Chapter 1396 Detonation
"Just for this?" the other side asked in disbelief.

"Otherwise, it doesn't matter if I lose 10 billion, but I can't stand this birdishness."

"Huang He, you're a f*cking psycho!" The president of Fantasy Computer is also a ruthless person. After scolding on the phone, he hung up the phone directly, so don't give Boss Huang a chance to scold back.

But the scolding is all scolding, the actual problem after the painting is finished still needs to be solved, and as Boss Huang himself comes out to set the pace, the public opinion environment in the whole market becomes even worse for Fantasy Computer.

Then such public opinion was quickly reflected in the specific sales data. The online and offline platforms of Fantasy Computer have reported that the sales data has dropped sharply, with a drop of about 40%. If this rate continues, That fantasy computer crash is just a matter of moments.

Some people may find it strange that this fantasy computer company has a big business. Even if the sales drop is as high as 40%, it will not collapse in an instant.

The problem lies in the four words "home big business big". A few years ago, Fantasy Computer spent huge sums of money to acquire the personal computer business of IBM in the United States, and then deployed in various regions of the world. computer sales company.

After integrating these departments, it became the current international version of Fantasy Movies, and became the world's number one PC sales company in one fell swoop, with a market share of about 30% of the global market.

This also brings about a huge problem, that is, fantasy computers consume or even overdraft a large amount of funds, which makes the capital chain of the entire company in an extremely tight state. Once a large-scale capital loss occurs, the capital chain is broken. Let alone a fantasy computer, even if it is Microsoft, it will be shown to you.

And knowing this situation, Fantasy Computer still dared to acquire such a large number of companies at such a high speed. In addition to the huge ambition of its helmsman, it is more because they have enough funds to do these things, and this part of the funds It comes from their income in China.

Fantasy Computer's annual revenue in China is as high as 3 billion yuan, and its net profit exceeds 000 billion yuan. This is why Fantasy Computer dares to acquire a large number of companies in such an exaggerated manner. Huaxia is an inexhaustible and inexhaustible fund pool.

As long as Fantasy Computer's market position in China is still there, then Fantasy Computer can gradually settle the huge purchase fee.

But now his family's basic market has fluctuated, and the drop of more than 40% has put Fantasy Computer's capital chain in a tight state in an instant.

Now Fantasy Computer needs to repay a total of 160 billion yuan in loans every year. If it cannot repay this loan, then Fantasy Computer is bound to enter a state of collapse.

However, the man at the helm is full of confidence in this. He expressed it with an extremely confident attitude at an internal executive meeting. A 40% sales decline is not a big problem. First of all, this sales decline is temporary.

The most important thing is that at present, Fantasy Computer does not have any major competitors in China. If there is no major competitor that can threaten the market position, then the 40% decline in sales will rise back sooner or later. After all, it is impossible for users not to buy it. Whole computer.

And if you buy a complete computer, besides Apple, the strongest and best brand is Fantasy.

At the same time, in order to further encourage the confidence of all employees, the leader further stated that in fact, the domestic personal computer users only account for 38% of the total fantasy computer users, and the real sales of the entire fantasy computer are actually the corporate offices and major institutions. This is the largest and most lucrative market for fantasy computers.

And it is impossible for this market to be disrupted by a little bit of public opinion. After all, consumers in this market are the least price-conscious consumers in the world, and they don't care about prices in other countries' markets.

In fact, the words of the helmsman are basically in line with the reality, that is, the fantasy computer does not need to care too much about public opinion issues, and can wait for time to heal everything.

Of course, there is a premise for this, that is, the partner of Fantasy Computer must be a reliable partner, not some big scam, such as like to install backdoors in the operating system or something.

There is also an international friend named Si ND.

Edward SND, because he joined the U.S. Army in 04, he was eager to participate in the military operations in Laguna, but because he accidentally broke his legs during training, although he strongly asked to return to the team after he recovered, he was still rejected. Forced to retire.

However, because of his strong patriotic feelings during the military training, he got a job in the Security Bureau, and later served as an IT security guard. With his excellent network knowledge and computer skills, he was quickly promoted.

In 07, he was responsible for the work of the computer network security officer assigned by the security department to Geneva, Switzerland, but in fact he was a so-and-so.

He then left the security department to work for Dell Computer, and then joined Booz Allen, a company that worked exclusively for the security department and was responsible for a large number of network security issues.

During this process, Edward SND mastered a lot of first-hand information. By the end of 1, he felt that he could no longer bear the torture of conscience and morality, so he resolutely chose to give up his annual salary of 2015 yuan. After secretly copying all the materials, he went directly to Russia through secret means, and then handed over the materials in his hands to the major media in the world, and then detonated the LJ door time that caused a sensation all over the world.

The detonation time in history was actually in 2013, two years later in this world line, so many changes will naturally occur.

For example, the data collected by ND is more comprehensive, and it is not limited to the United States, but almost all the data from its monitoring network all over the world have been collected in a way, and all the data that is finally posted on the Internet is another It is 12 times that of the world, and the total amount of data it provides has reached a staggering 12.8TB.

In the previous life, except for the American people, the attitudes of the people from various countries towards the LJ sect were that they were pure melon-eaters, and they didn't have too much anger because of this revelation.

Because almost all the information that has been exposed before is the personal privacy of Americans, and the privacy of ordinary people abroad is not interested in collecting.

