Chapter 1040 Yahoo goes public

The first half of the big chapter will be published first, and the full text will be published tomorrow. Pen Γ— fun Γ— Pavilion www. biquge。 info has opened the starting point of this chapter or Q_Q mobile client, when the time comes, you can press and hold the name of this chapter on the directory interface, and download it again.

……

……

Without comparison, there is no distinction between superior and inferior.

There are many criticisms of the traditional record industry for consumers.

For example, in a purchased record, there are often only one or two really good works, and the rest of the works belong to the number.

Consumers have been accustomed to enduring, but when the Internet tide hits, they are unwilling to accept this overlord rule.

Under the methodical promotion of Tang IT, digital multimedia technology, including digital music, has matured; P2P networks, which have revolutionized Internet data transmission and information sharing, are out of control; The open source community is becoming more and more active......

With conditions such as these, sharing digital music over the internet is starting to become commonplace.

Instead of being rigidly fixed by record companies on traditional physical carriers such as tapes and CDs, which had to be bought with all the money, music works are no longer converted into digital music formats by some people with professional system conditions, or just for the purpose of sharing music or for the purpose of attracting website traffic, and put them on the mutually beneficial network for everyone to download.

In this way, music lovers will no longer have to contribute an entire record to the sales of a record company just for a piece of their favorite, as they did before.

And the reality is not only that, music lovers can go one step further and collect their favorite works together to become a real "golden song collection".

Of course, most of this kind of music sharing over the Internet is unauthorized.

The record company is very weak in this regard. The idea that a single complaint can be solved is as naΓ―ve as believing that the police can solve the case 100 percent.

This contradiction is a bit similar to the industry impact caused by videotapes more than ten years ago.

Regardless of the fact that Hollywood companies now see the distribution of movie tapes as an important source of revenue, they were worried that people would not go to the cinema and would want to get rid of the tapes as soon as possible.

Such a situation may seem a bit ridiculous, but in the face of interests, foresight is not necessarily necessary.

Compared with the record companies at this stage, they are confused about the "monster" of "Internet + digital music", Tang Huan is like a mirror in his heart, the upgraded version of the Walkman, and the digital music player is time to take the stage of history by sweeping.

Perhaps, the name that people are more familiar with this product in the original time and space is "MP3", which is directly referred to as a digital music format.

Of course, the current "MP3" digital music format, just like "VCD", has undergone completely different changes with the layout of Tang IT.

For example, in the audio compression and decompression standard controlled by Zheru, although the "MP3" digital music format still uses a lossy compression algorithm, it natively supports digital copyright protection and is friendly to the open source community.

It is no exaggeration to say that with Tang Huan's current technical resource reserves, digital music players are not a thing at all!

In terms of software: digital music format, which has long been mature; Operating system, off-the-shelf ......

Hardware: RISC microprocessor, 1.8-inch micro hard drive, flash memory, battery...... Also all ready!

In terms of content: With the dust settled on the acquisition of Polygram by Yanle Entertainment Group and the emergence of the world's largest music group, this most important condition has also begun to be included in the scope of control.

On the marketing side: Jobs has been taken care of for so many years, it's time for the promotion of digital music players, to work!

……

The following is the anti-D part.,Update it tomorrow.,Just ignore it.。

……

The Chernobyl virus, which has the characteristics of both a computer virus and a computer worm, and can cross multiple platforms, has refreshed people's perception of the extent of damage to malicious computer programs, but it has also paid a lot of money.

After all, although most BIOS damaged computers can be remedied by returning to the factory for repair and chip replacement, whether those documents that store important information can be recovered depends on whether Lady Luck is willing to take care of them.

And these are only the most direct losses, as for those indirect, invisible losses, it is difficult to accurately assess.

The Wall Street Journal's claim that the Chernobyl virus has caused $10 billion in global damage is not an exaggeration.

Just as all walks of life were scrambling to deal with the raging Chernobyl virus, just four days after the massive outbreak of Chernobyl, that is, the turning point of the Chernobyl virus outbreak, which began to slide from its peak, an account in the free~you and open-source software community, believed to be from Russia, sent out an open letter.

It declares that he is the author of the Chernobyl virus; Purely unintentionally, this "little thing" was accidentally leaked out; Disturbed and sorry for the unexpected damage caused; In order to minimize the harm, the source code is now open to the public, so as to work together to form a more effective and appropriate disposal plan.

As a result, the Chernobyl virus, which has changed the color of countless people, has been completely "revealed to the world".

In the beginning, many people were very resistant to receiving email attachments with the source code of the Chernobyl virus.

Hmph, don't try to fool me!

The previous e-mails such as "cover letter" and "I_LOVE_YOU" that were very confusing can make people miserable!

However, when the source code of the Chernobyl virus was confirmed, everyone's attitude immediately changed!

Computer security companies, represented by Symantec, said worriedly, "The publication of the source code of the Chernobyl virus, on the surface, is conducive to figuring out its true mechanism and helping to prevent and control it; But at the same time, it is more likely to be used by people with intentions to breed a variant of the Chernobyl virus. ”

The attitude of the US security services seems to be speculating with the greatest malice: The author of the Chernobyl virus is not necessarily out of good intentions when he publishes the source code at this time, but he is afraid that the purpose of adding fuel to the fire is the main thing.

For this reason, the United States asked Russia to arrest this dangerous hacker who caused tens of billions of dollars in economic losses to the world.

Russia promised very well, but it didn't come to fruition, and I don't know if it was because the author of the Chernobyl virus really saw the beginning and the end, or because of the poor performance of the economy for many years, he began to deviate from the United States.

