Rebirth Online Entertainment
Chapter 430: Tang Dynasty Cloud Security Website Alliance
Chapter 430: Tang Dynasty Cloud Security Website Alliance
The innovation of this technical concept is simply another epoch-making innovation. 【
Aishang Reading Network]
Just ask, such a great progress is entirely for the wealth of mankind.Perhaps, it won't be long in the future, with the introduction of cloud computing, p2p, etc. in cloud security, you can completely complete the ultimate goal of "the network is a computer".This kind of innovation, even if you think about it casually, you are crazy about it.
Moreover, this kind of creativity, which used to exist only in science fiction, is really possible now.
Yes, judging from the current speed of computer development, such technology may appear in the next ten years, at most 30 years.And it is Tang Dynasty antivirus from China that led the development of this technology.This has also allowed the world to discuss topics about cloud security and cloud computing for a long time.
Even, when this concept of cloud computing was thrown out, it immediately swept the world.Many technology companies have announced that they will enter the field of cloud computing.Such a concept also makes the capital market bring a steady stream of imagination.The major technology stocks in Nasdaq have been hot one after another, and they have been popular in a large area again and again, which proves how huge the future space brought by this innovation will be.
However, no matter how much the outside world praised him, Tang Chao Antivirus did not stop his innovation ability.
Chen Jiayi, who was on the side, was extremely calm now.Moreover, he found another excellent idea in the comments of the world review body. This idea is the Cloud Security Website Alliance.This alliance is not a website alliance for the usual Internet, nor is it for improving p traffic, but a website alliance for network security.
"Jiafeng, do you think our anti-virus software can go further on the Internet?"
Cloud security, after all, is an Internet technology.Otherwise, it is not called a cloud.However, through Internet technology, he can realize a lot of technical means that traditional technical means cannot achieve.This technology is not difficult to say that it is difficult, but it is actually super difficult.
The first prerequisite is that there must be a large number of clients.
In other words, you must have tens of thousands of users using your software products, so that you can go out of the cloud smoothly and securely.
If there are only a few hundred, thousands, or tens of thousands of people, it will be of no use at all.
And the "cloud" in Chen Jiayi's heart is in units of billions.
"On the Internet?"
Lu Jiafeng obviously does not have Chen Jiayi's outstanding creativity, nor does he have Chen Jiayi's vision for future generations.He shook his head and said to Chen Jiayi, "At present, the first step of our anti-virus in Tang Dynasty is to seize all users in the world. This is cloud security and the foundation of cloud computing. As for the second step, we will In cloud computing, let’s see if we can go further to make his processing speed faster and more advanced.”
At present, cloud computing can only handle some relatively small content.Like virus killing, thesaurus and so on.However, if you want to deal with more complex content, like pictures, copy a lot of things, or even online games.This is basically impossible, and therefore, from the beginning of cloud security, he has faced a bottleneck, that is, how to improve the processing capacity of cloud computing.
Of course, one of the most effective methods is to increase the computing power of the super server.However, in the face of calculations in units of billions, no matter how powerful the supercomputer is, it is impossible for him to process so much data.So, up to now, although cloud computing is very innovative.However, his calculation ability cannot be further improved effectively.At most, it is to expand cloud computing to other aspects.
For example, cloud IoT, cloud storage.
What's more, when cloud computing develops to a certain stage, he has to face the problem of personal user access.Because cloud computing collects a lot of information all over the world.Anonymity is avoided, and things about individuals and personal sexuality will be collected by them.Although many companies want to avoid this aspect, it is impossible to avoid it.Even, they promised that they would not publish personal privacy issues, and they also faced doubts from a large number of individual users.
"I'm not talking about the research and development of cloud security technology, but the application of cloud security on the Internet."
Chen Jiayi knew the difficulty in this aspect.
Seeing that Lu Jiafeng did not understand, Chen Jiayi continued to ask, "I want to ask you, what are the ways that computers can be infected with viruses?"
"The first is to download."
