Rebirth of the Tech Madman

Chapter 692: Computer anti-virus software is available

...

Since the late 1970s, Wall Street has been using computer systems to assist in its daily'transactions', which has undoubtedly greatly improved efficiency. . For more latest chapters, visit: ШЩЩ.⑦⑨.сОМ.

After the economic development of the United States fell to the bottom in 1982, it ushered in a period of rapid growth in 1983, which further promoted the prosperity of the capital market and increasingly demonstrated the convenience brought by computers.

However, with the expansion of the scope of use and the deepening of the degree of dependence, it is more and more necessary to build a unified platform, and this has resulted in a new wave of large orders.

For this delicious cake, various companies have tried their best, hoping to have as few competitors as possible.

It's also a coincidence that, in addition to flaws, the star company Pacific Telecom was exploited by hackers. The supplier of the brand-new informatization solution adopted by it was Fangyuan and Zheru.

This is simply a godsend. Several well-threatening old-brand companies immediately attacked together tacitly, in order to belittle Fang Yuan and Philosopher's standards, and finally kicked the challenger out of the game as he wished.

In fact, the key point of the argument is simple, that is the value of "data". Its important ‘performance’ is like a failed hard drive. For the valuable data in it, users are often willing to pay a much higher ‘spending’ fee than the hard drive’s hardware to save it.

For the same reason, this order pays more attention to the ‘safety’ of data. In particular, because of the earlier access to the system, its data also needs to be migrated to the new system. The situation is almost the same as that of Pacific Telecom.

Therefore, people have reason to believe that the ‘exposure’ of Pacific Telecom’s data indicates that the solutions provided by Fangyuan and Zheru are still at a distance from those companies’ products, and it is only natural that they have been eliminated.

Although there are 10,000 unconvinced in my heart, Fang Yuan and Zheru can only admit it. This is the rule of the game.

Tang Huan calmed the bidding team, gave them a paid vacation, and sent them back to San Francisco.

Seeing that Tang Huan didn't seem to care much about this failure, Christina, the'female' ship king, couldn't help being a little curious, "My dear, this order is not small, and it has an extraordinary meaning. Don't you really care about the value of it."

"This is the end of the matter. What if you don't accept it?" Tang Huan smiled playfully, "Perhaps this is also God's will. By then, there will be a problem with this large system. In addition to watching the excitement with ease, we will be able to do nothing. Dismissively."

Christina could not understand it, so she continued according to her own thoughts: "But you should always pay attention to the uproar of the media, especially the old adversary, "The New York Post", adding nonsense."

After complaining, the ‘female’ ship king specially found a newspaper and pointed it to Tang Huan.

"Your'female' thoughts really make me'confused'. I know that other people's newspapers didn't say good things, so they gave them money to buy them to find irritation." Tang Huan shook his head helplessly.

It can be said that the cynicism of the "New York Post" is filled with sourness, which started from the popular "Phantom of the Tomb: Eight Formations".

"It can be seen from this movie that in Eastern philosophy, there are so many opposing concepts like'yin' and yang, so that our richest man was also deeply affected when he named his company. The '0' and '1' represented by philosophers, the'sky circle' and the'place' represented by the square circle."

"I just don't know. Has the richest man ever thought about another set of two-by-one concepts-victory and defeat?"

Tang Huan laughed dumbfounded after browsing it, "Talk to me about philosophy, then let me tell you what is meant by'Heaven is healthy, the gentleman always strives for self-improvement; the terrain is great, the gentleman carries his virtues', the process of success has been How to plan for the six stages of'don't use the Qianlong, see the dragon in the field, work all day long, or leap in the abyss, the flying dragon in the sky, and the dragon with regrets'."

He used his pen to write an article, and then published it under a pseudonym. Of course, he was not too idle to quarrel with the "New York Post." Since everyone is so well versed in the way of making profits, I also took a ride to discuss the ‘exquisite’ cultural heritage of Dongfang Broad.

