Chapter 448: Brother Thief, come and steal my number!

"Everyone, I want to believe that everyone knows, what is the purpose of crying for a plenary meeting?"

Another Tang Dynasty company headquarters.

However, this time, Chen Jia summoned Zhao Danyang and Gu Xiaoyu.

Gu Xiaoyu is in charge of the Tang Dynasty network.

Its main products include Zhuxian OL, Ethereal Journey, Fantasy Journey to the West, Journey to the West, and the upcoming World of Warcraft, DNF, which can be said to control most of the domestic gamers. For such a game company, it is naturally necessary to do a good job of account security. Originally, this time, Chen Jiayi was ready to call Chen Tianqiao over. It's just that Chen Tianqiao is in Shanghai, and if you think about it later, the headquarters will hold a meeting first, and then push the specific plan down.

And Zhao Danyang, because Zhao Danyang is in charge of Tang Dynasty information, its main product is instant messaging. Although instant messaging is not the main target of theft, there are some rookie hackers who are not in the stream, and they often regard stealing other people's TT accounts as the embodiment of technology. This also caused a large number of people to lose their communication accounts. Even, because of the instant messaging account, he has a lot of business contacts. Including a lot of friends, if you lose it, the consequences are worse than the loss of your game account.

Often a TT account is lost, and for most people, I am afraid it will be crazy. It's not just about money, it's about all the friends you've made in a few years. However, if they are lost like this, they will lose the fun of surfing the Internet. Bi Jing, most of the net worms in the end, they all like to chat with familiar people. It's really hard for him to add some strangers he doesn't know.

So, Zhao Danyang, this time, Chen Jiayi also called him over. ”

What advice do you have for account security? ”

Both are CEOs of Internet companies and often deal with the Internet. Account theft, I'm afraid they are more affected than anyone else. Chen Jiayi wanted to hear what strategies they had.

"Mr. Chen, in terms of instant messaging, at present, we may not be able to fundamentally solve the problem of number theft."

At this time, Zhao Danyang said.

It's not that online game companies can't be safe, but that a large number of people, for example, have been infected with Trojans by some improper operations, like entering the human station and downloading a lot of viruses. Others, accept unknown documents from strangers...... All of these may be infected with Trojans, which can lead to account theft. But a lot of people, they don't know the dangers of doing this.

Even, for now, most people still use Internet cafes to surf the Internet. And we know that the Internet café, he is a local area network. In the local area network, it is easier for him to steal other people's passwords. For example, some rookie hackers, they will get a keylogger software. When the monthly account enters the account number in the account input box...... Then, this one software will record it.

In this way, it is easy to steal someone's account.

This is also why, in later generations, how dangerous it is to surf the Internet in an Internet café. Perhaps, if you are not careful, your things, especially valuable things, will be stolen by someone else. Moreover, those who are engaged in stealing from others, it is a heap of the day. Some are for fun, some are for testing technology, and some are purely for the sake of making money.

But no matter what, such a thing cannot be cracked down at all, and it is difficult to prevent it. For ordinary users, they have no precautions, so it is easy for the account password to be stolen. The brother who was in the Pengfei Internet café just now is very likely to have been hit by software such as keyloggers, so the account password was stolen.

Even if they pass the binding, in the end, the game character is empty. What kind of money, equipment, even the primary wooden stick on the body, maybe there is no one, only a pair of underwear that can't be thrown away, it's really miserable. Even, there is still a picture in the later generations, in which a large number of new characters have been established, but the characters themselves have been deleted. Above, every character, write a few words, what, tell you not to play the game, you still play the game, don't listen to it, I'll steal your number. One of the player characters who left a message at the end is also called a thief, and his brother stays.

Although many people laughed out loud after seeing this picture. However, who knows the severity of this number theft. If this thing is put in front of your eyes, I'm afraid you won't be able to laugh. What's more, this large number of stolen numbers is a serious violation of the user security of Tang Dynasty Company. ,

As a large company, the safety of users is naturally the top priority of Tang Dynasty Company. It's just that Zhao Danyang and Gu Xiaoyu are also helpless.

These methods of stealing numbers, although they are not necessarily clever. But it works, and it's ...... They can't stop it. Even, because it involves high-tech crimes, it is very difficult to catch.

For example, there is a rookie hacker, he opens a computer in an Internet café, and then, on the computer, implants a number theft software. Just ask, how many of them can be noticed in this way. Of course, there are also people who say it. Internet cafes can prohibit others from downloading, but if downloading is prohibited, it is estimated that there will not be many people in this Internet café to play.

"However, we could have made more efforts to recover the account password."

At this time, Zhao Danyang continued. ”

Danyang, these are all symptomatic and not cure. ”

Chen Jiayi shook his head.

