Chapter 62: Half-Life
This news has just been released and immediately attracted the attention of industry insiders. And, soon, the news spread around the world. And for the major domestic portals, they have finally reacted. Hurriedly used technical means to block Microsoft's IE vulnerability. Of course, the Trojan horse program will not be recognized by several major portals.
Anyway, no one saw it, and ordinary netizens definitely don't know what Trojans are or not. However, the major portals can deceive many netizens, but they cannot deceive the market. The stock price of NASDAQ** fell by 15% in an instant at the opening of the day, and hundreds of millions of dollars came to naught.
The most serious thing is not **, anyway** is also a victim. And the source of the damage caused by ** and other major portals, that is Microsoft. Now that the Internet winter has not passed, Microsoft's super-large vulnerabilities have broken out again, and countless investors who own Microsoft shares have lost confidence in Microsoft and have sold their stocks for a while. If it weren't for the mysterious funds in the disk, I am afraid that Microsoft's market value would disappear by 1/3 in one day. However, even so, at the close of the day, Microsoft also fell 17%, which can be regarded as a small warning to Microsoft.
What made Chen Jiayi cry and laugh the most was that Microsoft actually held a press conference after the incident that day. It is said that Microsoft is preparing an operating system fund to maintain the security of the Internet around the world. What is said in writing is confusing, but in fact, it is to let the world's computer masters scratch bugs for Microsoft.
Moreover, this press conference, Chen Jiayi knew, but it was specially held for him.
Microsoft wanted to send an email to Chen Jiayi, but the intrusion method used by Chen Jiayi at that time, they couldn't crack it at all, and the IP address corresponding to the email received was actually their headquarters. Now Microsoft has broken out a super big bug, which is difficult to estimate for Microsoft's selfishness. Looking at it now, the $10 million given to the hacker at the beginning seems to be worth it.
However, Chen Jiayi was not interested in Microsoft's press conference. Now he can't attract him anymore with the 120 million gold dollars. His plan is too big, and without the scale of billions or tens of billions, it can't run at all. Therefore, Chen Jiayi is too lazy to catch worms for Microsoft.
Now Chen Jiayi appeared at the headquarters of the Hacker Alliance, explaining the specific knowledge of firewalls to the members.
"I don't know if there is anything you don't understand, if there is, you can put it forward now, and we will solve it together."
After getting along with the alliance members for a long time, Chen Jiayi probably also knows the strength of the alliance members. These members are still relatively rich and experienced in invading methods. It's just that Internet intrusion technology, he doesn't just refer to intrusion, he also has an important technology, that is, protection technology. Strictly speaking, as a top hacker, his protection technology must be better than the invasion technology, otherwise, he can't protect himself, even if the White House and the Pentagon are successfully entered by you. However, as you enter, you are also exposed to the eyes of others.
Obviously, the protection capabilities of the alliance members are not good enough. This is also why a few days ago, JACK didn't make much effort, and broke many meat machines of alliance members one after another. If the protective measures are done well, even if others can crack it, their own side will be able to know about it, so as to cut off all contact with the meat machine first, so as to get away with the network.
The firewall is the most important means of protection.
Even the best hacker needs the protection of a firewall. The same is true for a master of technology like Chen Jiayi.
"I have a problem with overthinking data."
At this time, Xiaobai, a member of the alliance, asked Chen Jiayi a question.
"Well, let's talk about it, everyone is here, we can discuss it together."
Chen Jiayi's skills are good, and he also explained to them as a consultant. However, Chen Jiayi is easy-going and not arrogant, even if these alliance members are not as skilled as him, Chen Jiayi also talks to them in the same capacity. This small move has enhanced the goodwill between the members of the alliance and Chen Jiayi.
"Firewall data settings may not be very good on my side. If the time setting is too strict, some normal data will be isolated. If the settings are too loose, some illegal data can also be easily entered. ”
Xiaobai described the problem in detail, hoping that Chen Jiayi could help him answer it. ,
The technology of the firewall is actually the technology of isolation.
This kind of isolation is the isolation of data. For normal data, the firewall will open the door to him, and for abnormal data, the firewall will isolate him. However, as a hacker, when he wants to invade, he will definitely disguise himself. There is some data that seems to be normal, but it is actually an illegal packet. If he is put in, he will be successfully hacked by this hacker.
"When it comes to isolation technology, it's something that the world has been talking about all the time. However, based on the analysis of the information left before, we would like to change the way of thinking......"
After all, no matter how clever the isolation technology is, it has its shortcomings. The so-called road is one foot high, and the magic is one foot high. If you keep an eye on this isolation technology, even if it can be successfully protected now, it will still be easy to be cracked in the near future. The point of view put forward by Chen Jiayi at this time is the most advanced firewall concept in the future.
"I see."
After Chen Jiayi focused on explaining the latest theory for an hour, the members of the alliance came to their senses. It turned out that most of the members only felt that although this concept seemed very novel, they felt that it was too empty when it was actually implemented. Now that I heard Chen Jiayi's explanation, I understood it one after another. The content that was a little confused before was also resolved one by one at this time.
"If everyone knows, starting tomorrow, we'll be building our own firewall together."
To build a firewall, Chen Jiayi's purpose is twofold.
The first is to cultivate members of the alliance, and the second purpose is to really want to make a super firewall for the Chinese people.
……
Tang Dynasty Network.
"Xiaoqiang, how is it, the current progress is okay."
With the addition of a 2D engine with particle systems and perspective technology, the mission requirements have been greatly increased. But fortunately, the Tang Dynasty network has also recruited a large number of programmers during this period, so the construction period will not be delayed.
At this time, Tang Dynasty Network has already left work, but many employees are still concentrating on their work.
Chen Jiayi knew that it was a pride for them to develop a 2D online game for Chinese people. Before the recruitment, many employees recommended themselves and joined the Tang Dynasty network, in order to participate in the research and development of this product together. Therefore, there are many employees who basically work selflessly day and night.
Chen Jiayi was happy about this situation, but he was also secretly worried. He knows that a large number of programmers are suffering from such and such problems because of such hard work, and their bodies are worse than otaku.
"Now that you're off work, you'd better take a break. Let's play a game. ”
Chen Jiayi clapped his hands and motioned for everyone to stop what they were doing. Then he asked Zhou Xiaoqiang and said, "What games do you usually play?" ”
"Half-life."
Speaking of games, a large number of employees got excited and said in unison.
);