are operating on your own computer or an Internet café computer, you may need to spend time waiting for the server to prepare a new flashing package, if you are unlucky, the mobile phone model is too different, and the server does not have a ready-made flashing package, it may take a whole day or even several days.

And the mobile phone store is different, such as Chu Ze's computer that has been buried in the ruins has downloaded a large number of copycat mobile phones and brand mobile phone flash packages, as long as it is not too rare strange signals, after carefully checking the mobile phone model configuration, you can skip the first three steps, and directly use the locally saved brush bag for flashing, which greatly saves time.

And you don't need to pay again to use the local flashing package, as long as the mobile assistant verifies the official signature of these flashing package files, it doesn't care whether the file is illegally copied pirated files.

Of course, Chu Ze and other mobile phone store owners generally don't tell customers: "I have a local flashing package here, and I don't need to pay to download it." ”

On the contrary, they will also turn the computer screen to show customers, and let them see the high price of this model adapted to the brush bag in the screenshot of the mobile phone assistant interface on the screen, and borrow the tiger skin of the bee to share their confidence in raising the price.

Originally, the price of the flash pack was all the way down, and the new model phone needs to pay up to 1000 bee coins for the first time to apply for the creation of a flash pack, and then it will drop a little bit on each download, until the lowest is 1 bee coin. For ordinary users, they basically don't feel the payment point, there are many sources of bee coins, gifts, CTA Q&A, installation promotion, hang-up mining, etc., as long as the amount is not large, it is easy to get.

Chu Ze: They will show customers screenshots of the price of the machine package instead of the current real-time price, just for the sake of a larger price figure above. There are even some black-hearted guys who simply PS the price into 1000 bee coins or even more, and then take the opportunity to ask for more than 100 yuan in spawning fees.

In addition to the normal mode with a cap of 1,000 bee coins, Bee also provides professionals with a more expensive but more operational engineering mode. This model, which is open to manufacturers and DIY enthusiasts, can provide more customization features, and the price is much more expensive than the normal model.

That's how the bee system that comes with those copycat mobile phones comes from,After the profiteers make (fight) (make) their new mobile phones,You only need to pay up to 10,000 bee coins, that is, 1,000 soft sister coins,You can create a new adaptation flash package for this new model of mobile phone。

This price is a little high for enthusiasts, but for mobile phone manufacturers, it is as cheap as giving it away for free, after all, they need to pay tens of thousands or even hundreds of thousands to buy a plan from a professional mobile phone solution company.

And the engineering mode passed by the bee is quite good value for money, in the engineering mode users can choose the pre-installed software in the system, and can upload hardware driver code, and even pre-installed software and games. Of course, these third-party codes and games must be tested for security to ensure that there are no toxic and Trojan horses, no deduction traps, and no serious performance defects, which makes some copycat mobile phone manufacturers a little annoyed, after all, pre-installed deduction software is also a "good" business with quick money.

Each mobile phone pre-installed with SP deduction trap can contribute a piece or even more to the manufacturer's "subsidy", if the heart is dark, humming "medicine! Cheke trouble! pancake fruit to a set! an egg for a dollar! like crispy noodles! chili fermented bean curd and shallots! iron plate shovel small wooden brush! medicine! Cheke trouble!" Put all the deduction software that comes to the door into the mobile phone, and each mobile phone can contribute more than a dozen yuan of "subsidy", which is equivalent to getting more than 10% of the high profit for the mobile phone with a price of less than 1,000 yuan. It is no wonder that some legitimate manufacturers with poor performance can't resist the temptation to sell their own brand mobile phones and pre-install deduction traps.

It can be said that it is not their discipline that limits the number of installation deduction traps of mobile phone manufacturers, but the poor running memory and flash configuration of cheap mobile phones, and the memory of a few megabytes or even hundreds of kilobytes limits the number of installation of deduction software.

