Chapter 92 Paper Tigers
But I may not be able to make that key, which makes me most angry.
You should know that the technical department is originally a department that builds its own locks and equips other people's home keys.
Of course, this lock is a metaphor, which actually refers to protective security software, and the key is also a metaphor, which refers to weapons used to break other people's locks, such as viruses or other methods.
Of course, there are many ways to destroy the lock, and it is not necessary to require a key. Saw with a saw, smash it with a hammer, chisel with a chisel, or even melt the entire door panel with aluminum heater, or sending the locked house to heaven with an RPG.
However, when there are fixed purposes, there are not many methods that can be used, or even very few.
For example, this time, it is not easy to capture a computer protected by Tom's security software.
Because Tom's security software does much safer than he thought.
Safety is not a problem. No matter how powerful a lock is, as long as the lock is unlocked, it is not impossible to open it, but whether there is time when the lock is opened is a problem.
That's right!
He doesn't have much time.
All departments are now trying hard to eliminate this software in the juvenile stage. When the germination period fails, everyone is already very angry. If the germination period fails again, maybe everyone can really go to see God.
If the technical supervisor hadn't cared about this two or three years ago, the worst thing would be that your company would go bankrupt. I'd pat my butt and go to another home. But now he has to care.
Why?
Because he has no choice.
The Internet bubble has begun to burst, with fewer and fewer new companies opening, and not many old companies that can continue to survive.
Even those companies that survived by luck did not have enough middle and high-level positions. Should I be a middle-level company now? After I was unemployed, I would go to work hard with a group of children who were far younger than me, waiting for my unknown time to get my promotion opportunity?
No!
don't want!
That's too cruel!
Therefore, the technical department manager feels so anxious.
The reason why he was anxious was that this damn Tom was safe.
Why do you want to make free security software?
Why can it attract Pete Taylor's investment?
Why is the software so good?
Why didn't you go there when you dig yourself?
While the department head regretted, he also began to order his subordinates to launch a more violent and violent attack on the Tom security software that was locked in a virtual machine, like an experimental mouse locked in a small cage.
Perhaps two years ago, he would believe that there will be software without vulnerabilities in this world and systems without vulnerabilities.
But he has now completely given up his unrealistic fantasy.
As long as this world is software, there will be loopholes and opportunities to take advantage of.
The difference is whether you know this loophole and whether the enemy knows it.
Generally speaking, you may not know about this kind of vulnerability, and then you will be caught off guard by your known opponent using this vulnerability.
Of course, there are also some potential loopholes to make some preparations for future convenience.
For example, Symantec now stores various information about hundreds of thousands of paid users. To put it nicely, these information helps users recover data after being attacked. To put it ugly...
hehe……
Where can I find white crows in the world?
Who says security software cannot be the biggest hooligan?
So, this is a life-and-death struggle, without gentleness or treating guests to dinner.
Either free security software dies or paid security software dies.
"Send an emergency security announcement. There are major security vulnerabilities in Tom Security Software. Please uninstall and repair users who have installed Tom Security Software."
The security supervisor said calmly with his fingers crossed.
The person in charge of issuing the notice turned his head in confusion and looked at the department supervisor and asked, "Supervisor, are there any problems with Tom's security software?"
The supervisor glared at him and said, "If I say there is, you can do it as I say, what are you asking?"
"Okay..." The employee resisted weakly and obeyed the leader's instructions.
The department manager's expression was still very serious. He returned to his work station and pressed the Enter key very resolutely.
In an instant, countless viruses lurking on the Internet were all receiving the same command to identify the signature code of Tom's security software. As long as the computer with this signature code, these viruses will immediately start to destroy.
That's right!
Although Tom Security itself has not found any vulnerabilities that can be attacked for the time being, if you want to attack Tom Security, you may not necessarily find its vulnerabilities.
Just let some viruses with strong latency attack on machines with Tom security software installed one after another.
The content of the attack is also relatively simple, which is to occupy a large amount of machine resources and make the machine stutter.
In this way, even if Tom Security quickly checked and killed the virus, there was another one. The users would not even feel that there was a virus, but instead felt that there was something wrong with the Tom Security software itself.
Otherwise, why are there no problem with other people who don’t have Tom security software installed?
At this time, Symantec released a special repair tool. As long as you download this tool and uninstall Tom Security, the computer will return to normal.
Even if you download Symantec through the Internet at this time, you will get a free trial for a week.
This can also be regarded as a paid security software, a compromise on free security software.
However, this compromise achieved relatively good results.
First of all, there will be problems like Tom's safety, and secondly, Kaspersky is not free.
People always tend to buy products they are used to, so Symantec's sales have increased to a certain extent.
As for the ball, Tom was kicked back to safety.
Tom's safe people were also confused about so many viruses that suddenly appeared. They had no expectations about this before.
After all, no one expected that there would be such a large number of hidden deep viruses on the pay side.
These viruses are not like the ones that were previously traced, and they are deliberately confused.
Therefore, although the results of the inspection and killing are still good, the final results are not very ideal.
Because there are many new viruses, we have to keep killing them.
Tom's hair seemed to turn white overnight, but he did not give up, but continued to persevere.
He insisted that the number of viruses is limited, and as long as he persists, he will win?
Chapter completed!