Revisiting Future Path

Chapter 263: Official

Episode 265

On December 14, 2009, the FreeHuman worm incident dealt a heavy blow to the image of Spring and Autumn Security Manager.

Some public intellectuals and opinion leaders took the opportunity to slander Zhiyu Technology and Chunqiu Security Manager, criticizing the smartphone operating system as not as reliable as iOS and Android, and calling Chunqiu Security Manager useless. At the same time, domestic and foreign anti-virus software manufacturers hate Chunqiu Security Managers for their free strategy to seize 72.8% of the market share in China. The Ming Dynasty ridiculed that since ancient times, there are no good products because they are cheap. Free Chunqiu Security Managers must be a mess.

Seeking truth from facts, these slanders have some truth.

In the past, Wei Dongsheng launched Spring and Autumn Security Manager, not to enter the network security market, but to assist in the promotion of products such as third-party payment credit treasure. During the rise of the Spring and Autumn Period, Wei Dongsheng used defensive counterattack compromises in non-core business areas, and did not have the intention of fighting hard with domestic and foreign security software vendors. In the next few years, Chunqiu Group positioned Chunqiu Security Manager as a full-featured security control, which could ensure that the Chunqiu series of products such as Xinbao, Chunqiu Network's online game service, and Chunqiu Literature's online literature service are free from Trojan horse viruses.

After all, Chunqiu Group is a company. Even if Wei Dongsheng has no profit requirements for Chunqiu Security Butler, the Chunqiu Security Butler team also tends to maximize profits and show its presence. In recent years, the network security technology resources of the Spring and Autumn Security Manager team have tended to invest in the profitable and profitable enterprise version of Spring and Autumn Security Manager, rather than the individual user market with a leading market share. In general, the enterprise version of Spring and Autumn Security Manager is stronger than the mobile version of Spring and Autumn Security Manager, and the mobile version of Spring and Autumn Security Manager is stronger than the computer version of Spring and Autumn Security Manager.

However, the spring and autumn security steward voluntarily retreats, not afraid of domestic and foreign security software vendors.

The core business is aggressive and the non-core business defends and counterattacks. This is Wei Dongsheng's business thinking. When someone bullied the Chunqiu security steward for not being aggressive and tried to infringe on Wei Dongsheng's smartphone business, which Wei Dongsheng regarded as a cash cow, by a Trojan horse, Qianlong Zaiyuan's Chunqiu security steward immediately launched a sharp counterattack.

Do you laugh at Chunqiu's security steward as paper?

Great.

That being the case, Spring and Autumn Security Butlers simply stepped into the network security market thoroughly to see who is strong and who is weak.

On December 14, 2009, Spring and Autumn Security Manager carried out an unprecedented major update: first, zhOS (collectively called zOS and hos) forced to bundle Spring and Autumn Security Manager and no longer allowed users to uninstall by themselves; second, computer version of Spring and Autumn Security The butler and the mobile version of Spring and Autumn Security Manager have greatly improved their security protection capabilities, and can safely replace anti-virus software, firewalls and other security software requirements.

The big update of Spring and Autumn Security Manager has caused a strong earthquake in China's cyber security circle, and security software vendors have chanted "The wolf is coming."

However, public intellectuals who slander the Spring and Autumn Security Butler, or do not know the common sense of security software at all, or turn a blind eye to the matter and continue to take money to do things, resulting in the increasingly damaged image of the Spring and Autumn Security Butler.

Wei Dongsheng didn't bother to fight with them on the battlefield of public opinion where they were good at.

Wei Dongsheng's advantage is technology. Only by pulling them to the battlefield of network security technology can the problem be solved efficiently.

Then the Avengers organization appeared, the Eternal Red variant virus broke out, and domestic and foreign security software collapsed. At this critical time, the Spring and Autumn Security Butler after the big update has been like a mainstay tenaciously defending a pure land and indirectly became the biggest winner of the global virus crisis. Some public intellectuals and public opinion leaders and the online public opinion they brought up were originally ridiculing the Chunqiu security steward, but they were suddenly beaten by reality.

In this global virus crisis, only Spring and Autumn Security Butlers performed the best.

The Spring and Autumn Security Butler has no rivals.

Netizens may not understand the specific network security technology, but they can draw a conclusion through simple comparison: If the Spring and Autumn Security Steward is a scum, what are the security software vendors at home and abroad that have been defeated by the Eternal Red variant virus?

Public intellectual leaders who ridiculed Chunqiu's security steward had their faces snapped by fans of the global virus crisis. Despite this, they still refused to admit defeat and continued to maliciously attack the Eternal Red variant virus is the conspiracy of the Spring and Autumn Security Butler.

This group of public intellectuals and opinion leaders mistakenly made a mistake, and the Avengers organization is indeed Wei Dongsheng's handwriting.

However, the Avengers and the Everlasting Red Tool were all made by Wei Dongsheng using the power of computer intelligence. Even the core employees of the Chunqiu Group don't know even a little bit of news. Who has evidence to prove that the Spring and Autumn security steward shouts to catch the thief? Moreover, even if the Spring and Autumn Security Butler really calls for the thief, and the global security software vendors who can fight to throw away their helmets and abandon their armor, it can also prove the strength of the Spring and Autumn Security Butler. The hard-talking of public intellectuals and opinion leaders has ushered in more ridicule.