At first, people thought that the article that appeared in the city’s arch-rival "New York Daily News" of the "New York Post" was written by a certain literati who was in the Tang school. They did not expect the "New York Daily News." The editor-in-chief pointed out that this is the richest man who went to the front in person.

This time the "New York Post" is coming, and such a rare opportunity to ‘handover’ short-term soldiers can just humiliate the nouveau riche in Silicon Valley, so they mobilized cadres and started a scolding war.

It is conceivable that the two newspapers, which have been taking the civilian route and creating "sensational news", immediately attracted a large number of onlookers, social attention soared, and the sales of newspapers soared.

Tang Huan was just in a column set up for him by the "New York Daily News", citing classics from the "Book of Changes" and gossip, explaining the gentleman's way of improving personal cultivation and his attitude towards success or failure, and he laughed and cursed. Moving away from the opponent's ignorance, "The Phantom of the Tomb: Eight Formations" stayed on American theaters for another two weeks. The self-advocating West also brought other Chinese elements beyond the Kung Fu that he had touted.

Suddenly, the topics of Pacific Telecom’s data security and Wall Street’s ‘transaction’ system bidding all stepped aside. Everyone came to see the richest man brandishing his writing and selling his talents.

Seeing that they are also participants in the scolding war, most people rushed to the old rival "New York Daily News". In order to regain the initiative, the "New York Post" began to digress, counting Tang Huan's various gossip rumors, describing him in Xiangjiang. A huge harem has been built, and every year when traveling to Asia, it is a boundless "flower" heaven and wine.

Not to mention, the rogue tactics of the "New York Post" really attracted some popularity. After all, the dark psychology of this aspect is something that can only be expected and cannot be explained.

The approach of the Oscar also gave the entertainment news gossip the headlines. What's more, Tang Huan’s Hollywood company still performed well in 1985, both at the box office and at awards. They received a lot of rewards, which further consolidated his position as a new generation of entertainment tycoon. Naturally, scandalous was indispensable, which made the old rival Murdoch’s newspapers. Take advantage of the opportunity to play.

Crazy dogs like the "New York Post" are essentially a way of power checks and balances. They are the rules of the game that have been accumulated in Western society for a long time. Tang Huan can’t really care about it. · Hefner and his "rabbit girl man", "Attic" boss Bob Guccione and his "baby" are more evil than him, but they still treat them with equanimity. If you are serious, you will lose. America's unique self-deprecating ridicule is to deal with this kind of indefensible situation.

Fortunately, at this time, another news came out, which rescued Tang Huan from the harassment of "the hooligan is not terrible, just because the hooligan is educated."

Rich Skrenta and the hacker who compromised the Pacific Telecom host with the id of condor competed on a Fangyuan server on the Stanford University campus network. With the final result, condor took the files on the server and Putting it triumphantly on AOL bbs to show off.

Although the number is not absolutely large at this stage, the netizens whose quality can be called the veteran are all in an uproar. You know, Rich Skrentana is a well-known "door". After Tang Huan's training, he should be regarded as a top-notch technology. How could he be so easily defeated by this prominent addicted hacker? 'S men.

In this way, the disappointed man yelled: What kind of **** emperor was born in a'door', so I lost the gold coin; the'conspiracy' conspiracy theorist questioned whether there is something hidden in it... various AOL communities The space suddenly became a mess of porridge.

At present, cyberspace and real society are still in two distinctly separated worlds, and traditional media may not understand the thinking on the Internet.

Therefore, the "New York Post" quickly found two "I want" comments from the Internet, adapted them and published them, and directed them at Tang Huan: "Isn't Rich Skelenta your proud disciple? But he was still defeated by the hacker who compromised Pacific Telecom. It seems that your technical level is really very limited, and it is only natural to lose the order from Wall Street."

According to the experience of heavyweight sensational news in the past, the "New York Post" doubled this issue of the newspaper and then sent it to the operating network. As a result, as soon as the goods were spread, a big mouth slammed back. ——Fbi revealed a message at the press conference: “The hacker who illegally invaded the Pacific Telecom network and stole user data has been captured. It is Kevin Mitnick with criminal conviction. Facing sufficient evidence , He confessed to his crime."

