Chapter 430: Tang Dynasty Cloud Security Website Alliance
This kind of innovation of technical concept is simply another epoch-making innovation
Just ask, such a great progress is entirely for the wealth of mankind.
Perhaps, in the future, it will not be long before we can completely complete it with the cloud computing and mail introduced in cloud security... The network is the ultimate goal of computer ......". This kind of innovation, even if you think about it, you are crazy about it.
Moreover, this kind of creativity, which used to exist only in science fiction, is now really possible.
Yes, judging from the current speed of computer development, it is possible that in the next ten years, at most thirty years, such technology will appear. And it was the Tang Dynasty antivirus from China that led the development of this technology. This has also made the world discuss the topic of cloud security and cloud computing for a long time.
Even, when this cloud computing concept was thrown, it immediately swept the world. Many technology companies have announced that they want to enter the field of cloud computing. Such a concept also makes the capital market bring a steady stream of imagination. The major technology stocks of the NASDAQ have been hot and have been red again and again, which proves that this innovation will bring how huge the future space will be.
However, no matter how much the outside world praises him, Tang Dynasty antivirus has not stopped his ability to innovate.
Chen Jiayi, who was on the side, was extremely calm now. Moreover, in the comments of the World Review, he found another excellent idea, and this idea, that is, the Cloud Security Website Alliance. This alliance is not a website alliance that usually connects with each other, nor is it a website alliance for the purpose of increasing IP traffic, but a website alliance for network security.
"Jiafeng, do you think our antivirus software can go further on the Internet?"
Cloud security, in the final analysis, is a kind of interconnection network technology. Otherwise, it is not called a cloud. However, through the technology of interconnection and networking, he can realize a large number of technical means that cannot be achieved by traditional technical means. This technology is not difficult to say, it is not difficult to say that it is not difficult, but it is actually super difficult.
The first prerequisite is to have a large number of clients.
In other words, you need to have thousands of users to have your software products, so that you can smoothly roll out cloud security.
If it's just a few hundred, thousands, or tens of thousands, there's not a month at all.
And the ...... "cloud" in Chen Jia's heart is in units of 100 million.
"Mutual Connection?"
Lu Jiafeng obviously does not have Chen Jiayi's outstanding creativity, nor does he have Chen Jiayi's vision for the future generations. He shook his head and said to Chen Jiayi...... "...... At present, the first step of our Tang Dynasty anti-virus is to seize all users in the world. This is cloud security, and it's the foundation of cloud computing. As for the second step, we will see if we can go further in cloud computing to make its processing speed faster and more advanced. ”
Currently, cloud computing can only handle some relatively small things. Like virus scanning, thesaurus and so on. But if you want to deal with more complex content, like pictures, copying stuff or even online games. This is basically impossible, and as a result, cloud security has faced a bottleneck since its launch, which is how to improve the processing power of cloud computing.
Of course, one of the most effective ways to do this is to increase the computing power of the super server. However, in the face of calculations in billions of dollars, no matter how powerful a supercomputer is, it is impossible for him to process so much data. So, up to now, cloud computing is very innovative. But his computing power can't go any further. At most, it is to expand cloud computing in other directions.
For example, cloud IoT, cloud storage.
What's more, when cloud computing develops to a certain stage, he also has to face the problem of personal user privacy. Because, cloud computing collects a lot of information all over the world. Countless things about individuals, about personal privacy, will be collected by them. Although many companies want to avoid this aspect, it is not avoidable. Even, their promise not to publish personal privacy issues has also faced a large number of questions from individual users.
"I'm not talking about the research and development of cloud security technology, but the application of cloud security on the Internet."
Chen Jiayi knows the difficulties in this regard. ,
Seeing that Lu Jiafeng didn't understand, Chen Jiayi continued to ask...... "...... I would like to ask you, what are the ways in which a computer can be infected with viruses? ”
"The first is downloading."
Strictly speaking, as long as your computer is connected to the Internet, even if you don't do anything, you can get a virus. Just like a shockwave virus, infection can happen at any time. However, there are few examples of such infections. Most people are infected with viruses by downloading various software.
For example, there are some Internet rookies who think about doing bad things every day, and they don't know a little bit of black customer technology. I also went to download what TT thief was on the Internet, and downloaded the TT album breaking tool...... Some of these, though, do exist on the Internet. But what you find online, more than 90%, is a whole bunch of viruses.
Once you've downloaded and unzipped it, you're done......
Of course, this is only a small minority of infections.
There is another condition, which is more common than this.
That is, many male students, due to their physiological needs, also went to the Internet to cut some more exciting physiological films. Among these domestic films, Nissan, and European and American blockbusters, they are the most susceptible to viruses. And from the survey, among the ten men, as long as he goes online, there are basically ten men who have watched these physiological films. In this way, among so many screen names around the world, the number of men infected with the virus is extremely large.
"And then there's the training page."
In addition to downloading, there is also a more helpless and unstoppable way of poisoning, that is, the training web page.
In particular, when the average user needs to look up information, they will go to one website after another that they have never been to before. And after they enter, if these websites are hung with Trojans, or if they are hung with viruses. Then, your computer may be infected with these viruses. ”
The third one is a malicious super-powerful unknown virus. ”
It's like a shockwave or something. However, with the improvement of anti-virus technology, such viruses often only appear one or two in the city in a few years, and the impact is not as good as the first two.
In fact, there is another one, that is, through the way of hardware, so as to achieve infection. For example, a floppy disk, a CD-ROM hard disk, or a USB flash drive can be infected with viruses. However, this kind of infection, compared to the network soil, the probability is much smaller, and it is not the mainstream, so it will not be emphasized here.
"Very good......
Chen Jiayi is very satisfied"...... In other words, computer viruses or Trojan horses are mainly infected through personal websites, right......
