Chapter 273: Space Hacking

If you don't die, you hate it. 【Full text reading】All this *** Ancang experts. Someone else in front of a few liters. The lion body footage stole my email live, and you actually said that you couldn't find any traces of intrusion, not even malicious code, why don't you die, do you have the face to be a security expert?

Go to the first report again, Qiao Buying vomited blood even more, that video started when Hu Yifei took out his mobile phone from his pocket, although the content behind it was translated, but Qiao Buying was still confused, he still didn't understand why Hu Yifei chose Apple's smartphone. He demonstrated what the attack was trying to prove.

"Smack!"

Qiao Buying threw the report on the table, a little depressed, and said in his heart What kind of service level are these people!

Sullen and angry, Qiao Bu didn't die before picking up the report in the middle, opened it, only sighed that his hand was cheap, and even turned over two stinky cards, I knew that I would read this report first, wouldn't I understand everything!

The report is about the ins and outs of the matter. The people from the Administration Department have investigated clearly, and the young man in the video screen is named Hu Yifei, who is the president of China Figo Security.

"Oh?"

Joe is a little surprised, he has the impression of this company, the previous virus frenzy, it seems to have been extinguished by Figo Security, and recently Figo Security has made a lot of noise in the industry, I heard that it was going to plot the murder of Microsoft with Google, although the media in the United States did not report much, but Joe did not die, and I heard about it some.

The report shows that Hu Yifei was at the press conference at the time, introducing a new anti-virus model and technology proposed by Figo Security, and when asked by reporters, he casually made a demonstration, so there is the video content in Qiao Buying's hand.

Joe closed the report hatefully, and the truth of the matter was known, but the details of the matter were still very vague, for example, what questions were raised by the note. caused Hu Yifei to take the apple and open the knife; Also, which media is that reporter from, and is it malicious?

"Click!" Qiao Buying picked up the phone and was about to call the administration department again, but the number had not been pressed. There was a knock on the door.

"Come in!"

Joe's immortal assistant hurried in, "The people from the Administration Department have already got the full video content!" ”

"Call Shang Tsusawa and go to the conference room!" Joe dropped the phone and gathered in the office.

This time, I turned Ze sentence by sentence on the spot, and it took nearly an hour to finish the video.

Qiao Buzhi stared at the picture, sat there and pondered his eyebrows, the ins and outs of the matter, he finally understood that the reason why Hu Yifei used Apple's mobile phone as a demonstration prop at that time was just because he "didn't prepare in advance", so he casually took out his mobile phone, this reason is too slippery, who knows if he did it on purpose.

As for the content of the demonstration, Hu Yifei tried to explain to the media what is the difference between attacks "targeting personal computers" and "targeting personal information".

Joe Buying looked at the security expert on the side, "What do you think of this intrusion?" ”

"This is a very typical attack on the information of the target person!" The security expert was even, first said a word of nonsense, saw that Joe was not dead, his face was not good, and quickly explained, "Generally speaking, the attack of virus and Trojan horses should be divided into two stages: the purpose of the first stage is to infiltrate the target person's computer and mobile phone, which is called an attack on personal computers; The second stage. It's a spy program that uses it to lurk in. Waiting for the information of the target person to steal is called an attack on personal information. ”

Qiao Bu nodded, although the first stage also served the second stage, but there were indeed some differences between the two.

The security expert saw that Qiao was not dead, nodded, and then continued: "Hu Yifei's attack directly crossed the first stage and carried out an attack on the target's ** information, and it was very effective. His purpose, perhaps, was to tell the media that it was stupid to attack PCs. Because your attack methods are limited by different hardware and software platforms, the process is complex, and it is easy to be prevented; However, if an attack is launched against personal information, it can cross the restrictions between such platforms, concise and effective! ”

"Do you mean that the other party's attack method can be completely unrestricted by various platforms?" Joe asked rhetorically.

"That's not right!" The security expert shook his head, "It's not that it's not unrestricted, but it directly crosses this limit, there is a difference between the two, the former is like covering with artillery fire, its purpose is to destroy the enemy's fortifications, tear through the defense line with artillery fire, and then destroy the enemy's living forces; And the latter. It is a precision-guided ground-penetrating missile. to carry out the pre-slash operation! ”

Qiao Buying finally discerned the subtle differences from this awkward explanation, that is to say, your restrictions still exist, they are there, but the forms of other people's attacks are no longer within the scope of your restrictions; If it's covered with artillery fire, it's the ones who break your limit, and after you break it, you're not restricted.

