Light Novel Pub

Chapter 141: Vicious means

Chapter 141 Vicious means

UC's technical department has sent all relevant information about the Opportunity Browser to its affiliated company in Thailand.

Although this is not the first time UC has done this.

But after all, people are always guilty.

Therefore, the senior management of UC, including Ke Xiaopeng, were very nervous.

Ke Xiaopeng asked Wu Xiaodong, "How are the preparations in Thailand?"

Wu Xiaodong has been in contact with the affiliated companies in Thailand.

He said to Ke Xiaopeng with certainty: "It's ready over there."

"Jiyue Company is just a newly established company."

"From the accurate intelligence we have, there is only one person in the entire company, Lu Shan."

Moreover, Thailand has already attempted to invade the server of Jiyue Browser.

“It feels quite relaxing.”

Ke Xiaopeng thought about it and realized that this was the truth.

Jiyue has just been established.

Lu Shan is also a layman and does not come from a formal computer background.

He came up with the logical algorithm for the most powerful browser because he was good at math, not because he was good at computers.

It is reasonable that the relevant servers are full of loopholes.

Ke Xiaopeng finally told Wu Xiaodong, "I won't say more."

"You need to pay attention to three points here."

"The first point is that this matter has nothing to do with our UC. You must wipe out any traces of the connection between UC and Thailand."

"As for the second point, we should either not do it or do it thoroughly."

"Third, we need to write enough articles. We need to focus on topics related to Jiyue Browser's illegal use of user privacy, as well as opportunities, such as browsers being unsafe and unstable to use."

There were only Ke Xiaopeng and Wu Xiaodong in the office.

Even Liu Ye, who had always been favored by Ke Xiaopeng, was not there.

This was actually a secret conversation between two people.

After saying this, Ke Xiaopeng asked Wu Xiaodong to go about his business.

He himself lay on the sofa with his eyes closed.

Ke Xiaopeng had no choice but to take this step.

But he had nowhere to go.

If Uc wants to survive, it must obtain the third round of financing.

Without the third round of financing, UC’s funding chain would be broken immediately.

Then all of Ke Xiaopeng’s efforts over the past few years would be in vain, and he would be left with a lot of debt.

Ke Xiaopeng was also very helpless.

He never thought of it again.

Jiyue Technology, a company with only one employee, has pushed UC to this point.

Ke Xiaopeng thought of a very classic saying in the business world.

You never know who your opponent is.

Wu Xiaodong did not stay in the company.

Instead, he returned to a shell company.

Instructions were issued to the white glove company in Thailand through encrypted means.

At the same time, Uc's public relations department also greeted the media that had already been contacted.

In the future, relevant media will pay close attention to news about mobile Internet-related applications forcibly collecting and exploiting user privacy.

At the same time, we will also pay attention to the stability of applications and user experience in the tide of mobile Internet.

Late at night three days later.

Lu Shan fell asleep early in the suite in his company's office.

During this period, Turing was given more time to study.

As long as Lu Shan does not overdraw his energy, he will always be in the Singularity Laboratory.

Turing's further progress is also very fast.

A genius is indeed a genius.

Turing has now mastered the common computer application programming software on the market.

Of course, Turing's main role lies in top-level design, that is, logical design, not in specific applications.

The reason why he was willing to learn some programming content from scratch and also achieved mastery.

I also hope to understand from the basics how the Internet and computer world are constructed today.

In the laboratory, Turing said something to Lu Shan.

He believes that the current computer and Internet world is still made up of 0s and 1s.

Although the specific technology has made a fundamental leap, its top-level logic and thinking still have not surpassed Turing's original settings for computers.

because of this.

That is why Turing absorbed knowledge so quickly and believed that true artificial intelligence would no longer be born in a binary-based computer world.

Turing was actually a little disappointed about what the world would be like 50 years later.

Because in the 40s and 50s, he had predicted what the world would be like after the millennium.

At least true artificial intelligence has been born.

Computers will bring great convenience to human life.

It is obvious that the world in 2008 is very different from what Turing originally expected.

After Lu Shan left the Singularity Laboratory, he felt completely exhausted.

If I keep sleeping in the school dormitory, I will definitely be affected by those excited roommates and won't be able to sleep well.

That's why I chose to rest in the company's suite.

And at this moment, in the company's computer room.

After working all day, Zheng Kaige is going to shut down his computer and go back to school to rest. He has classes tomorrow morning. After working at Jiyue Company these two days, Zheng Kaige is refreshed.

He likes the work.

The intensity of the work is not too high.

Of course, the most important point is that the money earned here is several times the total of what I earned from several previous jobs.