Instant messaging example is good to say, the average person steals, will not be idle, delete a lot of your characters. At most, see if you have TT coins. Moreover, it is easy to get it back. It can be retrieved through various settings, for example, you can also provide the QQ number of ten friends, and even, some password protection. However, as an online game, he can't.

In online games, the key is not the account, but the equipment and money in the account. I stole your number. Even if you get it back. But in the same way, take all your stuff and sell it.

"Xiaoyu, you over there, is there a good way?"

"This, Mr. Chen......"

Gu Xiaoyu slowed down and then said...... "...... For the number theft incident, the Tang Dynasty network is the most seriously damaged. Moreover, this number theft is not just now. We have also introduced a Gendo security approach to this end. For example, password protection and the like that Mr. Zhao said...... But this is also a palliative rather than a cure, and it cannot solve the problem of account theft. ”

In fact, the problem of this account being stolen has always been a difficult thing for online games to solve. Even if the development of online games in later generations reached a very high level, it would not be able to solve this incident. Recently, if it weren't for the Cloud Security Alliance website launched by Tang Dynasty Antivirus, maybe there would have been more stolen accounts.

"At the moment, we are considering whether to bind game equipment and the like."

At this time, Gu Xiaoyu continued.

"Binding?"

This binding is actually quite well understood. That is, for important items and equipment, give binding. In the later generations, Jiuyou acted as an agent for the fairy sword series, and for the security of the account, he took a series of equipment and bound it. Thus, someone else can be regarded as stealing his account. For something important, you can't take it away.

"Nope."

Although this one measure can effectively prevent theft. But Chen Jiayi directly denied it.

Because he knows that a popular game lies in his openness. Just like Zhu Xian OL, his community. All the equipment, as well as the money, needs to be circulated, so that he has a sense of community. If bonded, how will the goods be circulated and how will the money be circulated? No matter how good the game is for a long time, it will be over.

To prevent number theft at the expense of the quality of the game, Chen Jiayi will never agree.

"That ......"

Hearing Chen Jiayi's direct denial, Gu Xiaoyu also understood.

In fact, this method was just something he thought of at random. If she were to do it, she wouldn't. You know, for the understanding of the game, this boss who stays on the front line every day. In some places, he understands the characteristics of the game better than Chen Jiayi. What kind of damage the bound items have to the game, she naturally knows no better.

"Let's analyze, where is the main trick of number theft now?"

Chen Jiayi has also thought of a particularly good way for the time being, but his understanding of the Internet is unique. A lot of things, even if there is no way for the time being. But when you think about it, you can still think of a great solution.

"Now the most important place for account theft is in the Internet café number theft, and the poisoning and theft of your own computer."

It should be said that these are these two.

In this world, no hacker has personally hacked into your computer just to get your game account. If you do, then you can only think that you are a fluke. For such a special case, Chen Jiayi directly ignored it. Moreover, there are basically no such examples. Those powerful hackers would never do such a painful thing. ,

"Internet café, Internet café."

Nowadays, there are not as many personal computers as in later generations, and most gamers are still only concentrated in Internet cafes. Naturally, Internet cafes have become the first concentration of number theft.

"By the way, if we can't solve this problem of number theft in software technology, can we pass something else? For example, to prevent theft through hardware. ”

Suddenly, a thought appeared in front of Chen Jiayi's eyes

Just as many software technologies can't solve the problem, it can be done through the Internet. However, if the interconnection gang does not solve the problem, it can be done through the hardware.

"Hardware?"

Several people did not understand.

"Yes, it's the hardware."

Thinking of this, Chen Jiayi's thoughts suddenly became clear. What I didn't think of before, all at once. In later generations, there were a lot of ways to deal with number theft, but they came one after another. ”

If we use hardware encryption methods, won't this problem of number theft be solved? ”

This hardware made Chen Jiayi think of the hardware secret card of later generations.

The so-called password card is to give a dynamic second password. After entering the account password, you also need to enter a one-time password so that you can enter the game. The dynamic password is also concentrated in the secret card. This password card is displayed horizontally and vertically through the coordinates, and each time you log in, you can have a different password. In this way, even if someone can steal your account password, it is impossible to steal your second password, which is the password in the security card.

While recalling the secret protection card, Chen Jiayi explained the secret protection card to the two of them one by one.

Until this time, Zhao Danyang and Gu Xiaoyu suddenly realized.

"Unexpectedly, through a small secret card, you can actually prevent the game account from being stolen."

They are all Internet cattle, and Chen Jiayi just finished speaking, and they already understood it

Even, Chen Jiayi's secret card, they have already thought of specific implementation methods, for example, such a secret card can be bound to the point card. As long as the player buys the Falling Block Game Point Card, then a random secret card will be given on the back. Thus, it is foolproof on the game account.

Of course, there are also some electronic security cards in later generations.

