Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> Reborn in 1999  Unleashing the Era of Black Techno

Chapter 430 Absolutely vicious attack

Previous page        Return to Catalog        Next page

    In fact, there is only a thin paper between black and white.

    In the global anti-virus software industry, there are many anti-virus software companies whose predecessors are actually illegal organizations that seek profits from hackers.

    It's just that with the improvement of laws and regulations in various countries, many such improper organizations have begun to bleach.

    Some of them cooperated with capital to become antivirus software companies, and some directly sold the corresponding technology to antivirus software companies, or related technicians directly expected to work for free antivirus software companies.

    Therefore, it is too easy for these antivirus software for technicians to create or spread some kind of computer virus.

    In the process of 306 occupying the domestic market on a large scale, the German company Avira (Little Red Umbrella) and the American companies Norton and Mai Coffee suffered the most losses.

    Among them, Xiaohongsan's antivirus software engine has been widely used in the Xiaguo market, including domestic security companies such as Jingshan Rising, which more or less use Xiaohongsan's antivirus engine.

    As the world's largest antivirus software company, Norton itself also has business in Xiaguo.

    High-end computers of various brands, including Lianxiang, Dell, and HP, are pre-installed with Norton anti-virus software.

    Now that 306 is popularized, everyone will have no money to make.

    It was Norton who made the first effort. Norton studied the deeply optimized windowsxp system and windows98 system in detail to find out the weak points of the system.

    For this purpose, a Trojan horse is prepared to attack the deep optimization system in the name of a third-party hacker organization.

    Several Trojan horses that are more popular during this period, such as Needham, Code Red, etc., are no longer traditional computer viruses, but have evolved into hybrid viruses that spread.

    This type of virus is difficult to detect and kill, and it is easy to cause irreparable losses to users.

    In order to test the anti-virus capability of 306, Norton engineers improved this type of mixed virus on the basis of Needham and Code Red, so that it can specifically attack pirated systems such as deep optimization¡ªafter all, deep optimization currently uses  306 antivirus software has the largest user base.

    Foreign antivirus software companies use viruses to attack their opponents, and then show their antivirus capabilities to gain market access. This trick is not used once or twice.

    And it has been tried and tested.

    Sometimes you can't tell if a common computer virus on the market is released by an antivirus software company or by an international hacker organization.

    After all, if there are no mice in the house, keeping cats is completely useless.

    Why do users buy antivirus software if there are no computer viruses?

    In the name of a third-party organization, Norton created this Trojan horse virus named Perthys, and secretly told network security companies such as My Coffee and Little Red Umbrella about the characteristics of the virus.

    Of course, Norton will definitely not tell the other party with great fanfare: I created this virus. Now I will tell you the characteristics of the virus. You should pay attention to upgrading the software and virus database, and pay attention to protection.

    Norton told the international antivirus software manufacturers: We have caught a new type of virus on the Internet, which is very camouflaged and can irreversibly destroy users' files and pictures. Now I will catch this virus  The characteristics tell you that you should pay attention to protection.

    In fact, whether it is Mai Coffee, Xiaohongsan, or Kaspersky and other internationally renowned antivirus software manufacturers, they all know that Norton's behavior is to let 306 gain a long-term insight.

    These anti-virus software companies that have been in computer security for more than 10 or 20 years, they know what their own strength is, and they also know that Xiaguo anti-virus software company is actually a golden jade and a failure.

    Because so far, no Xiaguo anti-virus software company has developed an anti-virus software engine or created its own virus database by relying on its own capabilities.

    All Xiaguo anti-virus software companies use foreign anti-virus software engines.

    Norton absolutely does not believe that a newly born Xiaguo anti-virus software company, a free anti-virus software company, and an anti-virus software company that has never purchased foreign anti-virus software engines and virus databases, can really protect users' computers.

    Under Norton's leadership, Pertheth soon began to spread on the Xia Kingdom's Internet.

    However, the target of Berseth's attack is very clear, that is, the deeply optimized windows system.

    Jingshan, Rising, Jiangmin, etc. more or less knew the relevant news, but they did not express their position or notify them.

    ? According to the just promulgated Xiaguo Computer Network Security??My friend finally practiced to the full level. He logged into the game yesterday and took a look. Now, let him create a new character!  He spent a lot of money to play this game!  "

    "I was trembling, I was so scared that I quickly unplugged the network cable and just played stand-alone games!"

    A computer virus does not have consciousness and thinking, it has a strong ability to infect.

    Not only Xia Guo was recruited, but the Perthys virus was also brought out by businessmen traveling between Xia Guo and all over the world.

    Through international mail or USB flash drive, Borseth became a worldwide popular computer virus in an instant.

    Moreover, with the help of international hackers, multiple mutations occurred in Pertheth.

    Users who installed other antivirus software were recruited as expected by Norton, but users who installed Norton antivirus software were also recruited.

    This frightened the technicians at Norton's global headquarters.

    They rushed to respond at the first level, and immediately upgraded their anti-virus software engines and virus databases according to Berseth's index characteristics.

    However, after working for a while, everyone suddenly discovered that Norton Anti-Virus is ineffective against the variant Pertheth!  The genius remembers the address of this site in a second.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report