Kevin Mitnick is not an unknown person. At the age of 15, he successfully cracked the North American air defense command system. As a result, he was arrested at the age of 16, making him the world's first online juvenile offender.

In front of such a well-known figure, the mainframe of Pacific Telecom was compromised. It really wasn't an unexpected event.

What people are more interested in is that Kevin Mitnick just won Rich Skelenta in just over a day, how did he fall into the hands of fbi, and he also recognized all the crimes?

Obviously, the winning or losing of this hacking war is not as simple as it seems, and there must be hidden secrets in it. I just don't know what methods Rich Skelenta and even Tang Huan, the teacher behind him, used to find the culprit in a haystack.

It’s ridiculous that the New York Post is too anxious. This kind of variable dynamics is arranged as a "tofu block" to mention it, but you have to report on it in lengthy lengths, and you have to move the stone now. Smashed his own foot-so many current newspapers that were not sold have become evidence of stupidity and ignorance.

Of course, fbi will not give answers to such questions-Kevin Mitnick, this guy, was caught by Lao Tzu by himself. If you don't believe it, then go and find out elsewhere!

As a result, the various media who refused to give up split up and asked Pacific Telecom, Fangyuan, Philosopher, and even Rich Skelenta for personal interviews.

As a result, Pacific Telecom, Fangyuan, and Zheru are very low-key, but issued an official statement: The criminals are arrested, it is very happy, and we will be more cautious in carrying out system security work in the future to prevent such accidents from happening.

If it is said that big companies such as Pacific Telecom, Fangyuan, and Zheru are very old and respectful, and it is excusable, the indifferent attitude of Qi Scranta is intriguing and fascinating.

You know, such a young guy who is still in college is just at the stage of being vigorous and young and energetic. How could he be indifferent with the record of losing to Kevin Mitnick.

Kevin Mitnick, who was hiding on the university campus, was overwhelmed by the harassment. He simply became a product salesman and introduced a new achievement that Zheru recently launched in the field of computer security-an anti-virus engine, which was used to resist the beginning. Spreading computer viruses.

As early as 1949, in a speech for the University of Illinois, John von Neumann described a theoretical model of how a computer program replicates itself, which is essentially the prototype of a computer virus with this basic feature.

With the development of computers from mainframes to minicomputers, and then to the era of microcomputers represented by personal computers, computers have gradually stepped down from the altar, resources have begun to become abundant, and the opportunities for ordinary people to access computers have also increased exponentially. Computer viruses The research results in the academic field are also getting more and more fruitful.

When personal computers swept the world in the 1980s, computer viruses finally walked out of the laboratory and made waves in reality. For example, in January of this year, a new virus appeared that took the boot sector of the disk as its habitat.

Zheru did not personally dabble in the field of computer anti-virus software~www.wuxiaspot.com~, but authorized a series of related technologies including anti-virus engines to Symantec Corporation to launch specific products.

Since the scanning operation of computer anti-virus software consumes resources and is unbearable for current personal computers, it draws on the realization principle of "Han Card" and "hands over" part of the work to the hardware-computer virus protection card for execution. This virtually eliminates the possibility of such software being pirated.

Kevin Mitnick is one of the protagonists of this hacker war. Although the result of the competition was negative, after Kevin Mitnick was arrested bizarrely and quickly, the prestige he had previously lost was instantly restored. Avoiding to talk about the inside story, and adding a mysterious halo.

The reporters finally blocked him and asked him to speak. They didn't care what the other party said specifically, anyway, publishing it would satisfy the public's curiosity.

As a result, Symtech’s anti-virus software had not been officially released yet, and through a series of storms triggered by the data leak of Pacific Telecom, a large free advertisement was launched, which led to an explosion of consultations. Phone.

However, this is only the beginning, and more new technologies will be revealed later. Q

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like