Rebirth of the Tech Madman
Chapter 692 Computer antivirus software available
...
Since the late 1970s, Wall Street has been prevalent in using computer systems to assist in their daily transactions, which has undoubtedly greatly improved efficiency. . For more latest chapters visit: ШЩЩ.⑦⑨.сОМ.
After the U.S. economic development fell to the bottom in 1982, it ushered in a period of rapid growth in 1983, which in turn promoted the prosperity of the capital market and increasingly demonstrated the convenience brought by computers.
However, with the expansion of the scope of use and the deepening of the degree of dependence, it is more and more necessary to build a unified platform, and this has led to a new wave of large orders.
For this delicious cake, various companies have tried their best, hoping that the fewer competitors, the better.
Coincidentally, apart from flaws in Pacific Telecom, a star enterprise, hackers took advantage of the loopholes, and the suppliers of the brand-new information solutions it adopted were Fangyuan and Zheru.
This is simply a godsend opportunity. Several established companies who felt threatened immediately launched a tacit attack together, using this to belittle the standards of Fangyuan and Zheru, and finally kicked out the challenger as they wished.
In fact, the key point of the debate here is very simple, that is, the value of data. Its importance is like a hard disk that has failed. For the precious data inside, users are often willing to pay a lot higher than the price of the hard disk hardware itself to save it.
For the same reason, this order places more emphasis on data security. In particular, because the system was installed earlier, its data also needs to be migrated to the new system. The situation is almost exactly the same as that of Pacific Telecom.
Therefore, people have reason to believe that the data leak of Pacific Telecom shows that the solutions provided by Fangyuan and Zheru are still far from the products of those companies, and it is only natural that they will be eliminated.
Although there are ten thousand people who are not convinced, Fangyuan and Zheru can only admit it, this is the rule of the game.
Tang Huan appeased the bidding team, gave them a paid vacation, and sent them back to San Francisco.
Seeing that Tang Huan didn't seem to care much about this failure, the female ship king Christina couldn't help being a little curious, Honey, this order is not small, and its significance is extraordinary. Don't you really care about the value of it?
The matter has come to this, what if we don't accept it? Tang Huan smiled playfully, Perhaps this is also God's will. When there is a problem with this big system, we can not only watch the excitement relaxedly, but also be able to enjoy it without any worries. Hands up and down with scruples.
Christina didn't seem to understand, so she continued according to her own thoughts: But you should always pay attention to the noise of the media, especially the nonsense of the old rival New York Post.
After complaining, the 'female' Ship King specially found a newspaper and pointed it out to Tang Huan.
I'm really confused by what you 'women' think. You clearly know that their newspaper has nothing good to say, but you still send money to the other party to buy it to make yourself angry. Tang Huan shook his head helplessly.
It can be said that in the cynicism of the New York Post, there is a soaring sourness, and it started to draw the topic from the hit Phantom of the Tomb: Eight Diagrams.
It can be seen from this movie that in Eastern philosophy, there are many opposite concepts like 'yin' and yang, so that our richest man was also deeply influenced when he named his company, The '0' and '1' represented by philosophy and Confucianism, and the 'sky circle' and 'place' represented by Fangyuan.
I just don't know, Mr. Richest Man, has he ever thought about another set of pairwise concepts—victory and defeat?
Tang Huan couldn't help laughing after browsing through it, To discuss philosophy with me, let me tell you what is meant by 'Tian Xingjian, a gentleman strives for self-improvement; Geography Kun, a gentleman carries things with virtue', a process of success and How to plan for the six stages of 'Don't use the dragon, see the dragon in the field, work hard all day long, or jump in the deep, fly the dragon in the sky, and regret the dragon'.
He picked up a pen to write an article, and then published it under a pseudonym. Of course, he was not idle and arguing with the New York Post needlessly. Since everyone is so well versed in the way of hype and profit, then brother also take a ride and discuss the broad and profound humanistic heritage of the East.
At first, people thought that the article that appeared in the New York Post's rival in the same city, the New York Daily News, was written by a writer in the Ting Tang school. Unexpectedly, the New York Daily News The editor-in-chief pointed out cryptically that this is the richest man himself going to the front line.