Strictly speaking, as long as your computer is connected to the Internet, even if you do nothing, you may be infected with a virus.Just like the shock wave virus, there is a possibility of infection at any time.However, such cases of infection are rare after all.Most people plant viruses by downloading various software to infect viruses.
For example, there are some Internet rookies who think about doing bad things every day, and they don't know any hacking skills.So I went to the Internet to download the TT Thief, and downloaded the TT album cracking tool... These, although, on the Internet, there is indeed such software.However, more than 90% of what you find on the Internet are a lot of viruses.
After you download and unzip, well, you're done...
Of course, this is only the infection of a small number of people.
There is another situation, more common than this.
That is, many male-sex-students, due to their physical needs, went to the Internet to download some more passionate physiological films.Among these domestically produced, Nissan, and European and American blockbusters, they are the most susceptible to viruses.According to the survey, out of ten men, as long as he surfs the Internet, basically ten men have watched these sex films.In this way, among so many online names in the world, the number of men infected with the virus is extremely large.
"The other one is browsing the web."
In addition to downloading, there is another way of being poisoned that is relatively nasty and unstoppable, and that is browsing the web.
In particular, when ordinary users need to find information, they will enter one website after another that they have never entered before.And after they enter, if there are Trojan horses on these websites, or viruses.Then, your computer may be infected with these viruses.
"The third one is the malicious super powerful unknown virus."
Like a shock wave or something.However, with the improvement of anti-virus technology, one or two such viruses usually appear in the city in a few years, and the impact is not as great as the first two.
In fact, there is another one, which is to achieve infection through hardware.For example, viruses may be infected through floppy disks, CDs, hard disks, or USB flash drives.However, this kind of infection is much less likely than the infection on the Internet, and it is not mainstream, so it will not be emphasized here.
"very good."
Chen Jiayi was very satisfied, "That is to say, computer viruses or Trojan horses are mainly infected through personal websites, right..."
Whether it is downloading or viewing a web page, you must enter the website.Therefore, the ultimate source is still various websites.
"Yes, so to speak."
Although downloading is still the most direct way of domestic virus infection.
However, with the emergence of a large number of websites, more and more Trojan horse websites and virus websites are threatening the computer security of users.With the development at this speed, in the future, through websites, even web pages, will become the main way for ordinary users to get infected with viruses.As antivirus companies, they have this obligation to keep personal computers safe.
"So, if there is a way to identify whether the website is hung with a Trojan horse, or whether there is a virus. Then, is it effective to prevent ordinary users from being infected by viruses or Trojan horses?"
Chen Jiayi continued to guide.
"No, that's impossible."
Lu Jiafeng shook his head. Although he thought that Chen Jiayi's idea was good, he obviously had no practical ability.He said, "Analyzing whether a website has viruses or not simply by antivirus software does not have much effect. Because viruses and Trojan horses come in various forms, we can't tell them apart. Moreover, we don't know the source code of the other website. "
For a website, it is impossible for you to see through it so easily whether it has a virus or not.
Moreover, most people, he doesn't know anything about this website.No matter how powerful a computer expert is, it is impossible for him to judge whether he has a virus from an unknown website.After he opened it, perhaps, he was already poisoned.Unless, you do a whole bunch of strict protection.
"good."
Hearing Lu Jiafeng's answer, Chen Jia was very happy.The smart Lu Jiafeng, under Chen Jiayi's random guidance, already knew that using anti-virus software to detect whether there is a virus on the unknown network.Although, in his opinion, such a test could not be successful.At most, only some Trojan horse websites with relatively backward technical means can be detected.
"But what if it's through a manual computer, two ways?"
"Hand computer?"
Lu Jiafeng thought for a while, but still shook his head, "Both manual and computer judgments are the same."
The judgment method of the computer is attached to him by the programmer.
Therefore, both manual and computer judgments are the same, except that the computer is faster.
"Unless, for these websites, we implant a piece of code in them."