They don't care that after consumers buy their cheap copycat machines, they click on "Set Ringtone" and see "Sending Messages", and they receive a message in less than a minute: "Thank you for using the Falcon Detective business of XX Mengtianyou Company, the service code is 10669900, the information fee is 2 yuan / time, collected by mobile, customer service phone: 95105338" After the text message, what will be the mood.

The reason why the bee mobile phone system can reap the huge results of the first market share of the third-party mobile phone system without relying on large-scale and high-cost publicity is because of their two characteristics of super adaptability and extremely high security.

Of course, there is currently no professional company to make third-party mobile phone operating systems, and the high share of Bee OS is actually pieced together. Bee OS is actually a series of embedded systems collectively named, although they are all customized according to different hardware, but the software and games running on it are basically the same, Bee tries to maintain this series of systems to have a close to consistent good operating experience.

As long as any mobile phone is connected to the computer running Bee Mobile Assistant in debugging mode, it can get a corresponding Bee OS, this process depends on the hardware configuration of the mobile phone. If there is an existing driver on the bee server, it will only take about ten minutes to complete the preparation of the new system flash package, otherwise it may take days or even weeks. After all, some strange hardware needs to be collected by Atletico to connect and crack it by hand to get the driver code.

The extremely high security of Bee OS is also used by many mobile phone users as a peerless killer to cure SP indiscriminate charges. This is much more effective than the regular seven weapons that are charged by SP.

Usually, users can only unsubscribe from the SP service from 1, 2 complaints about customer service, 3 software interception and subscription SMS, 4 close Montnets in the letter business, 5 close the GPRS business, 6 modify the SMS center number to abolish the SMS function, 7 angrily change to a new mobile phone, one or more of these means to use, and in addition to the ultimate killer 567, the first 14 are not guaranteed to be effective, although they are officially recommended processing methods.

The Bee OS operation team stumbled upon the fact that many users choose to brush Bee OS for a very clear purpose, which is to completely clean up the annoying deduction software on the original system, and it may be that some computer users have migrated their "reinstallation and antivirus method" to the mobile phone, and achieved good results.

After noticing this phenomenon, they specially launched the promotion plan of "dead deduction trap", and took the initiative to answer questions in CTA Q&A, Du Niang know, mobile phone forums and other interactive Q&A communities, and even self-questioning, to promote the solution of "brushing bee OS, curing the SP deduction trap", and achieved good benefits.

The vast majority of Trojan viruses and malware can only exist in the storage area of the hard disk, so these problems can be completely eliminated by using a lose-lose "grid reinstallation", deleting all data, formatting the hard drive, and reinstalling the operating system.

Similarly, by reinstalling the mobile phone system and installing trusted and secure mobile phone software and games, you can also solve the problem of malicious programs in the charging software. However, scams that hang up at the first ring, and send text messages pretending to be friends and relatives to send fraudulent replies are not effective.

For this problem, Bee OS basically solves the problem by including the "Bee Number Identification" function by default in each version.

The number identification software can download the number and SMS attribution information database through the GPRS network or PC connection. After this function is enabled, the incoming and outgoing caller ID will automatically display the home location, and the SP SMS number will display the corresponding company name. If the landline or mobile phone number is sent to the network in the form of contact information and is crawled by the phishing search engine, the corresponding company name and contact name will also be displayed, and error correction is supported.

This way, for people like "I'm a landlord, put the money on my husband's card." The card number is ......" and "Dear ICBC users, your ICBC electronic PIN will expire today, please log in to our website in time for upgrade and maintenance. We apologize for any inconvenience. ICBC" can produce a better defensive effect.

However, bee number recognition can only be said to basically solve this problem, but he admits that he can't completely solve this kind of camouflage fraud, because the road is one foot high, and there are more powerful telecom fraud methods in society. Through VOIP network calls, copycat base stations, DNS hijacking, DNS pollution and other technical means, the effect of impersonating phone numbers and URLs can be achieved, and it is impossible to identify the real and false on the mobile phone.