Secondly, everyone knows that the government’s collection of personal privacy is not very harmful to the individual. On the contrary, if such privacy falls into the hands of neighbors and colleagues in the neighborhood, it will be the biggest crisis.

If the government wants it, take it. Anyway, it is impossible for him to use this privacy to blackmail me. This is why the ND in the previous life seemed to cause a lot of trouble, but in fact it hardly changed the government. On the contrary, later The U.S. government simply took these actions that were originally intended to be hidden in private, directly legislated and recognized them, and then put them on the table. This also turned SND's efforts into a complete joke.

However, with the continuous enrichment of information in this world, a lot of information that has never been released in the world online has also been released.

For example, a set of communication memos from security agencies and major terminal companies around the world. In these memos, the security department requires these communication companies to implant a hidden monitoring program in their personal products to secretly monitor all terminal chats Once the message involves certain sensitive words and letters, it is necessary to record the entire message in its entirety as soon as possible, and then upload it to the security department.

Not only that, the security agency initially required the hidden program in the background to have the authority to directly control the user's mobile phone in an emergency. Unless the user directly pulls the battery, even if the user chooses to shut down, the entire terminal can be controlled in a black screen state , so as to protect the security of the United States.

These orders are very direct and strong requirements. If these terminal companies do not agree to do so, then they will be given strict measures. In the end, the major terminal companies almost completely accepted this request.

However, these terminal companies also stated very simply in their replies that they cannot fully meet this requirement. At best, they add a hidden applet that can monitor text messages and keyboard input in their mobile phones, but they want to control the entire system in the background. The operation of the terminal is absolutely impossible.

Because if you want to do this, you must control the terminal system, but now the terminal systems all over the world are the new generation Lingxiao terminal system provided by Jiangnan Group.

Although the Lingxiao terminal system is free and open to all manufacturers, what the manufacturers only have is the right to use the system and the right to edit the application on the outer layer of the system. The underlying logic of the entire system cannot be modified unless someone from the security department finds it again. Jiangnan Group asked them to modify the marketing terminal system to meet their requirements.

As a result, the security agency actually went to look for it. As a result, the person they contacted was reported directly without saying a few words, and he is still locked inside.

The security agencies were angry, but there was nothing they could do. After all, they only authorized the system for free, and they didn't even do terminal business. What else can you use to threaten them?
But the security agency still harvested a lot of private information on the terminal.

In addition to the monitoring of the terminal, there are many other aspects of monitoring, and the most exciting one is the requirement for the Windows operating system.

Just like the previous request for the terminal, the security agency naturally made the same request for Microsoft. As a result, Microsoft directly agreed, fully accepted the request of the security agency, and designed such a backdoor program.

And in ND's information, it even completely provided all the code and data of this backdoor program.This backdoor program is not only effective for individual users, but also for enterprises and servers, which are only part of the data exchange center.

This backdoor program can not only monitor various private information, but most importantly, it can also lock the systems at critical moments.

This kind of locked state is not a user lock, or a blue screen, which can be solved by reinstalling the system.

Instead, it directly locks all the hard disk data of the user.

Some people may think it’s nonsense, even if a system locks the hard disk data, I just need to unplug the power, remove the hard disk, and then find someone to restore the data. How can a program lock the hard disk data?

But this is indeed something that can be done, because Microsoft has designed a little trick, which is to encrypt all files.

Many people should have used compression tools, which can compress a file and turn it into a new file with completely different data.And if you add a password to this file compression, and this password is still a 268-bit English numeric password, then unless you can get the decompression password, otherwise even if Jobs is reborn, he will not be able to help you crack the password.

Microsoft has specially developed such a compression program, which can compress all the files and data in the user's hard disk, and then add a 268-bit English key to the compressed file, then even if you find someone to re-key the data in the hard disk to After recovering it, what you get is just a packaged and compressed encrypted file, and you can't get all kinds of information inside.

Now such a backdoor exists widely in all Microsoft systems. Once the security agency believes that a user's computer poses a threat to security, they can directly order Microsoft to directly control all files in the system through the backdoor. , In this way, this computer and all kinds of data in it are basically useless.

It is also conceivable how important files and data are to users. For example, if an educational film of thousands of gigabytes in your hard disk is suddenly locked, the despair can also be experienced.

In addition to these two most important news, many other breaking news were announced in the document, and then naturally the world media was in an uproar, and countless media did not report it at all.

Not to mention how the security agencies in the United States should deal with this terrible situation full of bags, but only in China, there is a wave of waves and clouds, and at the same time, an old-fashioned problem is repeated again.

That is, Huaxia should use its own operating system instead of a system developed by a foreigner, which is an extremely fatal threat to Huaxia's network security.

At the beginning, only one or two experts mentioned this, and then quickly gained the support of many netizens.But soon enough, a heavyweight specialist joins the fray, and immediately raises the whole thing by several orders of magnitude.

That is the academician, Ni Guangnan, the former chief engineer of Fantasy Computer, the former chief engineer of Jiangnan Group, and the current honorary dean of Jiangnan University. cyber security.

[PS: My health is a little better, but I can only write so much, please forgive me.In addition, for the new book, I originally planned to save some more words. If you are interested, you can search for "This Novel is Very Healthy", which is opened by another account of mine.

In addition, the new book will not affect the old book, and the old book will be finished in about three months. Thank you for your support! 】

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like