Chapter 273 Space Hackers
Chapter 273 Space Hacker
Qiao Budhi hated him a little. These dog-dance security experts, others stole my email live in front of dozens of media cameras. You actually said that you could not find the intrusion traces, and even the malicious code could not be found. Why don’t you die? Do you have the right to be a security expert?
When he went through the first report, Qiao Budhi vomited even more blood. The video started by Hu Yifei taking out his phone from his pocket. Although the content afterwards was translated, Qiao Budhi was still confused. He still didn't understand why Hu Yifei chose Apple's smartphone. He demonstrated what this attack was to prove.
"Bang!"
Qiao Budhi threw the report on the table, feeling a little depressed, thinking that these people are at their best!
He was so depressed that he was angry that Qiao Budhi picked up the report in the middle, opened it and sighed that he was awkward and turned it over two bad cards. If he had known this report first, wouldn’t he understand everything!
The report is about the whole story. People from the Executive Ministry have investigated it clearly. The young man in the video, named Hu Yifei, is the president of China Figo Security.
"oh?"
Qiao Budhi was a little surprised. He had an impression of this company. The previous z virus frenzy seemed to have been destroyed by Figo Security. Recently, Figo Security has caused a lot of controversy in the industry. I heard that it was going to plan and murder Microsoft with Google. Although the media in the United States did not report much, Qiao Budhi also heard about it.
The report shows that Hu Yifei was at the press conference at the time and introduced a new anti-virus model and technology proposed by Figo Security. When asked by a reporter, he gave a casual demonstration, so the video content in Qiao Budhi's hands was included.
Qiao Budian closed the report hatefully, and knew the whole story, but the details of the matter were still very vague. For example, what question did the reporter ask that led to Hu Yifei taking the Apple operation; and, which media reporter belongs to, is he malice?
"Click!" Qiao Budhi picked up the phone and prepared to call the administrative department again. However, before the number was pressed, the knock on the door rang.
"Come in!"
Qiao Bushen's assistant hurried in, "The people from the administrative department have already obtained the complete video content!"
"Call the interpreter and go to the conference room!" Qiao Buhe fell off the phone and left the office.
This time, the translation was a live translation sentence by sentence. It took nearly an hour to finish the video.
Qiao Budhi stared at the picture, sat there and frowned and pondered. He finally understood the whole story of the matter. The reason why Hu Yifei used Apple's phone as a demonstration prop was because he "was not prepared in advance", so he took out his phone casually. This reason was too slippery. Who knows whether he did it on purpose.
As for the content of the demonstration, Hu Yifei explained to the media the difference between the attacks launched by "on personal computers" and "on personal information".
Qiao Buddy looked at the security expert beside him, "What do you think of this invasion?"
"This is a very typical attack on the target person's information!" The security expert said nonsense first. Seeing that Qiao Budhi looked bad, he quickly explained, "Generally speaking, the attack of a virus Trojan horse is divided into two stages: the purpose of the first stage is to sneak into the target person's computer and mobile phone, which is called an attack on the personal computer; the second stage is to use the lurking spy program to wait for an opportunity to steal the target person's privacy information, which is called an attack on the personal information."
Qiao Budhi nodded. Although the first stage also serves the second stage, there is indeed some difference between the two.
The security expert saw Qiao Budhi nodding and continued: "Hu Yifei's attack went directly to the first stage and implemented an attack on the target's private information, which was very effective. His purpose, perhaps, was to tell those media that it is very stupid to attack personal computers, because your attack methods are limited by different hardware and software platforms, the process is complicated, and it is easy to be prevented; but if an attack is launched against personal information, it can overcome the restrictions between such platforms, which is simple and effective!"
"What do you mean is that the opponent's attack method can be completely free from the restrictions of various platforms?" Qiao Budhi asked.
"No!" the security expert shook his head, "It is not that he is not restricted, but that he directly surpasses this restriction. There is a difference between the two. The former is like covering with artillery fire. Its purpose is to destroy the enemy's fortifications, tear open the defense line with artillery fire, and then eliminate the enemy's biological forces; while the latter is to use precisely guided ground-based missiles to carry out the beheading operation!"