VOIP is a network-based voice telephone service, voice information is transmitted through the network itself does not need a phone number after digitization, when dialing a fixed line or mobile phone through a PC, you can fill in the number at will, the victim caller ID is normal, all kinds of 110 with area code, all kinds of bank customer service short numbers with 9 prefixes can be disguised at will.

However, in order to protect the income of traditional voice services, companies such as Power Grid Mobile do not open VoIP services to the general public. However, they are reluctant to give up the low-cost advantage of transmitting voice signals through the network, on the one hand, they build their own telephone bars to make a lot of money, and on the other hand, they provide VOIP services to some companies. As a result, it was still used by criminals for telecom fraud.

Similar to DNS pollution technology, copycat base stations use stronger and faster signals to overwhelm normal signals to achieve the effect of camouflaging numbers or URLs. DNS hijacking is the use of malicious code to modify the address of a router or a DNS server stored on the machine, so as to disguise a fake address as a normal address.

For these fraudulent methods of attacking the network itself, the security features of the mobile phone system alone cannot guarantee 100% security and effectiveness. After all, under these attack methods, it is no longer only mobile phones that have problems, VoIP number spoofing is the caller ID service of telecom companies, and the problem of copycat base stations and DNS pollution is the G** communication protocol and TCP/IP network protocol itself, and Ren Bee OS has the strong support of Atletico Madrid's alien technology, which cannot solve these problems.

Although Bee Technology only low-key promotes its advantages of security and no deduction trap in the form of interactive questions and answers, but in Chu Ze, these mobile phone store owners, Bee OS has long been advertised by them as the safest mobile phone system, and while selling copycat machines, they make two profits through flashing services.

Bee was aware of this situation, but acquiesced in the hype for the sake of increasing its popularity, while sticking to the phone assistant to ensure that it would only swipe in the Bee OS flash bag with an official signature from Bee Technology. Even with a local flashing package, Bee Mobile Assistant must now be connected to the internet to initiate the flashing step. It must be connected to the Internet to verify the authenticity of the phone model and the flashing bag again.

And Chu Ze and the customer who was in the store at the time, the two of them were rescued by the strong network setting of the mobile phone assistant.

The communication between the client and the server, according to the different business contents, has two types: strong network and weak network. The former requires a stable and reliable network connection between the two parties to maintain continuous data communication, while the latter only needs to maintain an intermittent or periodic network connection, which requires low network connection quality and can tolerate sudden interruption of delay.

For example, most web pages have weak connections, and sometimes the server will actively disconnect after the page is fully opened to reduce the load on the server.

It is precisely because many of Bee's software and services use the strong network mode that the anomaly will be found at the first time when the earthquake hits, and the alarms will be issued at the first time, and these alarms will also be issued through the strong network client.

At that time, seeing the red warning pop-up window that suddenly appeared on the screen, Chu Ze didn't take it seriously at first, and laughed with the customer, thinking that his computer had been hacked and hit by a prank virus.

Similar warning pop-ups have been used for many years, and many websites use small pop-up ads to entice users to click on the red cross in the upper right corner to get clicks. So Chu Ze didn't click on the pop-up window, but clicked on the flashing mobile phone assistant icon in the tray area in the lower right corner.

However, seeing the pop-up system message sent from the 8th, the smile on the corner of Chu Ze's mouth froze!

In the bee system, the number composed of the numbers eight such as eight, 8, and 8 in the software is exclusively owned by the bee. Officially, this is called "Bee 8", whether it is 88, or 888 eight, no one else can register, and the official account of Bee is 8 and 8.

Chu Ze double-clicked with his trembling right hand to open the icons of Computer Manager, Security Center, and Honey Chat flashing in the lower right corner, and all he got without exception was "System news: An earthquake is suspected to have occurred in the area, please take emergency evacuation measures immediately, it is best to leave the building or hide in the corner of the wall and squat down with your head in your hands!"

