Chapter 0692 Computer Antivirus Software Launched
β¦β¦
Since the late 1970s, Wall Street has been prevalent in the use of computer systems to assist in its day-to-day transactions, which has undoubtedly greatly improved efficiency.
After the U.S. economy hit rock bottom in 1982, it ushered in a period of rapid growth in 1983, which in turn promoted the prosperity of the capital market and became more and more convenient brought by computers.
However, with the expansion of the scope of use and the deepening of dependence, it is more and more necessary to build a unified platform, which has led to a new wave of large orders.
For this delicious cake, each company can be said to have tried its best, hoping that there are fewer competitors as much as possible.
Coincidentally, Pacific Telecom, a star company, made a mistake and was exploited by hackers, and the suppliers of the new information solutions it used were Fang Yuan and Zheru.
This was simply a godsend, and several veteran companies that felt deeply threatened immediately tacitly attacked together, so as to belittle the level of Fang Yuan and Zheru, and finally kicked the challenger out as they wished.
In fact, the key point of contention here is very simple, that is, the value of "data". Its importance is like a failed hard drive, and users are often willing to pay much more than the price of the hard drive hardware itself to save the valuable data inside.
In the same way, this order places more emphasis on data security. In particular, because of the previous system, its data also needed to be migrated to the new system, which was almost exactly the same as that of Pacific Telecom.
Therefore, there is reason to believe that the data leak of Pacific Telecom shows that the solutions provided by Fang Yuan and Zheru are still some distance from the products of those established companies, and it is natural that they will be eliminated.
Although there were 10,000 unconvinced in their hearts, Fang Yuan and Zheru could only admit it, this was the rule of the game.
Tang Huan appeased the bidding team, gave them a paid vacation, and sent them back to San Francisco.
Seeing that Tang Huan didn't seem to care much about this failure, the female ship king Christina couldn't help but be a little curious, "My dear, this order is not small, and the significance is extraordinary, don't you really care about the value of it." β
"It's come to this, what if you don't accept it?" Tang Huan smiled playfully, "Maybe this is also providential, when there is a problem with this big system, we can not only watch the excitement easily, but also be able to get up and down without any scruples." β
Christina didn't seem to understand, so she continued on her own lines: "But you must pay attention to the media noise, especially the old rival New York Post. β
After complaining, the female boat king also specially found a newspaper and pointed it out to Tang Huan.
"You women's thoughts really confuse me, knowing that other people's newspapers don't say good things, and you give money to the other party to buy it to find anger." Tang Huan shook his head helplessly.
It can be said that the cynicism of the "New York Post" is full of sourness, which began to lead to the topic from the popular "Phantom of the Tomb: Eight Arrays".
"It can be seen from this movie that in the Eastern philosophy, there are many concepts such as yin and yang, so much so that our richest man was also deeply influenced when he named his company - the '0' and '1' represented by Zheru, and the 'heavenly circle' and 'place' represented by Fang Yuan."
"I just don't know, has the richest man ever thought of another set of opposing concepts - victory and defeat?"
Tang Huan smiled dumbly after browsing it, "Discuss philosophy with me, then let me tell you, what is called 'Tianxingjian, a gentleman strives for self-improvement; The terrain is good, the gentleman carries things with virtue', and how to plan a successful process as 'don't use the hidden dragon, see the dragon in the field, dry all day long, or jump in the abyss, fly the dragon in the sky, and regret the dragon'. β
He picked up the pen to write an article, and then published it under a pseudonym, of course, he was not idle and had a useless war of words with the New York Post. Since everyone is so well versed in the way of speculation for profit, then brother will also take a ride and discuss the broad and profound cultural heritage of the East.
At first, people thought that the article that appeared in the New York Daily News, the sworn enemy of the New York Post, was written by a literati in the pro-Tang faction, but the editor-in-chief of the New York Daily News vaguely pointed out that this was the richest man himself on the front line.
Now the "New York Post" is energetic, such a rare opportunity for a handover of troops is just enough to humiliate the nouveau riche in Silicon Valley, so it mobilizes cadres and starts a scolding war.
It is conceivable that these two newspapers, which had already taken the route of popularization and produced "sensational news", suddenly attracted a large number of onlookers, and social attention soared, and newspaper sales increased significantly.
Tang Huan only quoted scriptures from the Book of Changes and gossip in a column set up for him in the New York Daily News, expounded on the way of a gentleman to improve his personal cultivation, and his attitude towards success or failure, and laughed and scolded his opponent's ignorance, which made "Phantom of the Tomb: Eight Arrays" stay in American theaters for another two weeks, and the self-worshipping Western world also carried other Chinese elements other than kung fu that he peddled.
All of a sudden, the topics of Pacific Telecom's data security and Wall Street trading system bidding all stood aside, and everyone came to see the richest man swinging his words and showing off his talents.
In order to regain the initiative, the New York Post began to digress, counting all kinds of gossip and rumors about Tang Huan, describing that he had built a big harem in Xiangjiang, and he traveled to Asia every year.
Not to mention, the rogue tactics of the New York Post have really attracted some popularity, after all, the dark psychology in this regard is something that can only be understood and cannot be spoken.
The approach of the Oscars has also given entertainment gossip news the confidence to make headlines. What's more, Tang Huan's Hollywood company still performed well in 1985, both at the box office and awards, and it reaped a lot of money, which further consolidated his position as a new generation of entertainment tycoons.
