Chapter Ninety-Two: Paper Tiger
But I don't necessarily be able to make that key, which makes me the most angry.
You know, the technical department is originally a department that makes its own locks and distributes other people's keys.
Of course, this lock is a metaphor, which is actually a protective security software, and the key is also a metaphor, which is a weapon used to break someone else's lock, such as a virus or some other method.
Of course, there are many ways to break a lock, and you don't necessarily need a key. Sawing with a saw, smashing with a hammer, chiseling with a chisel, or even melting down an entire door panel with thermite, or sending a locked house to the sky with an RPG is all options.
But when there is a fixed purpose, there are few, if not few, methods that can be used.
For example, it is not easy to infect and compromise a computer protected by Tom's security software without knowing it this time.
Because, Tom's security software is much more secure than he thought.
Safety is not a problem, no matter how powerful the lock, as long as the lock picker has the heart, it is not impossible to open, but there is no time when the problem occurs.
That's right!
He didn't have much time.
All departments are now vigorously trying to eliminate this software in the infancy.,The failure of the embryonic period.,Everyone is already very angry.,If this embryonic period fails again.,Maybe everyone can really go to God.。
If it had been two or three years ago, the technical director wouldn't have cared about this, but your company went out of business, so I'd pat my ass and go to another home. But now he has to care.
Why?
Because he didn't have a choice.
The dot-com bubble has begun to burst, fewer and fewer new companies have opened, and few old companies have survived.
Even those that survived did not have enough mid- and high-level positions. Could it be that he is now a middle-level person, and after being unemployed, he has to go to a group of children who are far younger than him, waiting for the opportunity to be promoted, I don't know when, will it belong to him?
No!
No!
That's cruel!
That's why the head of the technical department feels so anxious.
The reason for his anxiety is that this damn Tom is safe.
Why do you want to make free security software?
Why was Pete Taylor's investment brought in?
Why does the software do so well?
Why didn't you dig yourself in the first place?
While the department head was remorseful, he also began to order his subordinates to carry out a more violent attack on Tom's security software, which was locked in a virtual machine like an experimental guinea pig in a small cage.
Maybe two years ago, he would have believed that there would be no software with vulnerabilities in this world, and no systems with vulnerabilities.
But he had now completely given up on his unrealistic fantasies.
As long as the world is software, there will be loopholes, and there will be opportunities.
The difference is whether the vulnerability itself is known or not, and whether the enemy knows about it.
Generally speaking, it is likely that the vulnerability itself is unaware of, and then the adversary who knows about it will take advantage of the vulnerability by surprise.
Of course, there are also estimates that there are loopholes to leave a backdoor to make some preparations for the convenience of things in the future.
Symantec, for example, now holds a variety of profiles for hundreds of thousands of paying users. These materials are said to be good to help users recover data after being attacked, and to say bad things......
Hehe......
Where is there a white crow in the world?
Who says security software can't be the biggest rogue?
So, it's a life-and-death struggle, no gentleness, no treats to dinner.
Either free security software dies, or paid security software is born.
"Send an urgent security advisory, Tom Security has a major security vulnerability, please uninstall and fix it for users who have installed Tom Security. ”
The security director said calmly with his fingers crossed.
The person in charge of issuing the notice turned his head to look at the department head in confusion and asked, "Director, is there a problem with Tom's security software?"
The director glared at him and said, "I said yes, you do what I say, what do you ask?"
"Okay......" The employee resisted weakly, and obeyed the leader's instructions.
The head of the department's expression was still very solemn, he returned to his workstation and pressed the enter key very resolutely.
In an instant, countless dormant viruses lurking on the Internet received the same instruction to identify the signature code of Tom Security software, and as long as the computer with this signature code, these viruses will immediately begin to destroy.
That's right!
Although Tom Security itself has not found a vulnerability that can be attacked for the time being, if you want to attack Tom Security, you may not find its own vulnerability.
Just let some latent viruses attack one after another on the machine with Tom's security software installed.
The content of the attack is also relatively simple, that is, it occupies a lot of the machine's resources and makes the machine stuck.
In this way, even if Tom kills the virus safely and quickly, there is still another one. Users don't even feel that there is a virus, but that there is something wrong with Tom Security.
Otherwise, why is there no problem with everything else that doesn't have Tom Security installed?
At this time, Symantec released a special repair tool, as long as you download this tool, uninstall Tom Security, and the computer will be back to normal.
Downloading Symantec over the Internet at this time will even give you a one-week free trial.
This is also a compromise between paid security software and free security software.
This time, however, the compromise yielded better results.
First of all, it's not like Tom Safe can go wrong, and secondly, Kaspersky isn't free.
People tend to buy what they're used to, so Symantec has seen a certain increase in sales.
As for the ball, it was kicked back to Tom safety.
For so many viruses that have popped up out of nowhere, Tom's safe people are also confused. They hadn't expected this before.
After all, no one would have thought that there would be such a large number of viruses hidden so deeply.
These viruses are not like the previous ones, and these are deliberately chaotic.
Therefore, although the effect of hard work is okay, the final effect is not very ideal.
Because there are many new viruses, and they must not stop killing.
Tom's hair seemed to turn gray overnight, but he didn't give up, he still persisted.
He insisted that the number of viruses is limited, and as long as he persists, won't he win?
All anti-(meow) activists are paper tigers.