"The virus is eliminated while it's spreading?"
"Yes."
"There's no need for the user to kill it themselves?"
"There's no need."
"Wait … Chen Yu, let me think about it."
This brand-new concept had a slight impact on Zhou Hongyi's mindset.
Originally, in his mind, to kill viruses on a computer, one had to download the antivirus software first. Then, the antivirus software would provide a unique code. After that, the user would download the virus library and then kill it. 360 Antivirus was not the only company that did this. All the antivirus software companies in the world did the same.
Now, however, Chen Yu's concept had completely overturned Zhou Hongyi's understanding.
The user did not need to download the virus library.
The user did not even need to kill it.
All the operations were done in the server.
"Oh my god …"
At first, Zhou Hongyi felt that it was unbelievable and wanted to say that it was impossible.
However, as someone who was familiar with computers, he knew that it was theoretically possible.
The Internet not only had the function of communication, but it also had the function of processing information and computing.
In the past, the series of killings could only be done locally. Now, there was no need to do it locally. He only needed to do it through the Internet.
Through the Internet, the backend server would know whether or not the user had been poisoned and whether or not the virus had come to the user's computer.
"Chen Yu, can you say more?"
Zhou Hongyi's mind was in a mess. For the time being, there were still some things that he did not quite understand.
"To put it simply, this is actually somewhat similar to anti-spam. Our mail receives a lot of spam every day. In the past, we had no choice but to manually delete these spam one by one. However, later on, someone thought of a way. They labeled some spam with certain characteristics. When such a mail is sent to a certain number, it will be classified as spam. "
"Trojans and viruses are the same. In fact, they have similar characteristics. In the past, personal PCs could only be killed manually. Some viruses could not be killed without downloading the virus library. However, if we build big data, we will be able to identify these viruses and kill them as soon as possible. In other words, before the virus started to spread, our servers had already destroyed it. "
"Of course, our server needs super computing power. Without such power, we can't analyze and kill the massive amount of viruses and data. "
Chen Yu wasn't an expert when it came to Cloud Antivirus.
He knew that the real implementation of this function was not just what he had just mentioned.
This involved the identification of viruses, the analysis of large amounts of data, the feedback of large amounts of clients, super powerful servers, large amounts of financial support, and the opening of the entire system.
However, such a concept was undoubtedly new and the most effective.
One Dan is formed.
In the future, network security would be improved by at least 90%. In the future, computers would not even need to worry about viruses or Trojans.
"F * ck, Chen Yu, I really want to open your head and see what it's made of."
"Open it and you'll see a big pile of brain matter."
"Get lost. Sister, I've been defeated by you. You, a guy without any skills, actually came up with such a brand-new concept. "
Zhou Hongyi was extremely excited.
Although Chen Yu's explanation wasn't particularly detailed, and some of his explanations were even wrong in terms of technology,
However, Zhou Hongyi undoubtedly understood the philosophy and direction that Chen Yu was talking about.
In fact, he had always felt that there was a fatal problem with traditional anti-virus software.
In the face of a massive amount of viruses, was there a need to constantly update the virus library every day?
Based on the current data analysis, the number of viruses and Trojans in the world had exceeded tens of millions or even hundreds of millions.
An ordinary computer really couldn't download so many virus libraries.
Even if it could, the computer would be completely used up by the anti-virus software.
At this time, Cloud Antivirus that Chen Yu mentioned opened a new path for Zhou Hongyi.
"Don't talk about this. How is it? Can you do it?"
"Although it's very complicated, it can. However … "
"However what?"
"There are two problems now."
"What problems?"
"One is that we need a lot of servers."
"Buy."
"The other is that our bandwidth may not be enough to support our calculations."
The most important thing about cloud computing was the network.
Without the support of the network, cloud security could not be realized.
The higher the network speed, the better the cloud security effect.
However, although the network speed had improved a lot in 2005, there was still a long way to go compared to later generations.