Like the "New York Post" mad dog style, in essence, belongs to a way of checking and balancing forces, is the long-term accumulation of the rules of the game in Western society, Tang Huan can't really care, "Playboy" boss Hugh Hefner and his "bunny girl", "Penthouse" boss Bob Guccione and his "baby", more evil than Tang Huan, but people still deal with it calmly. If you are serious, you will lose, and the self-deprecation peculiar to the United States is to deal with this situation of indefensibility.
Fortunately, at this time, another news came out, which rescued Tang Huan from the harassment of "hooligans are not terrible, but they are afraid that hooligans are educated".
Rich Screnta competes with the hacker who hacked the Pacific Telecommunications host with the ID Condor on a square server on the Stanford University campus network, and Condor takes the files from the server and proudly puts them on AOL BBS to show off.
Although the number is not absolutely large at this stage, the netizens whose quality is completely worthy of being called an old bird were in an uproar. You know, Rich Sclenta is a famous family, after Tang Huan's training, he should be regarded as a top technical elite, how could he be so easily defeated by this hacker who is addicted.
In this way, the disappointed person scolded: What a bullshit protΓ©gΓ© of the Son of Heaven, a straw bag, caused Lao Tzu to lose the gold coin; Conspiracy theorists ask: Is there something else going on in this...... AOL's various community spaces have suddenly become a mess.
At present, cyberspace and real society are still two distinctly separated worlds, and traditional media may not understand the thinking on the Internet.
Therefore, the New York Post, which was a little unknown, quickly found two "I want" comments from the Internet, adapted them, and published them, pointing the finger at Tang Huan: "Isn't Rich Skrenta your proud disciple?" But he was defeated by the hacker who had captured Pacific Telecom. It seems that your technical level is really very limited, and it is a matter of course to lose orders from Wall Street. β
Based on the experience of previous heavyweight sensationalist news, the New York Post doubled the issue and sent it to the operating network, only to have no more than the goods were rolled out, and a big mouth was pulled back - the FBI revealed a message at a press conference: "The hacker who illegally hacked into the Pacific Telecommunications network and stole user data has been caught, and it is Kevin Mitnick, who has committed a criminal record." Faced with ample evidence, he confessed to his crimes. β
Kevin Mitnick is not unknown, he successfully cracked the North American air defense command system at the age of 15, only to be arrested at the age of 16, thus becoming the world's first cyber juvenile delinquent.
In front of such a well-established figure, the capture of the host of Pacific Telecommunications is really not such an unexpected event.
People are more interested in how Kevin Mitnick, who has just won over a day over a day over Richie Screnta, ended up in the hands of the FBI and confessed to all the crimes.
Obviously, winning or losing this hacking war is not as simple as it seems, and there must be something hidden in it. I just don't know what means Rich Skrenta and even the teacher behind him, Tang Huan, used, to find out the culprit in a haystack.
The funny thing is that the New York Post is in such a hurry that this dynamic full of variables can be mentioned as a "tofu block", but you have to report on it at length and on it, and now you are shooting yourself in the foot -- so many current newspapers that have not sold have become proof of stupidity and ignorance.
Of course, the FBI won't give an answer to such a question - Kevin Mitnick is a guy that Lao Tzu caught on his own, if you don't believe it, then go and ask somewhere else!
As a result, the media outlets that refused to give up split up and demanded interviews with Pacific Telecom, Fang Yuan, Zheru, and even Rich Screnta personally.
As a result, Pacific Telecom, Fang Yuan, and Zheru were all very low-key, and only issued an official statement: The criminals were caught, and the people were happy, and we will be more cautious in the future to carry out system security work to prevent such accidents from happening.
If it is understandable that large companies such as Pacific Telecom, Fangyuan, and Zheru are old and serious, then Qi Skrenta's indifference is intriguing and reverie.
You know, such a young man who is still in college, who is in the stage of being strong and young, how can he be indifferent to the defeat record of losing to Kevin Mitnick.
Hiding on a college campus, Rich Skrenta became a product salesman and introduced one of the new achievements of Zheru in the field of computer security, the anti-virus engine, to fight off the computer viruses that were beginning to spread.
As early as 1949, in a lecture given to the University of Illinois, John von Neumann described a theoretical model of how a computer program replicated itself, essentially the prototype of a computer virus based on its basic characteristics.
With the computer from the mainframe to the minicomputer, and then to the microcomputer era represented by the personal computer, the computer gradually stepped down from the altar, the resources began to become abundant, the opportunity for ordinary people to access the computer also increased exponentially, and the research results of computer viruses in the academic scope became more and more fruitful.
When personal computers took the world by storm in the 1980s, computer viruses finally made their way out of the lab and made waves in reality. For example, in January of this year, an emerging virus that inhabits disk boot sectors emerged.
Zheru did not get involved in the field of computer antivirus software himself, but licensed a series of related technologies, including antivirus engines, to Symantec to launch specific products.
Because the scanning operation of computer antivirus software is very resource-consuming, it is difficult for personal computers to bear, so it draws on the implementation principle of "Hanka" and hands over part of the work to the hardware-computer virus protection card to perform, which virtually almost eliminates the possibility of such software being pirated.
Rich Skrenta is one of the protagonists of this hacking war, and although the result of the competition is lost, after Kevin Mitnick's bizarre and quick arrest, his previously lost reputation is instantly restored, and the avoidance of talking about it adds to the aura of mystery and unpredictability.
The reporters finally blocked him and asked him to speak, so they didn't care about what the other party said, anyway, publishing it would satisfy the public's curiosity.
As a result, before Symantec's antivirus software was officially released, it took advantage of a series of turmoil caused by the data breach of Pacific Telecom, and placed a large free advertisement, which caused various inquiries to burst calls.
However, this is just the beginning, and there are many more new technologies that have been revealed later. (To be continued.) )