Before the forty-fifth, Spring and Autumn Security Butler was questioned by everyone as silly; after the forty-fifth, the Spring and Autumn Security Butler rocket speed out of the crisis of public opinion, was highly praised by netizens as the world's first security software.

It's like two female students in a coffee shop. They had no knowledge of security software before. They used whatever security software they had. After the global virus crisis, they learned about the importance of network security for a long time, so they followed the crowd. Heed the mainstream opinions and became a loyal fan of Spring and Autumn Security Butler.

At this moment, they entrust the Spring and Autumn Security Steward with all their hopes of resisting the Eternal Red mutant virus.

However, the two female students believed in the abilities of the Spring and Autumn Security Butler, but doubted whether Zhixing’s Qunxing mobile phones could not get the attention of the Spring and Autumn Security Butler like Zhiyu’s smart phones.

In other words, the price of Zhiyu's Sapientia series smartphones is locked at 5200 yuan. Zhixing’s big star brand has derived two smaller brands. One is the astronomy constellation. The product in 2008 was named Ursa Minor, and the product in 2009 was named Cassiopeia. The price range is between 2500 and 3500 yuan; The second is astrological constellation. In 2009, the product was named constellation. It provides users with customized services such as Aries, Taurus, Gemini...Capricorn, Aquarius, Pisces, etc. The price range is between 1,500 yuan and 2,500 yuan.

The Sapientia series of smart phones use chip basebands designed by Zhiyu Group. The same 1G running memory can play the performance of the 1.5G running memory of various stars and the 2.5G running memory of Android phones. The zOS operating system also provides many functions that are not available in the hOS operating system. It is said that what can be achieved by various star mobile phones can be achieved by smart phones; what can be achieved by smart phones may not be achieved by various star mobile phones. This difference is mainly due to the limitation of hardware design, but some users of Zhixing with sensitive personality always feel that they have been discriminated against.

The two female students are not financially independent, and their parents refused to spend 5200 yuan to buy a mobile phone. They had no alternative but to buy the lowest grade astrological horoscope. Underneath the appearance of vanity is low self-esteem. Two female students were forced to choose Zhixing's 12 Constellation products due to economic conditions. They hated this sense of powerlessness and feared being discriminated against by Spring and Autumn Security Butlers.

The breaking news of the Avengers organization is the hot news of the whole society.

It not only brought panic and depression to the two female students, but also stopped the three young men sitting in the corner from talking on the Internet. The topics of the three young men bluntly turned to the hot news of the Eternal Red variant virus, and they lowered their heads and swiped their phones to check the latest news; Wei Manman also stopped codewords and frequently updated the latest news.

The shadow of the Eternal Red variant virus, suddenly shrouded the scholarly coffee dream shop.

Contrary to the negligent attitude of the Avengers’ two previous announcements of hacking tools, Internet media urgently invited a group of security experts today, or live video or live pictures, to discuss and interpret the purpose of the Avengers and analyze and verify the Avengers. The announced hacker toolkit.

In the context of public opinion focusing, security experts quickly broke out several big news.

The first big piece of news, the FreeHuman worm, the creator of the massive data arrears incident of Zhiyu Group and Zhixing Group on December 14, 2009, was the work of the US National Security Agency.

Considering the absolute advantage of smartphones in the Chinese domestic market, and considering that domestic netizens value the smartphones of the Smart Series and the Stars series, security experts prioritize the analysis of the vulnerabilities of the Zhiyu Group’s zhOS operating system. The study found that the Avengers today announced a total of 47 hacking tools and 38 key vulnerabilities in the mobile Internet, of which three vulnerabilities target the Zhiyu Group’s zhOS operating system. After analyzing the three vulnerabilities one by one and the Trojan horse virus hacking tool that used the three vulnerabilities, security experts were surprised to find an old acquaintance—FreeHuman worm.

The public opinion was in an uproar.

Public opinion did not even have time to care about the harm of the other two vulnerabilities. They asked security experts whether the FreeHuman worm was produced by the US National Security Agency, and whether the huge amount of data arrears on December 14, 2009 was the US National Security Agency’s targeting of smartphones. Deliberate attacks on the operating system.

In order to prove that it has nothing to do with the Eternal Red variant virus, the Avengers announced the hacking tool and also disclosed countless core information. The FreeHuman worm file contains not only the source code of the FreeHuman worm, but also fragmented development logs and evaluation of the attack effect of the hacker organization SpaceTime. The evidence cannot be more detailed.

However, Chinese Internet companies have close ties with American capital. A large number of Internet companies, including Chunqiu Network and Chunqiu Search, are listed in the United States. When Chinese Internet companies are listed in the United States, they must take into account the political demands of US capital afterwards. The result of a reckless attack on the US National Security Agency is very likely to cause the US National Security Agency to retaliate behind the scenes and cause various problems.

The Internet media and the security experts they invited dare not openly criticize the US National Security Agency at this moment, and can only ambiguity in conforming to Internet public opinion: "The code characteristics of the FreeHuman worm are consistent with other hacking tools announced by the Avengers. If you can It is confirmed that the hacking tools announced by the Avengers are all stolen from the National Security Agency, and the FreeHuman worm is also very likely to be the work of the NSA. However, the hacking tools announced by the Avengers may not actually come from the United States. The Security Agency may also come from a hacker organization disguised as the National Security Agency."

If you like to re-take the road of the future, please collect it: (lightnovelpub.net) Re-take the road of the future. The literature is updated fastest.