"So it's not our systems and hardware that are buggy?" Joe asked rhetorically again.

The security expert nodded, "Yes, Hu Yifei's congregation was not carried out against our systems and hardware at all. So the loopholes are in place, and the mountains are in this aspect! ”

Joe doesn't die, and this time it's a little incomprehensible. Since Hu Yifei didn't come to target Zhuo Guo himself, what did he mean by doing this?

"After the dawn, this video will be published by many media, and it is estimated that there will be more and more attacks like this in the future, and it may become a trend!" Security experts are not without concern and expressed their opinions, "With the current security methods, it is difficult to defend against this kind of attack, the security community is still fighting a conventional war, but hackers have entered the era of space warfare!" ”

The words of the security expert woke up Qiao Bu at once, and he suddenly understood a little that since Hu Yifei dared to sell this kind of hacking technology, he naturally had a way to defend himself, and he did it. In fact, it is still selling Figo Security's security technology. Annoyingly, Apple has become a victim of Hu Yifei's hands, if you are not an expert, it is difficult to figure out the doorway here, if this news is distributed, those ordinary users will definitely think that Apple's mobile phone has a great defect.

Joe Immortal slammed his fist on the table, a little depressed. It's obviously not Apple's own problem, but this matter can only be a dumb loss!

Apple has since clothed its own smartphones. The market share is rising, and there are few rivals in this small field, and the success or failure of smart phones. To a certain extent, it determines who can master the mobile Internet in the future, not only the old mobile phone companies are staring here, but also those Internet companies hope to copy their success in the Internet to the mobile Internet again. The sudden rise of Apple's mobile phone has made Apple the target of public criticism, and some people are eager to hope that something will happen to Apple, and if this thing breaks out, it can only be Apple whose reputation will be damaged.

"Contact the media and ask them to focus on Figo Security's new anti-virus model and downplay Apple when they report!" Qiao Bu gave an order to the people in the marketing department, and then turned to his assistant and said: "You go and contact Figo Security, it is best to let them come out to clarify and confirm that there is no loophole in our Apple mobile phone itself!" ”

Most of the people in the conference room walked away at once, leaving only Qiao Buying, Fu Ze, and the security experts sitting there without moving.

Qiao Bu sat for a while, and then instructed Tsu Ze: "Play the video just now!" ”

This time, Qiao Buying looked very carefully. When he saw the boss switching back and forth between various desktops and displaying those different viruses, Joe shouted to stop and asked the security expert on the side, "Can you understand what kind of technology this is?" ”

"It's kind of like virtual technology, but it's not like it!" Anjin expert.

"Different viruses run on different desktops. And these viruses exist on the same operating system at the same time, Qiao Bu Die groaned for a moment, or asked the security expert, "If this person on the screen, he doesn't log out of the desktop." Then the virus in the desktop will always be there, and all the files in the desktop will be retained, right? ”

The security expert nodded hesitantly, "Judging from this person's introduction, it is indeed the case. ”

Joe Immortal finally grasped the crucial point, a system, let it have many desktops, it is not difficult, but if you want to make these desktops independent of each other, access to an operating system and hard disk. But there are completely different multiple looks, which is a bit difficult, especially switching between desktops. It's so fast, it's as easy as building a workbook.

"If Apple's mobile phone also has multiple desktops" Qiao Budie's mind suddenly came to life, then users can get more views on a mobile phone, more private space, and as Apple, more applications can be sold.

The success of Apple's mobile phone is not the success of the sales data of the mobile phone itself, in addition to the unique style of design technology, its success is largely due to the fact that its users can get support for a large number of third-party applications. Apple stipulates the standards for hardware and software, and then authorizes the software developer to design programs that can run on the mobile phone, and after these programs are done, they can be put on the shelves and sold in Apple's online app store after Apple's certification.

This move not only allowed Apple to obtain a steady stream of various applications to provide users, but also made Apple the world's largest mobile application provider. It's also one of Apple's most important sources of revenue. (It's a bit like the starting point model, where the author writes a book for the starting point, the starting point cloths, reads and looks like buying a book!) οΌ‰

Thinking of this, Qiao Bu Death suddenly stood up, opened his mouth and wanted to command, but the people who could do things now had already gone out to do things at this time, he glanced at the translation and security experts, and had to give up, and slowly paced out of the conference room, he needed to sort out his thoughts.