For this secret card, NetEase has a product called General Order. Through the random password sent out in the general's order, you can get his second password. However, this general order requires a cost to make. Moreover, it is not the best solution to ask players to buy. What Chen Jiayi is more satisfied with is to make a second password behind the point card. Delete the jump

"However, this can only be taken to protect virtual network game products. For Tang Dynasty information, there is nothing good. ”

Chen Jiayi muttered to herself. But he knew that it was estimated that no one would buy a TT password card, which was an extremely troublesome thing.

"By the way, is there any security management software in Internet cafes now?"

At this time, Chen Jiayi suddenly asked.

"Internet café security management software?"

"Isn't there our Tang Dynasty anti-virus and Tang Dynasty guards?"

For Internet cafes, they also need to use antivirus software, but these are only on the host. Other extensions are generally not used. Because, this greatly affects the speed of the computer. But in this way, there are also very hidden dangers for extensions.

"No, it's just personal security software."

Although personal security software can also be used by Internet café users, it is not useful for the security management of Internet cafes. However, when it comes to this Internet café security software, Chen Jiayi thinks of a well-known security defense system in later generations. This system is Lenovo's frozen system.

However, before the frozen system, the one that was more suitable for Internet café users was the famous ............ Shadow system. ”

Shadow system.

What is a shadow system?

In a general sense, the interpretation of the shadow system is isolation protection...... Windoura operating system, and create a virtualized imaging system that is exactly the same as the real operating system. Once in the shadow system, all operations are virtual, and all viruses and rogue software cannot infect the real operating system. If there is a problem with the system, or if you go online and generate junk files, you can simply restart the computer and everything will be back to its best. ,

To put it simply, that is, the shadow system, no matter what you do on the computer in the Internet café. However, as soon as it is restarted, it will return to the original setting of the Internet café. And this initial setting is all clean, just like a system restore. Restore to the original, uninfected place with the virus.

In this way, the Internet café Trojan is eliminated, and at the same time, the virus is also managed. Most importantly, it does not affect user downloads. Because, when you use the Internet café computer, you can also download it and go to your USB flash drive. When you're done copying and shut down, there's no more. It doesn't matter if you download a virus or a Trojan horse, delete them all.

In this way, if you surf the Internet in an Internet café, you will not be poisoned or planted Trojans, so the security of your TT account will be guaranteed. As for their unsafe operation on the personal computer, they have been infected with viruses and the like. Then there is no way, Tang Dynasty Company, it is impossible to do everything. ”

I think that this plan can be handed over to Tang Dynasty Software. ”

Chen Jiayi briefly talked about this shadow system, and almost, Zhao Danyang wanted to snatch this one of the realms.

However, Chen Jiayi will not hand over this system to Tang Dynasty Information.

Today's Tang Dynasty information is powerful enough, and a shadow system is even more invincible. It's better to leave it to Tang Dynasty Software to do, and with more software, it will be more able to start the reputation of Tang Dynasty Software......

At this point, for this account theft, Tang Dynasty Company also has a good prevention and control method.

Later, Tang Dynasty Network, including Shanda Network, announced at the same time, "In order to crack down on number theft, the two major companies have joined forces to jointly launch the Tang Dynasty Secret Protection Card, as long as users who purchase 50 Tang Dynasty point cards, they can receive a secret protection card." ”

"Awesome, after having a secret guarantee, which dog can I say can steal my account?"

After watching it, the players expressed their opinions.

Moreover, some players, even if they already have a card, immediately buy a point card with a secret protection card in the pendant.

For him, he will use it in the future anyway, and buying it now has further protected the security of his account.

"Haha, brother thief, come and steal my number."

Another player speaks.

It seems that the prestige of the brother who stole the number is famous in the game.

In short, the secret card launched by Tang Dynasty Company instantly became popular on the Internet. As long as you play Tang Dynasty online games, you have already used this secret protection card. Of course, when other game companies arrive, they are also immediately taking precautions. All of a sudden, in a relatively calm period of time, it seems that everyone has never heard of the theft of a certain game account...... It's just that things like this don't end there.

Shanghai.

A game studio.

In the eyes of Ming, this is a game studio, engaged in game gold mining activities. However, secretly, what no one knows is that this game studio is actually engaged in professional number theft. They use a variety of methods to implant countless Trojan software in major Internet cafes, so as to steal other people's game accounts.

Of course, they don't steal everyone, and if it is for some ordinary player users, it is estimated that there is little interest. In addition, if there is a large area of number theft, the impact on them is very great. When the time comes, it will not be good to provoke the Tang Dynasty company. Therefore, they have been very careful to only focus on some games to get rich, and for their accounts, it is a theft and a quasi.

It's just that there is silence in the studio today.

It wasn't until a long time later that the head of the studio roared, "Tang Dynasty Company, I'll give you a lung." (To be continued)