However, the technical community has been jubilant about the disclosure of the source code of the Chernobyl virus; Especially after an in-depth analysis of the source code of the Chernobyl virus, countless people sent their knees of adoration.

……

The author of the Chernobyl virus, who is simply an alien, how did he come up with such an ingenious mathematical algorithm?

There is no doubt that the author of the Chernobyl virus is a top master who is well aware of the development of computer technology in the last decade or so; Otherwise, the Chernobyl virus will not be full of defects and bugs that are almost impossible to detect

The emergence of the Chernobyl virus has made the contemporary computer industry look back and conduct a serious and comprehensive examination of its own shortcomings under its colorful halo, and to a certain extent, it is not hesitant to spur on.

The Chernobyl virus tells the public what kind of technology a clever hacker should have.

If you are interested in computer technology, then you can become a first-class expert if you study the source code of the Chernobyl virus thoroughly.

……

The admiration for the Chernobyl virus and its authors is like the water of the Yangtze River, flooding uncontrollably.

Later, some people pondered: No, the author of the Chernobyl virus, such a fork, should not stay in the desert of the development of the personal computer industry in Russia.

As a result, the true identity of the author of the Chernobyl virus has been discussed in the dark.

The reason is there, such a master who has trampled the entire computer industry on the soles of his feet, if he wants to hide his traces on the Internet, or create an illusion of his existence on the Internet, it is too easy!

……

Of course, while some people are blazing with gossip, there are also people who are serious about doing practical things.

Fangyuan officially announced that it will launch a dual BIOS design scheme for the motherboard used in Fangyuan's personal computer to resist the devastating damage to system hardware caused by the Chernobyl virus and its variants.

The corresponding principle is also simple to say: one of the BIOS chips still uses the popular kind that can be erased by changing the voltage, which is conducive to adding upgrades and maintenance, including support for the latest CPUs; The other BIOS chip uses the kind that can only be erased by ultraviolet irradiation. In addition, it provides a usable backup in the event that the former is corrupted, resulting in the inability to boot properly.

Although the technology launched by Fangyuan Company has no revolutionary gold content, it is better to do than not to do it, showing a serious and responsible attitude of shame and courage, and it suddenly ushered in a piece of praise, and the industry is also full of responders.

……

However, not everyone can get a positive reward from the review and redress of the Chernobyl virus.

Because the destruction of computer hardware by the Chernobyl virus has left an indelible impression, it is not difficult to guess that when the source code of the Chernobyl virus was made public, someone immediately began to study it, and a conclusion was quickly reached.

That is: compared to the indiscriminate destruction of office software files on hard disks by the Chernobyl virus, its devastating attack on hardware is only aimed at computers with a mix of 32-bit and 16-bit operating systems, and only 32-bit operating systems, or 64-bit operating systems.

This is so because in order to destroy the BIOS on the motherboard, the voltage must be changed, which in turn needs to be approved by the system for interrupt calls.

It is precisely those 32-bit and 16-bit mixed-architecture operating systems that do not have perfect access management for interruptions, so that masters like the authors of the Chernobyl virus have found an empty door that can be attacked.

Now that we know what the problem is, the destruction of computer hardware by the Chernobyl virus is not as terrifying as it was when we were completely ignorant at the beginning.

All the user needs to do is to install a pure 32-bit operating system.

This is not a difficult matter, including the StudiOS_i of Zheru Software and the Windows_NT of Microsoft, there is still a lot of leeway.

It's just that this research conclusion has brought a catastrophe to the windows_98 of the operating system launched by Microsoft for the consumer market this year.

It must be admitted that by learning from others' strengths, the new windows_98 has won a good market response; In particular, because of the anti-monopoly lawsuit, Zheru Software Company has given Microsoft room to play.

However, in order to maintain compatibility with 16-bit applications that still have a significant market space, windows_98 adopted a hybrid architecture of 32-bit and 16-bit, rather than Zheru Software equipped StudiOS_i with more technically complex virtual machines.

In this way, the Chernobyl virus, which can destroy computer hardware, windows_98 become the most helpless operating system.

It is important to know that a secure operating system will have a protection mechanism for Interrupt_Description_Table interrupt description table, i.e., IDT, to avoid changes in program code, including computer viruses.

Microsoft's windows_95 and windows_98 in the consumer-level operating system market did not have this protection mechanism, and as a result, it was beaten into a sieve by the Chernobyl virus.

Because the protection mechanism of the interrupt description table designed by the operating system is too core and too low-level, the value of the windows_98 change is not large.

After all, instead of wasting resources tinkering, it's better to develop a completely new replacement that's perfect enough.

In other words, after the Chernobyl virus is so raging, the windows_98 that has made Microsoft happy for a short time may be about to die.

More precisely, Microsoft has lost the trust that exists in the face of the entire windows_9X branch of the consumer operating system market.

……

In Seattle, at Microsoft's headquarters, Gates, Steve Ballmer, and others are discussing how to deal with the entire windows_9X branch product line.

This is not just a waste of windows_95 and windows_98, because Microsoft saw the good response in the windows_98 market, and rushed to develop the next generation for the millennium, the windows_ME.

In this case, the elimination of the windows_9X branch product line would mean giving up the two operating system windows_95 and windows_98 that are still being sold, as well as the successor windows_ME that is being developed, and the resulting loss is too painful.

Steve Ballmer was still holding on to the luck of the windows_ME being developed to make up for the defect of the windows_9X branch product line being broken down by the Chernobyl virus.