Whether it's downloading or looking at a web page, you have to go to the website. Therefore, the ultimate source is all kinds of websites.
"Yes, so to speak."
Although downloading is still the most direct way to get infected by the virus in China.
However, with the emergence of a large number of websites, more and more Trojan websites, virus websites, are threatening the security of users' computers. At this rate, in the future, websites, even web pages, will become the main way for ordinary users to be infected with viruses. As anti-virus companies, they have an obligation to keep their PCs secure.
"Well, if there was a way to identify if the site has a Trojan or not, or, if there is a virus. Well, it is not effective to prevent ordinary users from being infected by viruses or trojans. ”
Chen Jiayi continued to guide.
"No, it can't be. ,、
Lu Jiafeng shook his head, although he thought that Chen Jiayi's idea was good, but he obviously had no practical ability. He said, "...... Whether a website has viruses or not, simply through antivirus software analysis, does not have much effect. Because viruses and Trojans come in so many ways, we can't tell the difference at all. Also, we don't know the source code of the other party's website. ”
A website that he can't be so easily identified by you whether he has a virus or not.
Moreover, most of the people, he didn't know anything about this site at all. No matter how powerful a computer is, it is impossible for him to determine whether an unknown website has a virus. Until he opened it, perhaps, he had been poisoned Q unless, you did a whole lot of strict protection. ,
"Not bad."
Hearing Lu Jiafeng's answer, Chen Jiayi was very happy. The clever Lu Jiafeng, under Chen Jiayi's casual guidance, already knew that Li Yi used anti-virus software to detect whether there were viruses on the unknown Internet. Although, in his opinion, this test will not be successful. At most, it can only detect some Trojan websites with relatively backward technical means.
"But what if you do it manually with ten computers, and two sides of it?"
"Manual Ten Computers?"
Lu Jiafeng thought about it, but still shook his head...... "...... Manual judgment is the same as computer judgment. ”
The way the computer judges is what the programmer attaches to him.
Therefore, manual judgment is the same as that of a computer, except that the computer is faster.
"Unless, these websites, we put a piece of code in them."
Just like monitoring traffic, if you're going to monitor traffic, you should naturally embed a code that monitors traffic. Otherwise, you won't be able to count how much traffic you have. It is the same whether the website has a virus or not, if a code is implanted in their website that can be recognized by the Tang Dynasty Gongsi. Then, with this piece of code, you can also see if the website has a virus. ”
But is this impossible? ”
Lu Jiafeng said another sentence secretly. But in my heart, what website would implant a piece of code in itself?
"Haha...... Jiafeng, you are really smart. ”
Chen Jia burst out laughing.
"Ah......h
How?
Chen Jiayi laughed, but Lu Jiafeng didn't understand.
"Hey, don't you think it's possible for anyone else to agree to us inserting a piece of code?"
"Yes."
"It seems that you have underestimated the anti-virus energy of the Tang Dynasty. Alexa's traffic rankings can rely on his traffic statistics, so that a large number of websites can be implanted with an Alexa code. Our Tang Dynasty anti-virus, can't it? ”
In fact, if you ask a person individually, they may disagree. However, when a large number of people joined this one realm. Then, everyone else, etc., will automatically join. If you don't, then when you visit your site, you will think it's a risky site and won't get in. Until that time, it was difficult for them not to join.
This is also why later generations, why you can see that there is a tick mark behind the website address.
Speaking of this, Lu Jiafeng suddenly realized.
I see, this one is actually the same as Alexa's statistical traffic. It's just a different way.
"I see."
A week later, Tang Dynasty Antivirus After everyone discussed the topic of cloud security and cloud computing, Tang Dynasty Antivirus took advantage of the hot iron. Once again, a ... Tang Dynasty Yun'an Association Website Alliance ...... "Counting the Realm."
The program is mainly aimed at small websites that are unknown all over the world, as long as you follow the requirements of the program. Then, Tang Dynasty antivirus can prove that your website is a safe and secure pollution-free website.
At the beginning, everyone maintained a certain vigilance about this plan, and there were not many personal websites that chose to join the plan. Bi Jing, the plan is to implant the code given by the Tang Dynasty antivirus in the personal website. However, not all personal websites, he thinks so. There are a few small websites that have chosen to join the program.
It wasn't until it was successfully passed that Tang Dynasty Antivirus put a red hook logo on the back of the website. Since then, the website has become a safe and virus-free website under the anti-virus certification of the Tang Dynasty. All of a sudden, when there were some monthly households who used Tang Dynasty antivirus software, when they searched for the website, they suddenly saw that there were some red hooks on these websites.
It wasn't until after reading it that I found out that these red-hooked websites are all safe and secure websites. Users can enter directly and will not be threatened by any Trojans and viruses. All of a sudden, some of the first to join... The personal websites of the Tang Dynasty Cloud Security Website Alliance ......" plan, under the differential treatment of users, their traffic has been rising, and countless similar websites have become popular.
It was only then that the websites that had never moved finally made their way out.
A large number of individual or small websites around the world have implanted this code in their own personal websites to prove the purity of their websites. Of course, in the face of some of the world's mainframe structures. The Tang Dynasty did not ask them to implant the virus, maybe they love face and will not implant it. However, there is a solution to this, and that is to directly tick their website. Because, the Tang Dynasty anti-virus believed. With the security awareness of these large websites, there is no need to detect them at all.
In addition, because of the implementation of the "Tang Dynasty Cloud Security Website Alliance ......", it has also helped ordinary users choose Tang Dynasty antivirus software to a corresponding extent. Because...... Tang Dynasty antivirus software can distinguish which websites are safe and which are not. In this way, ordinary users will feel more at ease when training the website, and do not have to consider the threat of viruses or Trojans. (To be continued)