"That's simple. We can distribute a series of servers all over the country to achieve the best network speed."
"Damn, that's going to cost a lot of money."
"It's okay."
"But our 360 is free. We can't make a lot of money from this business for now."
"It's okay. We still have games."
"What does this have to do with games?"
"Previously, I asked Zou Tao to make an accelerator called Swift Travel. Although this accelerator is different from Cloud Security, it's still similar in some aspects. For example, we can set up servers all over the country. At that time, I considered letting this accelerator only be used by League of Legends. But now, I'm going to open it up for everyone to use. Of course, this is a fee. "
"How much is this software?"
"For now, it's 10 yuan a month."
"I'm afraid this amount of money is still not enough to support our Cloud Antivirus."
"This is only temporary. We can actually take on other business in the future. For example, some large websites need to set up servers, but the cost of the servers is too high and the operation is too complicated. If they can't set it up, we can help them. Our servers can be used as their servers. In other words, all the data on their website will be calculated by our servers. "
"Eh …"
Hearing this, Zhou Hongyi's eyes lit up.
Compared to Cloud Security, this was just an antivirus software business.
No matter how strong the antivirus software business was, it was only a single business. Its profitability was not high.
Moreover, 360 was free. They did not have much profit margin for the time being.
But at this time, using cloud computing as a server for a series of websites was a huge business.
This business was not just for some telecommunications companies or small internet companies to rent servers.
Some small websites did not have much money, but what about large websites?
They had a huge demand for servers.
Just like the website of the Ministry of Railways in his previous life, 12306.
This website looked like an online train ticket website, but this website sometimes had billions of data requests a day.
For a large website like this, firstly, it was too expensive to set up their own servers. Even renting them was a huge cost. Secondly, they did not have the technology.
Rather than that, it was better to find a cloud service company.
In his previous life, Ali took over the cloud data service for railway websites.
Of course, this was not all.
In the future, with the continuous development of cloud computing, storage, medicine, finance, insurance, e-commerce, search, education … there would be huge developments.
"Chen Yu, are we still in the antivirus business in the future?"
"It's up to you."
Chen Yu smiled.
He knew that with Zhou Hongyi's foresight, he could definitely see the cloud computing business in the future. It would definitely surpass the antivirus business now.
Perhaps, Huanyu Technologies would have to set up a new department in the future.
This department would be cloud computing.
No, not cloud computing. Huanyu cloud.
Huanyu cloud … Thinking about it, Chen Yu was a little excited.
Even Google had not proposed the concept of cloud computing.
In the future, cloud computing and cloud services, Huanyu Technologies would definitely become the master of cloud computing.
"Okay, let's not talk about this. You'll be in charge of Cloud Antivirus. Microsoft and a lot of the world's top security giants are not to be underestimated.
"Don't worry. Before Cloud Antivirus comes out, we might not be their match, but we can at least exchange a few blows with them. After these dozens of moves are over, our Cloud Antipoison will be ready. "
"Okay."
Chen Yu nodded.
However, he did not relax just because of that.
Anti-theft and antivirus had always been a protracted battle.
Huanyu Technologies could not completely rely on antivirus software for anti-theft.
In fact, each major business could do a series of operations on its own.
For example, Chen Yu had asked the major gaming departments to come up with secret security cards.
Now, Chen Yu felt that secret security cards alone were not enough.
Game players would use secret security cards, but some YY account players would not use secret security cards.
So, what should they do now?
Actually, it was not that there was no way. For example, YY could provide more security and identify the user's Internet IP address.
As long as the user's Internet IP address was different from the local IP address, YY would alert the user and then launch an anti-theft test.
Chen Yu communicated this idea to Li Nan and the others. YY and the other departments immediately adopted Chen Yu's suggestion.
…
For the next few days, Chen Yu sat in his office and observed Microsoft's actions.
In fact, Microsoft's actions had already begun after they contacted the world's top security companies.
