Chapter 1856 The house was ransacked


Chapter 1856: Someone ransacked the house

“Our system was infiltrated by hackers, and someone got super user privileges!”

“What?! Which system?! Which level of super user? Permissions?" Zhou Zhi was immediately frightened when he heard this. Clover's security system was obtained by Microsoft. Certified, there is in-depth cooperation between the two parties. Clover actually acts as a red customer tester for Microsoft systems and discovered many bugs in Microsoft Windows systems. Clover provided many upgrade packages to Microsoft, and then Microsoft Under the guise of upgrading the system, for example, under the guise of overcoming the millennium bug, the loopholes were secretly closed.

Of course, Microsoft's hush money is also generous, and Clover has therefore made its anti-virus software and firewall software very good. This year, it was also selected as the most trustworthy firewall of the year by "Computer News" software.

As a result, this happened. Zhou Zhi immediately thought of the great masters who were active in the forum. One of them had a criminal record in his previous life: "Could it be those old guns? Ah, and Zhou Xiaopao did it?”

Nowadays, in addition to the four old guns of "Qiu Lei Martin", there are also several active young guns in the information technology section of the Clover Forum, and Zhou Xiaopao is one of them.

This man was first recommended to South China University of Technology. Because he insisted on studying computer science, he was recommended to the Communication and Computer Education Reform Class of Xi'an Jiaotong University.

The education reform class is like the "key class" in the university. Zhou Xiaopao started working part-time during the few years of college. He studied there until 1992 and developed more than a dozen software and hardware products.

In 1993, Zhou Xiaopao and two senior brothers developed an anti-virus card and made more than 100,000 yuan. Then they became ambitious and prepared to start a big business and enter the color printing design industry.

As a result, this industry has suffered continuous blows, because the color printing design industry requires the use of fonts, and the current fonts are all developed based on the Hanwen large font library, which will involve legal issues of IP authorization.

Even if Zhou Zhi does not pursue the case, operating system manufacturers such as Microsoft and Apple that use Hanwen's large font library will require software developers to meet such requirements. This resulted in Zhou Xiaopao's system being eventually required to provide a licensing fee, but Zhou Zhi Xiao Pao's stall was too big all of a sudden, but he didn't prepare the money. Even though he finally got the venture capital from AXA Fund, he still didn't get over it.

On the other end, the anti-virus card has also been obliterated by the Clover anti-virus software. This kind of hardware-based anti-virus card has many shortcomings such as complex installation methods and difficulty in upgrading. It cannot compete with Clover's. Competing with superior methods such as software installation, patching and online virus database upgrades, Zhou Xiaopao's company eventually collapsed.

This year Zhou Xiaopao returned to school and admitted his mistake to his instructor, handed over a geographic information system with hundreds of thousands of lines of code, and obtained his master's degree through graduation defense.

Zhou Zhi immediately extended an olive branch and strongly invited him to work at Clover Company as the director of the Virus Firewall Research Laboratory, with the same salary as San Xiaozhi.

It turned out that he had some backbone and disdained being associated with the four-leaf clover who "wins with oneself but not with force", so he turned his attention to Founder and developed an Internet e-mail system.

This is simply hitting the wall. Now Clover's internal email system is quite mature, and the Internet's email system is also well used through the binding with QQ and Windows browser. It is currently in the There are no competitors, just waiting to take off with the rise of the domestic Internet wave.

Zhou Zhi’s understanding of Zhou Xiaopao’s experience from later generations seems that this system did not succeed. In the end, after many years of ups and downs, Zhou Xiaopao did not establish a new company until 2006 and developed a free A security guard who uninstalls rogue software can be considered a complete turnaround.

Thinking of that powerful person and his abilities, plus the fact that he currently belongs to the category of "barefoot people who are not afraid of wearing shoes", Zhou Zhi immediately became suspicious.

“It’s not him!” Of course Hu Tianyu and the Clover Group are not vegetarians: “It’s a mysterious user who invaded the forum management portal through the forum. After obtaining super administrator rights, he then quarantined The server jumped to the group's LAN, and now he has the highest user rights in the group's office system. Advanced! The permissions are the same as yours!”

“Holy shit!” Zhou Zhi’s whole body was filled with cold sweat, and if he had obtained the same permissions as his own intranet user, then the four Ye Cao Group is almost completely transparent to it: "Where are we Suzaku? Are we contaminated?"

Theoretically, this user now has the same permissions as Zhou Zhi, so he only needs to press the Enter key to destroy all systems of the Clover Group!

Of course, this kind of system only exists in theory, because what this person destroyed was only the system connecting the Clover Group to the outside world. But Clover itself also has a very strict backup and disaster recovery system.

In particular, the disaster recovery system is placed at the foot of Longquan Mountain. According to thoughtful design requirements, even if Shudu’s system is completely destroyed by force majeure, the Longquan Mountain disaster recovery system can Immediately take over all the business of the Clover Group and operate it normally.

This system is physically completely disconnected from the outside world. It is a complete "information island". This information island will only connect the system of Shu Capital Headquarters at a fixed time point every week. Record the changes as a streaming tape backup, then drive to the foot of Longquan Mountain, and then import them as a streaming tape backup.

This is a very strict physical isolation, the purpose is to prevent external intrusion.

This disaster backup system was named "Suzaku" by Zhou Zhi, which means that it can be reborn from the ashes as a last resort.

When Zhou Zhi asked this sentence, he was already prepared for the worst, because the core business of Clover Group is now too large and too large. It is unrealistic to incorporate all systems into Suzaku. Only the most Only the core and most important systems will be included in Suzaku's backup scope.

If you have to activate Suzaku, there will be many problems.

Many non-critical subsystems are not included. These subsystems must continue to be physically isolated from Suzaku until cleaning and screening are completed, all loopholes are blocked, and all illegal codes and users are eliminated. Reconnect to the main system.

This is an arduous task that consumes time, energy and supplies.

In addition, because there is a backup "time difference" between the backup in Suzaku and the main system, Suzaku can only guarantee to restore the core system to a certain point in time a few days ago. This means that all the work of the entire group for several days has been done in vain, and all employees need to make up for it again.

This workload is also very scary.

There is also a third possibility, that is, the hacker has been dormant for more than a week, and then the most serious situation will be encountered, that is, with the backup of the stream, the hacker will destroy the core The system changes have also been brought to Suzaku, which means that Suzaku has been "contaminated."

Fortunately, Suzaku is physically disconnected from the outside world, so even if the hacker’s backdoor has been brought into Suzaku, he cannot log in through the network. However, such a Suzaku needs to be logged in by Clover first. The group's technical strength is "purified" before being put into use.

Of course, if you directly disconnect all external physical links of the Clover Group's main system and then clean them, the same effect can be achieved.

But the impact would be too great, and no one can guarantee that it was definitely done by external hackers.

What if it’s a mole in the unit?

So until the matter is clarified and the purification plan is formulated, we cannot alert the enemy at all.

Such a terrible thing happened to the Clover Group, which is famous at home and abroad for its information technology. It was really a house ransack.

Previous Details Next