Now the New York Post is getting excited, such a rare opportunity for handover, just to humiliate the upstarts in Silicon Valley, so they mobilize their leaders and start a scolding war.
It is conceivable that these two newspapers, which were originally taking the route of civilians and producing sensational news, immediately attracted a large number of onlookers, the social attention soared, and the sales of newspapers increased accordingly.
Tang Huan just quoted scriptures from the Book of Changes and gossip in the column opened for him by the New York Daily News, expounding the gentleman's way of improving personal cultivation, and his attitude towards success or failure, and laughed and cursed To tease the opponent's ignorance, as a result, Phantom of the Tomb: Eight Arrays stayed in American theaters for another two weeks, and the self-advocating West also brought other Chinese elements besides kung fu that he peddled.
All of a sudden, the topics of Pacific Telecom data security and Wall Street's trading system bidding were all sidelined, and everyone came to watch the richest man show off his talents.
Seeing that they were also participants in the scolding war, but most of them went to the old rival New York Daily News. In order to regain the initiative, the New York Post began to digress, counting all kinds of gossip and rumors about Tang Huan, describing his life in Xiangjiang. A big harem has been built, and every year he travels to Asia, which is a boundless land of 'flowers' and wine.
Not to mention, the rogue method of the New York Post has really attracted some popularity. After all, the 'dark' psychology in this regard is something that can only be understood but cannot be expressed in words.
The approach of the Oscars also gave entertainment gossip the confidence to make headlines. What's more, Tang Huan's Hollywood company still performed well in 1985. Both the box office and the awards, he gained a lot, which further consolidated his status as a new generation of entertainment tycoon. Take advantage of the opportunity to play.
The mad dog style of New York Post is essentially a way of checking and balancing power, and it is a game rule accumulated in Western society for a long time. It is impossible for Tang Huan to really care about it. · Hefner and his bunny girl, Penthouse owner Bob Guccione and his baby are even more evil than him, but people still take it calmly. If you are serious, you will lose. The unique self-deprecation of the United States is to deal with this kind of indisputable situation.
Fortunately, at this time, another piece of news came out, which rescued Tang Huan from the harassment of hooligans are not scary, but they are educated.
Rich Skrenta and the hacker with the id Condor who captured Pacific Telecom's mainframe competed on a Fangyuan server on the campus network of Stanford University. The final result was that Condor took away the files on the server and Complacently put it on America Online bbs to show off.
Although the number at this stage is not absolutely large, the quality of netizens who can be called veterans is immediately in an uproar. You know, Rich Skrentana is a well-known 'door'. After Tang Huan's training, he should be regarded as a top technical 'elite'. How could he be defeated so easily by this show-off addicted hacker? of the men.
Just like that, the disappointed people yelled: What a shitty disciple of the Son of Heaven, he was an idiot, causing me to lose gold coins; conspiracy theorists questioned: Is there something hidden in it... Various communities on AOL The space suddenly became a mess.
At present, cyberspace and real society still belong to two clearly separated worlds, and traditional media may not understand the thinking on the Internet.
Therefore, the New York Post quickly found two I want comments from the Internet, adapted them, and published them, pointing the finger at Tang Huan: Isn't Rich Skrenta your favorite disciple? But he was still defeated by the hacker who captured Pacific Telecom. It seems that your technical level is really very limited, and it is only natural to lose orders from Wall Street.
According to the experience of heavyweight sensational news in the past, the New York Post doubled the print of this newspaper, and then sent it to the operation network. As soon as the goods were spread out, a big mouth was slammed back. ——The fbi disclosed a piece of news at a press conference: The hacker who illegally invaded the Pacific Telecommunications network and stole user data has been captured. It is Kevin Mitnick who has a criminal record. Facing sufficient evidence , he confessed to his crime.
Kevin Mitnick is not an unknown person. When he was 15 years old, he successfully cracked the North American air defense command system. As a result, he was arrested at the age of 16, thus becoming the world's first cyber juvenile criminal.
In front of such a person with a foothold, it is really not such an unexpected event that Pacific Telecom's mainframe was compromised.
What people are more interested in is, how did Kevin Mitnick fall into the hands of the FBI just over a day after he won Rich Skrenta, and he also confessed to all the crimes?