Just like monitoring traffic, if you want to monitor traffic, you should naturally implant a code that monitors traffic.Otherwise, you will not be able to count how much traffic you have.The same is true for whether there is a virus on the website. If a piece of code that can be recognized by Tang Dynasty Company is implanted in their website.Then, through this piece of code, you can check whether the website has a virus.
"But, is this impossible?"
Lu Jiafeng said another word secretly.But in my heart, which website would allow me to implant a piece of code?
"Haha... Jiafeng, you are really smart."
Chen Jia laughed out loud.
"what……"
how?
Chen Jiayi laughed loudly, but Lu Jiafeng didn't understand.
"Hey, don't tell me, Jiafeng, do you think it is impossible for others to allow us to implant a piece of code?"
"Yes."
"It seems that you have underestimated the power of Tang Chao's anti-virus. Lex's pageview ranking can be relied on his traffic statistics, so that a lot of websites can be implanted with a lex code. Can't we Tang Chao anti-virus? Is it?"
In fact, if you ask a person individually, they may disagree.However, when a large number of people join this plan.Then, others, etc., will automatically join.If you do not join, then when users browse their website, they will think that this website is risky, so they will not enter.Until that time, it was difficult for them to join or not.
This is why in later generations, everyone can see that there is a tick mark behind the website address.
Having said that, Lu Jiafeng suddenly realized.
It turns out that this plan is actually the same as lex statistics flow.However, it is a different way.
"I understand."
……
A week later, Tang Dynasty Anti-Virus started to strike while everyone was discussing cloud security and cloud computing.Once again, a "Tang Dynasty Cloud Security Website Alliance" plan was issued.
The plan is mainly aimed at unknown small websites all over the world, as long as you follow the requirements of the plan.Then, Tangchao Antivirus can prove that your website is a safe and secure public nuisance website.
At the beginning, everyone was wary of this plan, and not many personal websites chose to join the plan.After all, the plan was to embed a piece of code given by Tang Dynasty Antivirus into the personal website.However, not all personal websites, he thinks so.There are some small sites and they just opt in to the program.
After successfully passing through, Tangchao Antivirus put a red hook on the back of the website.Since then, this website has become a safe virus website under the anti-virus certification of the Tang Dynasty.All of a sudden, when some users who used Tang Chao's anti-virus software searched for this website, they suddenly saw some red hooks on these websites.
It wasn't until after reading it that I realized that these red-hooked websites are all safe and secure websites.Users can directly enter and will not be threatened by any Trojan horses and viruses.All of a sudden, the first batch of personal websites that joined the "Tang Dynasty Cloud Security Website Alliance" plan, under the differentiated treatment of users, their traffic increased steadily, and they envied several similar websites.
Until then, those websites that had never moved before finally exerted their strength.
A large number of personal or small websites around the world have all implanted this code in their personal websites to prove the purity of their websites.Of course, in the face of some large institutions around the world.The anti-virus in the Tang Dynasty did not ask them to implant it. Maybe they would not implant it because of their face.However, there is also a solution to this, that is, check their website directly.Because, the Tang Dynasty believed in anti-virus.With the security awareness of these large websites, there is no need for detection at all.
In addition, because of the implementation of the "Tangchao Cloud Security Website Alliance" plan, it also helped ordinary users choose Tangchao anti-virus software to a corresponding extent.Because, Tangchao anti-virus software can really distinguish which websites are safe websites and which websites are not safe.In this way, ordinary users can feel more at ease when browsing the website, without having to consider the threat of viruses or Trojan horses.
【
Aishang Reading Network]
The innovation of this technical concept is simply another epoch-making innovation. 【
Aishang Reading Network]
Just ask, such a great progress is entirely for the wealth of mankind.Perhaps, it won't be long in the future, with the introduction of cloud computing, p2p, etc. in cloud security, you can completely complete the ultimate goal of "the network is a computer".This kind of innovation, even if you think about it casually, you are crazy about it.
Moreover, this kind of creativity, which used to exist only in science fiction, is really possible now.