At this time, Chu Ze was unlucky to wonder if the bee company was hacked, or he was playing a prank, so he hurriedly shouted: "There is an earthquake!" The computer didn't care about turning it off, unplugged the mobile phone connected to the computer and stuffed it to the customer, grabbed his wallet and mobile phone key and ran upstairs.

When Chu Ze pulled the widowed mother, who was still dazed because of the nap, to run downstairs, the earth had already begun to tremble, and the telephone poles and buildings were shaking and shaking.

Because of the relationship between the Longmenshan earthquake fault zone nearby, everyone is not a person who has never seen a few earthquakes in their lives, and the people who take refuge on the streets are not so panicked, and they are still laughing with each other and guessing whether the earthquake is magnitude 5 or 6. As a result, all of a sudden, he saw the ground shake, and everyone suddenly stood unsteadily, and there was a sound of broken glass behind Chu Ze, followed by the sound of windows and doors shattering, and then when he stood in the center of the road and turned his head to look back, he saw that his house had changed, and it was difficult to identify.

Fortunately, although the house collapsed, because he was reminded by the bees, he had more time to react, so that he could wake up his mother in time to come out to avoid danger. Otherwise, if he waited until the earth shook to wake up to the earthquake, he might not have time to go upstairs to wake her up, and whether he escaped alone or ventured upstairs and then the mother and son were buried at home, it would be a result he could not imagine.

"Mr. Chu Ze!" a soft cry interrupted Chu Ze's distraction.

The one who spoke was a militiaman wearing a camouflage uniform and a red armband on his left sleeve, who put a plastic basket in front of Chu Ze and told him that it was a mobile phone dug up from his house and that he needed to go through some urgent requisition procedures.

Chu Ze hurriedly waved his hand and said: "No, no, these things buried in the ruins were dug up by you, you can use them as well, and I can be regarded as contributing to everyone!"

In the end, he did not succeed in refusing to requisition, and went through an emergency requisition procedure.

Before, because the earthquake destroyed most of the mobile phone base stations and fixed-line telephone lines, resulting in the disaster area completely lost communication security, seeing that the search and rescue team communication basically relied on roaring, he remembered that the Bluetooth intercom function on a box of Jupiter mobile phones buried in his home The communication distance is two or three hundred meters, if it is dug out, it should be able to play some role, and the news is reported.

Fortunately, although his house collapsed, it did not collapse in a crushing manner, and the search and rescue team found his mobile phone inventory from the rubble without much effort, and brought it over to make up for the formalities with him.

These mobile phones are Jupiter B series mobile phones, from Atletico and Bee's partner Jupiter Communication, the so-called Bluetooth intercom function is actually not only the use of Bluetooth for short-range intercom, but also by cracking the G** baseband chip can achieve a larger distance of mobile phone to mobile phone direct communication.

I have to say that Chu Ze hit it by mistake, if he uses the Bluetooth intercom function on these mobile phones a few more times, he will find that the Bluetooth intercom must be launched within 10 meters, which is not convenient to use.

This is because cracking G** is illegal, and Atletico does not dare to use this technology on a large scale, but only uses cracking G** to add a backup channel to Bluetooth with a maximum communication distance of less than 10 meters, so as to avoid users occasionally causing signal interruptions due to excessive distance.

However, Atletico Madrid still designed a call for help mode when there is no signal in the mountainous area, and the super Bluetooth intercom mode is automatically activated when the mobile phone loses the base station signal, which can achieve a call intercom within a range of 500 meters or even larger, and now it is precisely that there is no communication interruption, no G** signal.

The search and rescue team had already tried it before coming to Chu Ze, and the intercom effect was quite good, and the sound quality of the call was the same as that of the usual call, much clearer than the walkie-talkie. They sent someone to Chu Ze to make up the procedures, and another purpose was to ask for the contact information of this mobile phone manufacturer, so that the rear could arrange the transportation. For mobile phone users, please visit http://m.piaotian.net