First, they also learned from Huanyu Technologies.
First, they offered a huge bounty on various hacker websites for vulnerabilities in Huanyu's system.
Then, they installed a series of trojans and viruses on a series of small movie websites.
It had to be said that this move was not completely useless.
When many people downloaded the movies, they still fell for it.
However, not many people fell for it.
This made Microsoft and the major antivirus software companies feel a little strange.
They had already tested these viruses and trojans. As long as they were placed on Huanyu's system, they would work.
However, the feedback they received in reality was that the effects were actually so poor.
For example, the trojans.
Either the trojans were removed, or even if they were not removed, the stolen game passwords were fake.
If they were removed, there was no need to study them. It was probably Huanyu Technologies' 360 that had taken effect.
However, if they were not removed and could not be stolen back, what was going on?
At first, they could not figure it out.
However, after some investigation, they discovered a fact that drove them crazy.
"Huanyu's secret security card."
This was a secret security card for all the business accounts of Huanyu Technologies' subsidiaries. It was released by Huanyu Technologies.
This secret security card was mainly provided for online games.
Because there were a lot of equipment in online games, it was the easiest for accounts to be stolen.
Therefore, in order to reduce the number of accounts stolen from Huanyu Technologies' online games, they came up with the idea of a secret security card.
There were two types of secret security cards.
One was a secret security card that was given as a gift after topping up.
In addition to the account password, the user also had to enter the password in another layer of the secret security card.
Logically speaking, the password in this secret security card could also be stolen.
However, it was not possible.
Because the password in the secret security card was dynamic.
The secret security card that was given as a gift after topping up had corresponding coordinates. The coordinates entered were different every time.
This was the basic version.
The more advanced version was a super dynamic password that changed every 15 seconds.
This advanced version was no longer a gift after topping up, but a small electronic device sold by the official company.
This device was bound to the user's account. Every time the account was entered, a dynamic password would be randomly generated.
Moreover, this dynamic password would be randomly generated after 15 seconds.
Could you imagine this kind of outrageous anti-theft technology?
Not to mention that you let their computer be hit by a Trojan horse, even if it was hit by dozens or hundreds of Trojans, you still wouldn't be able to steal their account.
"Damn, there's such a trick."
"I was wondering why Blizzard lost to Huanyu Technologies in China. Blizzard's anti-theft methods alone are worlds apart."
"Awesome, I can't do anything about Huanyu Technologies' accounts now."
A group of Microsoft and other top network security companies formed the "Annihilation Team". They were going crazy.
They had always thought that they were the world's top hackers and computer experts.
However, they didn't expect that they couldn't even steal a game account.
This was simply a slap in the face.
However, they quickly regrouped and reorganized themselves.
As the elites of the global computer industry, they couldn't be defeated by such difficulties.
They calmly thought and analyzed the shortcomings of Huanyu Technologies.
They admitted that many people in Huanyu Technologies' online games used the password card.
However, not everyone used it, and not all players used it.
Especially those who weren't game accounts, such as YY accounts, circle accounts … etc. Although these accounts didn't have much economic value and couldn't be sold for much, it was still a big problem if they were stolen. Moreover, this could be a heartache if the game account was stolen. Although they stole some YY accounts, circle accounts didn't have much economic value, and ordinary hackers didn't want to steal such accounts.
However, they didn't steal the accounts for money. They wanted to attack Huanyu's system.
After a round of reorganization, another series of Trojans appeared.
Unfortunately …
This time, the number of accounts stolen was even fewer than the previous time.
"What's going on?"
"Could it be that these YY people all used password cards?"
"Impossible."
The security experts were stunned.
They tried to use the stolen password to log into the YY account.
System Notification: The login address is different from the usual account address. Please complete the anti-theft test to unblock.
(End of Chapter)
You've already exceeded your reading limit for today. If you want to read more, please log in.
Login
Select text and click 'Report' to let us know about any bad translation.