Yes, judging from the current speed of computer development, such technology may appear in the next ten years, at most 30 years.And it is Tang Dynasty antivirus from China that led the development of this technology.This has also allowed the world to discuss topics about cloud security and cloud computing for a long time.
Even, when this concept of cloud computing was thrown out, it immediately swept the world.Many technology companies have announced that they will enter the field of cloud computing.Such a concept also makes the capital market bring a steady stream of imagination.The major technology stocks in Nasdaq have been hot one after another, and they have been popular in a large area again and again, which proves how huge the future space brought by this innovation will be.
However, no matter how much the outside world praised him, Tang Chao Antivirus did not stop his innovation ability.
Chen Jiayi, who was on the side, was extremely calm now.Moreover, he found another excellent idea in the comments of the world review body. This idea is the Cloud Security Website Alliance.This alliance is not a website alliance for the usual Internet, nor is it for improving p traffic, but a website alliance for network security.
"Jiafeng, do you think our anti-virus software can go further on the Internet?"
Cloud security, after all, is an Internet technology.Otherwise, it is not called a cloud.However, through Internet technology, he can realize a lot of technical means that traditional technical means cannot achieve.This technology is not difficult to say that it is difficult, but it is actually super difficult.
The first prerequisite is that there must be a large number of clients.
In other words, you must have tens of thousands of users using your software products, so that you can go out of the cloud smoothly and securely.
If there are only a few hundred, thousands, or tens of thousands of people, it will be of no use at all.
And the "cloud" in Chen Jiayi's heart is in units of billions.
"On the Internet?"
Lu Jiafeng obviously does not have Chen Jiayi's outstanding creativity, nor does he have Chen Jiayi's vision for future generations.He shook his head and said to Chen Jiayi, "At present, the first step of our anti-virus in Tang Dynasty is to seize all users in the world. This is cloud security and the foundation of cloud computing. As for the second step, we will In cloud computing, let’s see if we can go further to make his processing speed faster and more advanced.”
At present, cloud computing can only handle some relatively small content.Like virus killing, thesaurus and so on.However, if you want to deal with more complex content, like pictures, copy a lot of things, or even online games.This is basically impossible, and therefore, from the beginning of cloud security, he has faced a bottleneck, that is, how to improve the processing capacity of cloud computing.
Of course, one of the most effective methods is to increase the computing power of the super server.However, in the face of calculations in units of billions, no matter how powerful the supercomputer is, it is impossible for him to process so much data.So, up to now, although cloud computing is very innovative.However, his calculation ability cannot be further improved effectively.At most, it is to expand cloud computing to other aspects.
For example, cloud IoT, cloud storage.
What's more, when cloud computing develops to a certain stage, he has to face the problem of personal user access.Because cloud computing collects a lot of information all over the world.Anonymity is avoided, and things about individuals and personal sexuality will be collected by them.Although many companies want to avoid this aspect, it is impossible to avoid it.Even, they promised that they would not publish personal privacy issues, and they also faced doubts from a large number of individual users.
"I'm not talking about the research and development of cloud security technology, but the application of cloud security on the Internet."
Chen Jiayi knew the difficulty in this aspect.
Seeing that Lu Jiafeng did not understand, Chen Jiayi continued to ask, "I want to ask you, what are the ways that computers can be infected with viruses?"
"The first is to download."
Strictly speaking, as long as your computer is connected to the Internet, even if you do nothing, you may be infected with a virus.Just like the shock wave virus, there is a possibility of infection at any time.However, such cases of infection are rare after all.Most people plant viruses by downloading various software to infect viruses.
For example, there are some Internet rookies who think about doing bad things every day, and they don't know any hacking skills.So I went to the Internet to download the TT Thief, and downloaded the TT album cracking tool... These, although, on the Internet, there is indeed such software.However, more than 90% of what you find on the Internet are a lot of viruses.
After you download and unzip, well, you're done...
Of course, this is only the infection of a small number of people.
