Chapter 1446 Flood washed away the Dragon King Temple


Chapter 1446 Flood washed away the Dragon King Temple

Dongle is an encryption solution to prevent software from being pirated, cracked, and copied.

To develop the software industry in the country, the pressure currently faced mainly comes from two aspects.

One is the various intellectual property patent protections established by foreign software giants to prevent imitation. Take a text editor as an example. A simple text box drop-down bar can theoretically have patent protection. Yes, if you add such a thing to your software, others can sue you.

Another aspect of pressure is extremely rampant piracy.

Software is just like the real thing. To prevent it from being stolen, you have to get a safe for it and lock it up.

The safe is to put a layer of protection program on the software, usually using a packing tool or API encryption mechanism, and the dongle is a door lock. The protected software can only be read through the dongle channel. , otherwise even if you copy it, it will be a bunch of gibberish.

But any encryption tool, except for the quantum communication encryption mechanism known as "Schrödinger's Cat" decades later, is theoretically possible to be cracked.

The software can translate the shell and practical code into an assembly language program through a disassembly tool, and then peel off the shell by studying the code.

This project is very complex and cannot be accomplished by a company of average strength. As an information technology company that started with software, operating systems, and instruction sets, Clover of course attaches great importance to software cracking and anti-cracking. Work.

This thing is both a spear and a shield. For example, right now, after Samsung's chip design software arrives, it is immediately sent to Clover's independent laboratory for cracking.

Since the "black box effect" of software development tools is not particularly prominent now, the relationship between compilation and code and source code. Unlike later generations, various advanced development tools were interpreted so hard that even my mother could not recognize them. Therefore, the compiled code was decompiled into "assembly language-level source code" through disassembly and other methods, turning it into something that computer experts can understand. It is an important way to study and learn other people’s R&D ideas and imitate and develop similar technology products.

If the decryption method is to dismantle the cabinet, there is a simpler method, which is to "match the key".

Crack the algorithm mechanism of the decryption dog directly, and then use the program to simulate a "new dongle" to deceive the application to achieve the purpose of free reading. This is equivalent to equipping the safe with another one, or even countless ones. key.

In this way, you only need to sell the source program equipped with this dongle and the fake dongle to customers. Customers can use this "simulated dog" to use this program at will, and the purpose of piracy is achieved.

It is normal in the industry to study other people's software through decompilation engineering. It is like writing an essay. After you understand how others write, you can "translate from Chinese to Chinese", follow other people's ideas, and write in your own language. Publish your own article.

Unless some paragraphs must be copied, of course they will be judged as plagiarism. The so-called intellectual property protection is actually to protect those passages that you can’t get around or avoid except by copying them.

In this case, all you have to do is pay a fee and let the other person agree to use his joke before the patent protection expires.

To put it more bluntly, Clover Company itself is doing what Xiang Yu is doing now in an upright and open manner, but with completely different purposes.

One is dismantling and researching, and the other is directly cashing out. From a legal perspective, the results are of course different.

"Let me tell you, isn't the purpose of our studies just to learn skills?" Wei Fei said: "Does someone like Xiang Yu have learned skills? With his current level, are there people everywhere he goes? Want him?”

“You want to give it to the monk? Are you a lobbyist?" Zhou Zhi directly exposed Wei Fei's intentions: "The current encryption algorithm in China is not very complicated, and Xiang Yu can't survive for a few years with this skill."

"Nowadays, a full-code font library is not available. The price of Hanka is 5,000 yuan. I don’t know if Xiang Yupo How many sets have been solved and how many sets have been sold?" Zhou Zhi imagined Xiang Yu's operation method: "Theoretically, it is indeed possible to convert all Hanka and dongles into software, and then sell them by selling hard drives. Yu really did it to this level, in our company Si is indeed more than enough to be a software engineer." After saying that, he was a little worried: "But if he really does it to this extent, it may not be a matter of punishment from the school..."



"How exaggerated can it be?" Zhang Lu asked.

"Maybe... it's enough for a sentence." Zhou Zhi said.

"I've finished calling home, who do you think is going?" At this time, Zhang Xinyi came back and saw several people with unhappy expressions: "What's wrong? Is there something wrong?"< br>
"It's okay. I remembered that I still have a phone call to make tonight. I'm going to call someone back first." Zhou Zhi stood up and said, "Xin Yi, please eat something. I see you have lost weight again this time.”
When he arrived outside the cabin, Jiang Shu was a little surprised when he saw Zhou Zhi: “Huh? Why did you come out?” >
“I’ll make a phone call first.” Zhou Zhi was a little worried: “It seems that after going to college, my classmates become more worried than the other.”

After calling Shudu, Hu Tianyu hesitated and said that he seemed to have heard Lao Mai say that there was indeed such a thing in Xi'an, but he couldn't explain it clearly.

Anything out of the ordinary is a monster. Zhou Zhi hung up the phone and dialed Mai Mingchuan again.

I finally learned the truth from Lao Mai. This matter was really related to Xiang Yu, but after clarifying the whole story, it was quite dumbfounding.

It can be said that a flood has washed away the Dragon King Temple.

The cause was a magazine owned by Xi'an Changfeng Publishing House. The employee in charge of computer operations learned about the value and market demand of the full character library Hanka at work, so he had a crooked idea and wanted to use it. Crack it, then pirate it and sell it for money.

This employee himself was not good enough, so under the guise of "recruiting", he went to the Computer Department of Xi'an University of Electronic Science and Technology to find someone, brought him back to the unit to study Hanka, and made a promise that this was a job requirement, and if he did it well he would be rewarded a lot. Big benefits.

However, the dongle of the full-code font Hanka was upgraded to the algorithm by Clover Company. The two attempts to recruit people failed, and it was only the third time that Xiang Yu was recruited.

Although Xiang Yu has just finished his freshman year, he has been obsessed with computers since he came into contact with them. He studied programming without sleep and food, and his level improved rapidly.

He didn't expect to be able to crack the Hanka dongle, but he was lucky enough to survive. The software engineer of Clover Company buried a backdoor program in the dongle because of the convenience of maintenance. Yu found out.

The design of this backdoor is a bit bizarre. It is a clock reading bypass. If the computer's system time is modified to 00:00, 1900, engineers can read it without knowing the secret key. , perform maintenance on the readable and writable memory on the dongle.

This trick is indeed very effective in practical applications. The dongle will have a self-checking mechanism on a regular basis. At this time, the system administrator of the unit needs to enter his own secret key and the secondary secret key in the dongle. Only after matching can the Hanka be used again.

The problem is that many managers of card-using units will forget the secret keys they have entered. At this time, Clover Company needs to send technicians to enter the system using the first-level secret key of the dongle maintenance personnel. Erase the secondary secret key forgotten by the user unit administrator and restore the dongle to its original factory state.

(End of this chapter)

Previous Details Next