Qiao Budhi finally distinguished the nuances from this difficult explanation, that is, your limit still exists, and it is there, but the attack form of others is no longer within your limits; if it is covered with artillery fire, it will break your limits, and after breaking it, it will be unrestricted.
"In other words, it's not that there is a vulnerability in our system and hardware?" Qiao Budhi asked again.
The security expert nodded, "Yes, Hu Yifei's attack was not targeted at our systems and hardware at all, so the vulnerability would not be in this regard!"
Qiao Budhi was a little confused this time. Since Hu Yifei was not targeting Apple itself, what does he mean?
"After dawn, this video will be announced by many media. In the future, more and more attack methods like this may become a trend!" Security experts are not without concern and expressed their views. "With current security means, it is difficult to defend against such attacks. The security industry is still fighting conventional warfare, but hackers have entered the era of space warfare!"
The security expert's words woke Qiao Bushi up. He suddenly understood that since Hu Yifei dared to show off this hacking technology, there would naturally be a defense. He did this, but he was actually selling Feigo's security technology. What was annoying was that Apple became a victim of Hu Yifei's hands. If it were not an expert, it would be difficult to figure out the tricks here. If this news was released, ordinary users would definitely think that Apple's mobile phones had great flaws.
Qiao Budhi punched the table, feeling a little depressed. It was obviously not Apple's own problem, but he could only suffer a loss in this matter!
Since Apple released its own smartphones, its market share has been rising steadily, and there are few competitors in this field. The success or failure of smartphones determines to a certain extent who can master the mobile Internet in the future. Not only old mobile phone manufacturers are staring at this place, but also those Internet companies also hope to copy their success on the Internet to the mobile Internet again. The emergence of Apple's mobile phones has made Apple the target of public criticism. Some people are eager to hope that something will happen to Apple. If this matter starts, the only one who has lost its reputation will be Apple.
"Go to contact the media and let them focus on introducing the new anti-virus model of Figo Security when reporting to fade Apple!" Qiao Bushen issued an order to the people in the marketing department, and then turned to his assistant: "If you contact Figo Security, it is best to let them come out to clarify and confirm that there are no loopholes in our Apple phones!"
Most of the people in the conference room left, leaving only Qiao Bushen, the translator, and the security expert sitting there without moving.
Qiao Budhi sat for a while and ordered to the translator: "Run the video I just now!"
This time, Qiao Budhi looked very carefully. When he saw the boss switch between the various desktops and displaying the different viruses, Qiao Budhi called and stopped and asked the security expert indirectly, "Can you understand what technology is this?"
"Some are like virtual technology, but not like it!" said the security expert.
"Different viruses run on different desktops, and these viruses exist on the same operating system at the same time..." Qiao Budhi pondered for a moment, and asked the security expert, "If this person on the screen does not log out of the desktop, then the viruses in the desktop will always exist, and all files in the desktop will be retained, right?"
The security expert nodded hesitantly, "From the introduction of this person, this is indeed the case."
Qiao Budhi finally grasped a very critical point. A system has many desktops. This is actually not difficult, but it is a bit difficult to make these desktops independent of each other and have completely different visuals when accessing an operating system and hard drive, it is a bit difficult, especially the switching between desktops is too fast, just as convenient as building a workbook.
"If Apple's mobile phones also have multiple desktops..." Qiao Budhi's mind suddenly came to life, and users could gain more impressions on a mobile phone and divide more private spaces. As Apple, they could also sell more application software.
The success of Apple's mobile phones is not the success of the sales data of the mobile phone itself. In addition to the unique style of design technology, its success is due to the fact that its users can obtain the support of a large number of third-party applications. Apple stipulates hardware and software standards, and then authorizes software developers to design programs that can be run on the mobile phone. After these programs are completed, they can be listed on the shelves after Apple's certification and are sold in Apple's online application store. The revenue from the sales of software is 30% and developers account for 70%.
This move not only allowed Apple to gain a steady stream of applications, but also made Apple the world's largest mobile application provider. At the same time, it is also one of Apple's most important revenue sources.
Chapter completed!