There is another situation, more common than this.
That is, many male-sex-students, due to their physical needs, went to the Internet to download some more passionate physiological films.Among these domestically produced, Nissan, and European and American blockbusters, they are the most susceptible to viruses.According to the survey, out of ten men, as long as he surfs the Internet, basically ten men have watched these sex films.In this way, among so many online names in the world, the number of men infected with the virus is extremely large.
"The other one is browsing the web."
In addition to downloading, there is another way of being poisoned that is relatively nasty and unstoppable, and that is browsing the web.
In particular, when ordinary users need to find information, they will enter one website after another that they have never entered before.And after they enter, if there are Trojan horses on these websites, or viruses.Then, your computer may be infected with these viruses.
"The third one is the malicious super powerful unknown virus."
Like a shock wave or something.However, with the improvement of anti-virus technology, one or two such viruses usually appear in the city in a few years, and the impact is not as great as the first two.
In fact, there is another one, which is to achieve infection through hardware.For example, viruses may be infected through floppy disks, CDs, hard disks, or USB flash drives.However, this kind of infection is much less likely than the infection on the Internet, and it is not mainstream, so it will not be emphasized here.
"very good."
Chen Jiayi was very satisfied, "That is to say, computer viruses or Trojan horses are mainly infected through personal websites, right..."
Whether it is downloading or viewing a web page, you must enter the website.Therefore, the ultimate source is still various websites.
"Yes, so to speak."
Although downloading is still the most direct way of domestic virus infection.
However, with the emergence of a large number of websites, more and more Trojan horse websites and virus websites are threatening the computer security of users.With the development at this speed, in the future, through websites, even web pages, will become the main way for ordinary users to get infected with viruses.As antivirus companies, they have this obligation to keep personal computers safe.
"So, if there is a way to identify whether the website is hung with a Trojan horse, or whether there is a virus. Then, is it effective to prevent ordinary users from being infected by viruses or Trojan horses?"
Chen Jiayi continued to guide.
"No, that's impossible."
Lu Jiafeng shook his head. Although he thought that Chen Jiayi's idea was good, he obviously had no practical ability.He said, "Analyzing whether a website has viruses or not simply by antivirus software does not have much effect. Because viruses and Trojan horses come in various forms, we can't tell them apart. Moreover, we don't know the source code of the other website. "
For a website, it is impossible for you to see through it so easily whether it has a virus or not.
Moreover, most people, he doesn't know anything about this website.No matter how powerful a computer expert is, it is impossible for him to judge whether he has a virus from an unknown website.After he opened it, perhaps, he was already poisoned.Unless, you do a whole bunch of strict protection.
"good."
Hearing Lu Jiafeng's answer, Chen Jia was very happy.The smart Lu Jiafeng, under Chen Jiayi's random guidance, already knew that using anti-virus software to detect whether there is a virus on the unknown network.Although, in his opinion, such a test could not be successful.At most, only some Trojan horse websites with relatively backward technical means can be detected.
"But what if it's through a manual computer, two ways?"
"Hand computer?"
Lu Jiafeng thought for a while, but still shook his head, "Both manual and computer judgments are the same."
The judgment method of the computer is attached to him by the programmer.
Therefore, both manual and computer judgments are the same, except that the computer is faster.
"Unless, for these websites, we implant a piece of code in them."
Just like monitoring traffic, if you want to monitor traffic, you should naturally implant a code that monitors traffic.Otherwise, you will not be able to count how much traffic you have.The same is true for whether there is a virus on the website. If a piece of code that can be recognized by Tang Dynasty Company is implanted in their website.Then, through this piece of code, you can check whether the website has a virus.
"But, is this impossible?"
Lu Jiafeng said another word secretly.But in my heart, which website would allow me to implant a piece of code?
"Haha... Jiafeng, you are really smart."
Chen Jia laughed out loud.
"what……"
how?
Chen Jiayi laughed loudly, but Lu Jiafeng didn't understand.