Obviously, winning or losing this hacker war is not as simple as it seems on the surface, and there must be something else hidden in it. They just don't know what methods Rich Skrenta, and even Tang Huan, the teacher behind him, used to find the culprit in a haystack.
It's ridiculous that the New York Post is too anxious. It's fine to arrange a tofu block to mention this kind of dynamic dynamics full of variables, but you insist on long-winded reports, which makes you lift a stone now Smash yourself in the foot - so many unsold issues of the current issue are evidence of stupidity and ignorance.
Of course, the fbi won't give answers to such questions--this guy Kevin Mitnick was caught by me alone, if you don't believe me, then go and find out elsewhere!
As a result, various media who refused to give up acted separately, requesting interviews with Pacific Telecom, Fangyuan, Zheru, and even Rich Skrenta himself.
As a result, Pacific Telecom, Fangyuan, and Zheru all kept a low profile, and just issued an official statement: the criminals were arrested, and people are very happy. In the future, we will carry out system security work more carefully to prevent such accidents from happening.
If we say that big companies such as Pacific Telecom, Fangyuan, and Zheru are mature and prudent, it is justifiable, but the indifference of Naqi Skrenta is intriguing and arousing.
You know, such a young man who is still in college is at the stage of full-bloodedness and youthful vigor, how could he be indifferent to the failure record of losing to Kevin Mitnick?
Kevin Mitnick, who was hiding on the university campus, was overwhelmed by the disturbance, and simply became a product salesman, introducing a new achievement of Zheru in the field of computer security - an anti-virus engine, which is used to resist the initial attack. A flood of computer viruses.
As early as 1949, in a lecture given at the University of Illinois, John von Neumann described a theoretical model of how a computer program could replicate itself, essentially the rudimentary form of a computer virus based on this feature.
As computers have evolved from mainframes to minicomputers, and then to the era of microcomputers represented by personal computers, computers have gradually stepped down from the altar, resources have become abundant, and the opportunities for ordinary people to come into contact with computers have also increased exponentially. Computer viruses Research results in the academic field are also becoming more and more fruitful.
When personal computers became popular all over the world in the 1980s, computer viruses finally walked out of the laboratory and made waves in reality. For example, just in January of this year, a new virus that took the boot sector of the disk as its habitat appeared.
Zheru did not personally dabble in the field of computer antivirus software, but authorized a series of related technologies including antivirus engines to Symantec to launch specific products.
Because the scanning operation of computer anti-virus software consumes a lot of resources, the current personal computer is unbearable, so it draws lessons from the realization principle of Han card and hands over part of the work to the hardware - computer virus protection card to perform. This virtually eliminates the possibility of such software being pirated.
Kevin Mitnick is one of the protagonists of this hacker war. Although the result of the competition was negative, after Kevin Mitnick was arrested strangely and quickly, his lost prestige was instantly restored. Avoid talking about the inside story, and then add a mysterious halo.
The reporters managed to block him and let him speak, so they didn't care about what the other party said specifically. Anyway, publishing it would satisfy the public's curiosity.
As a result, Symantec's anti-virus software has not been officially released yet, so it took advantage of a series of disturbances caused by Pacific Telecom's data leak, and launched a big free advertisement, which caused the consultation to explode phone.
However, this is just the beginning, and more new technologies will be revealed later. Q
You'll Also Like
-
I'm a priest, it's reasonable for me to have a little more health and healing.
Chapter 383 1 hours ago -
Honghuang: Wu clan soldiers, plundering entries begin to rise
Chapter 125 1 hours ago -
This pirate is actually a sixth-rate
Chapter 170 1 hours ago -
When I Woke Up, I Became a Top Boss
Chapter 472 11 hours ago -
Pirates: The Strongest Experimental Subject at the Beginning.
Chapter 631 17 hours ago -
I will turn the Wanjie Mall continent into a primitive land.
Chapter 290 17 hours ago -
I just want to give the elves a home. What's wrong with that?
Chapter 236 17 hours ago -
Starting with Pokémon, and moving towards the pinnacle of beast control
Chapter 179 17 hours ago -
Elf: Become invincible from the moment you draw the Unbreakable Barrier!
Chapter 500 17 hours ago -
The Adventure of All Worlds Starting from Doupo
Chapter 1048 17 hours ago