This allows Zheng Kaige to have enough energy to complete his studies.

Eat other people's salary and share their worries.

Zheng Kaige is also very down-to-earth in doing things. He does not just complete the company's daily work every day and then call it a day.

The company's rule is to get off work at 6:00, but Zheng Kaige still stayed until 12 o'clock in the middle of the night.

He used his professional knowledge to sort out in detail some of the technical problems that Jiyue Company currently faced.

The algorithm of Jiyue Browser is indeed very powerful, and with the added bonus of Warwick servers, there is absolutely no problem in running it.

However, perhaps due to lack of knowledge or lack of careful consideration, Lu Shan had some shortcomings in the security of the browser server.

Just basic safety precautions.

For example, only basic physical security and system security configuration were performed.

Basic physical security is to install anti-theft doors, air conditioners and basic cameras in the server room.

The system security configuration is just a basic firewall.

These security configurations should be enough for ordinary application software. After all, no one will target you for no reason.

But Zheng Kaige believes that this security configuration is not enough for Jiyue Browser.

There will be more and more users of Jiyue Browser, and there will be more and more competitors.

There is no guarantee that you will always be safe, nor can there be any guarantee that others will not target you.

Competition in the Internet world also follows the law of the jungle.

Or you become strong enough to eat others.

Or you will be eaten by others.

Of course Lu Shan had considered this problem, so he spent a huge amount of money to upgrade the firewall a few days ago.

But Zheng Kaige thinks this upgrade is still not enough.

These days, Zheng Kaige has been working overtime until one or two in the morning, which is a problem of excessive minutes.

Upgrade security software and hardware.

Zheng Kaige definitely cannot solve these problems alone.

For example, asking Zheng Kaige to design a perfect fire-proof software is definitely not possible.

Lu Shan has to step forward.

Or form a team and develop it yourself.

Or spend money to buy it.

After saving the list of questions, Zheng Kaige first sent an email to Lu Shan, then turned off the computer and returned to school to rest.

These problems cannot be solved in a short period of time.

Something Zheng Kaige didn't expect.

Just as he left the computer room.

At 12:30 in the morning, an Internet company in Thailand directly hacked into the server of Jiyue Browser.

Although the server firewall of Jiyue Browser did work.

But within a few minutes they surrendered.

This company is extremely malicious and has very strong technical capabilities.

First of all, he was able to prevent Jiyue Company from finding his specific IP address. They only knew that the attack was launched from abroad, and from multiple countries.

Which IP address is it? We cannot analyze it with our current technology.

Second.

This company has adopted a very vicious method.

If the attack on Jiyue's servers makes Jiyue hacked and users cannot access it, then forget it.

But this time the hacker attack not only allows users to continue accessing the Jiyue browser.

The most important thing is to replace the content of the server.

The replacements are related content from pornographic websites in the United States, Thailand, Europe and other countries.

The purpose of this is two-fold.

The first one is to ruin the reputation of Jiyue Browser.

Make users think that Jiyue Browser is not a regular browser.

It is a browser that is associated with many negative words such as pornography, viruses, etc.

When users are unable to use the Jiyue browser normally and cannot read news or information, and can only see some obscene and pornographic content, they will think about using a practical alternative browser.

There are neither too many nor too few Internet manufacturers making browsers in the entire market.

Besides Jiyue, UC is the only one that provides good user experience.

This will cause users who have used or heard of UC to once again jump from Extreme Browser to UC, increasing the number of new users and daily active users of UC.

The purpose is to completely kill the Jiyue browser.

If the hacker attack only shut down the server of Jiyue Browser.

Then Jiyue Browser can find various excuses to explain it, such as server maintenance, etc.

After the server returns to normal, we will still be able to provide users with corresponding consulting services.

Users will not uninstall the Extreme Browser, and this practice has limited impact on browser-based systems.

On the contrary, if these unhealthy contents are pushed to browser-based platforms, the relevant departments will definitely take measures.

Even if the relevant departments may speculate that Jiyue Browser has been attacked from abroad, in order to ensure the safety of users and maintain social stability, Jiyue Browser will be forcibly removed from the shelves.

Even if the server of Jiyue Browser returns to normal later.

Relevant departments and users will also be extremely cautious.

Even if the Jiyue browser is seriously damaged, it will not form a competitive relationship with UC.

The time point of 12:30 in the morning is very clever, as it is a period of time with a relatively large number of users, and it is also the time when the staff get off work.

This time, everyone was shocked!

Wow! Thanks to "book friend 20230228073058432" for the reward of 50000 Qidian coins, and thank you all for your monthly tickets! !



(End of this chapter)

Loading...