"Hey, don't tell me, Jiafeng, do you think it is impossible for others to allow us to implant a piece of code?"
"Yes."
"It seems that you have underestimated the power of Tang Chao's anti-virus. Lex's pageview ranking can be relied on his traffic statistics, so that a lot of websites can be implanted with a lex code. Can't we Tang Chao anti-virus? Is it?"
In fact, if you ask a person individually, they may disagree.However, when a large number of people join this plan.Then, others, etc., will automatically join.If you do not join, then when users browse their website, they will think that this website is risky, so they will not enter.Until that time, it was difficult for them to join or not.
This is why in later generations, everyone can see that there is a tick mark behind the website address.
Having said that, Lu Jiafeng suddenly realized.
It turns out that this plan is actually the same as lex statistics flow.However, it is a different way.
"I understand."
……
A week later, Tang Dynasty Anti-Virus started to strike while everyone was discussing cloud security and cloud computing.Once again, a "Tang Dynasty Cloud Security Website Alliance" plan was issued.
The plan is mainly aimed at unknown small websites all over the world, as long as you follow the requirements of the plan.Then, Tangchao Antivirus can prove that your website is a safe and secure public nuisance website.
At the beginning, everyone was wary of this plan, and not many personal websites chose to join the plan.After all, the plan was to embed a piece of code given by Tang Dynasty Antivirus into the personal website.However, not all personal websites, he thinks so.There are some small sites and they just opt in to the program.
After successfully passing through, Tangchao Antivirus put a red hook on the back of the website.Since then, this website has become a safe virus website under the anti-virus certification of the Tang Dynasty.All of a sudden, when some users who used Tang Chao's anti-virus software searched for this website, they suddenly saw some red hooks on these websites.
It wasn't until after reading it that I realized that these red-hooked websites are all safe and secure websites.Users can directly enter and will not be threatened by any Trojan horses and viruses.All of a sudden, the first batch of personal websites that joined the "Tang Dynasty Cloud Security Website Alliance" plan, under the differentiated treatment of users, their traffic increased steadily, and they envied several similar websites.
Until then, those websites that had never moved before finally exerted their strength.
A large number of personal or small websites around the world have all implanted this code in their personal websites to prove the purity of their websites.Of course, in the face of some large institutions around the world.The anti-virus in the Tang Dynasty did not ask them to implant it. Maybe they would not implant it because of their face.However, there is also a solution to this, that is, check their website directly.Because, the Tang Dynasty believed in anti-virus.With the security awareness of these large websites, there is no need for detection at all.
In addition, because of the implementation of the "Tangchao Cloud Security Website Alliance" plan, it also helped ordinary users choose Tangchao anti-virus software to a corresponding extent.Because, Tangchao anti-virus software can really distinguish which websites are safe websites and which websites are not safe.In this way, ordinary users can feel more at ease when browsing the website, without having to consider the threat of viruses or Trojan horses.
【
Aishang Reading Network]
You'll Also Like
-
After the mind-reading cripple junior sister, the entire sect rose to prominence.
Chapter 406 6 hours ago -
The daily life of a space tycoon raising children, doting on his husband, and farming.
Chapter 268 6 hours ago -
After divorcing the mute girl, President Gu knelt down and begged for reconciliation.
Chapter 190 6 hours ago -
Mr. Xiao, can I borrow your wedding invitation?
Chapter 483 6 hours ago -
After awakening, the eldest daughter was slapped all the way
Chapter 230 6 hours ago -
Era: After foreseeing the future, I changed my fate using spatial abilities.
Chapter 241 6 hours ago -
The Queen of Scrolls never admits defeat
Chapter 930 6 hours ago -
She transmigrated into the body of a top-tier female in the beast world, and the entire intergalacti
Chapter 133 6 hours ago -
After being universally criticized online, I went viral on military-themed variety shows.
Chapter 929 6 hours ago -
Married to a man in Northwest China, the delicate wife with a soft waist is spoiled rotten by the ro
Chapter 212 6 hours ago