"The virus was eliminated on the way?"

"Yes."

"Don't need users to check and kill themselves?"

"No need."

"Wait... Chen Yu, let me think about it."

This new idea has some impact on Zhou Hongyi's ideology.

Originally, in his idea, if the computer wants to kill virus, it must first download the anti-virus software, then the anti-virus software provides the signature code, and then the user downloads the virus library, and then checks and kills it. This is not only done by 360 anti-virus software, but also by all anti-virus software companies around the world.

But now, Chen Yu's idea completely subverts Zhou Hongyi's understanding.

Users do not need to download the virus library.

Even users don't need to check and kill.

All operations are completed only in the server.

"My God..."

At first, Zhou Hong thought it was incredible and wanted to say it was impossible.

However, he, who is familiar with computers, knows that this is possible in theory.

The Internet not only has the function of communication, but also has the function of processing information and computing.

In the past, a series of killing can only be done locally, but now it doesn't need to be done locally at all. It only needs to be done through the network.

Through the network, the background server already knows whether you are poisoned and whether the virus comes to your computer.

"Chen Yu, can you tell me more?"

There is some confusion in his mind. For the time being, Zhou Hongyi still doesn't understand something.

"To be simple, this is actually similar to anti spam. Our emails receive a lot of spam every day, but in the past, we had no way but to manually delete these spam one by one. But later, someone came up with a way. They marked some spam with certain characteristics when such emails are sent to a certain amount When you're on the Internet, you'll classify him as spam. "

"Trojans and viruses are the same. In fact, they all have the same characteristics. In the past, personal PCs can only kill them manually, and some can't kill them without downloading the virus library. However, if we build big data, we can identify these viruses and kill them at the first time. This is our goal that the virus hasn't started to spread The server killed him. "

"Of course, our servers need super computing power. Without such power, we can't analyze and kill a large amount of viruses and data."

Chen Yu is not an expert on Cloud Antivirus.

He knows that the real realization of this function is not just what he mentioned just now.

This will involve virus identification, massive data analysis, a large number of client feedback, powerful servers, massive financial support, and the opening of the whole system.

However, such a concept is undoubtedly new and the most effective.

Once formed.

In the future, network security can be improved by at least 90%, and even in the future, computers hardly need to consider whether they will be infected with viruses or trojans.

"My grass, Chen Yu, I really want to open your head and see what your brain is made of?"

"Open it and you'll see a big brain."

"Fuck off. Sister yo, I was defeated by you. You, a guy with no technology, came up with such a new idea."

Zhou Hong was extremely excited.

Although what Chen Yu said was not particularly detailed, some even said wrong technically.

But there is no doubt that Zhou Hongyi understood the concept and direction Chen Yu said.

In fact, he has always felt that traditional anti-virus software has a fatal problem.

In the face of a large number of viruses, do you constantly update the virus database every day?

You know, from the existing data analysis, at present, the number of a series of viruses and Trojans in the world has broken tens of millions or even hundreds of millions.

An ordinary computer really can't download so many virus libraries.

Even if it can be downloaded, the computer has to be occupied by so many resources of anti-virus software.

At this time, the cloud antivirus mentioned by Chen Yu opened a new road for Zhou Hongyi.

"Don't talk about this. How can you do it?"

"It's complicated, but OK. But..."

"But what?"

"There are two problems."

"What's the problem?"

"One we need a lot of servers."

"Buy."

"Another is that our bandwidth may not be enough to support our computing."

The most important thing about cloud computing is the network.

Cloud security cannot be achieved without the support of the network.

The higher the network speed, the better the cloud security effect.

However, although the network speed has been improved a lot in 2005, there is still a lot of distance compared with later generations.

"This is also simple. We distribute a series of servers all over the country to achieve the optimal network rate."

"My grass, it will cost a lot of money."

"Nothing."

"But our 360 is free, and we can't make much money in business for the time being."

"It's okay. We still have games."

"What does this have to do with the game?"

"Before, I asked Zou Tao to make an accelerator called Xunyou. Although this accelerator is different from cloud security, it is actually connected in some places. For example, I arranged servers all over the country. At that time, I thought to let this accelerator only be used for our luahlu, but now I'm ready to open it and everyone can use it. Of course, this is a fee."

"How much is this software?"

"Temporarily 10 yuan a month."

"I'm afraid this fund still can't support our Cloud Antivirus."

"This is only temporary. In fact, we can connect other businesses later. For example, some large websites need to set up servers, but the server cost is too high and the operation is complex, so they can't set up them. Then we can help them, and our server can be used as a server for them. In other words, all the data on their websites are calculated by our server 。”

"Eh..."

Zhou Hong's eyes were clear when he said this.

Compared with the previous cloud security, this is only an anti-virus software business.

No matter how strong the anti-virus software business is, it is only a single business and its profitability is not strong.

Moreover, 360 is still free, and they don't have much profit space for the time being.

But at this time, it is a huge business to let cloud computing act as a server for a series of websites.

Don't think this business is just a server rental business for some telecom companies or small network companies.

Some small websites naturally don't have much money, but what about some large websites?

Their demand for servers is enormous.

Like the website of the Ministry of Railways in the previous life 12306.

This website looks like a website for online train tickets, but sometimes it can have billions of data requests a day.

The first reason for such a large website is that it costs too much money to set up its own server. Even renting it is a terrible cost. Second, there is no technology.

Instead, find some cloud service companies.

Alibaba in its previous life undertook the cloud data service of railway websites.

Of course, it's not just.

In the future, with the continuous development of cloud computing, there will be great development in storage, medicine, finance and insurance, e-commerce, search and education.

"Chen Yu, will we still do anti-virus in the future?"

"Look at you."

Chen Yu smiled.

However, he understands that from Zhou Hongyi's perspective, he can certainly see the business of cloud computing in the future, which will definitely explode the current anti-virus.

Maybe, Huanyu technology will have to set up a new department in the future.

This department is cloud computing.

No, it's not called cloud computing, it's called Huanyu cloud.

Huanyuyun... Think about it, Chen Yu is a little excited.

At present, even Google has not put forward the concept of cloud computing.

In the future, cloud computing, cloud services and Huanyu technology will definitely become the masters.

"Well, not to mention these, you are responsible for cloud anti-virus. The strength of Microsoft and a large number of top security giants in the world can not be underestimated."

"Don't worry, we may not be their opponents before Cloud Antivirus comes out, but how can we have dozens of moves with them. After these dozens of moves are over, our Cloud Antivirus will also be pushed out."

"OK."

Chen Yu nodded.

However, he did not relax.

Anti theft and anti-virus has always been a protracted war.

Huanyu technology cannot completely put anti-theft on anti-virus software.

In fact, each major business itself can do a series of operations.

Compared with the security card that Chen Yu asked major game departments to make before.

Now Chen Yu feels that the security card is not enough.

Gamers will use the security card, but some YY account players may not use the security card.

So what about this time?

In fact, there is no way. For example, YY can provide more security and identify users' Internet IP addresses.

As long as the user's Internet IP address is different from the local IP address, YY will prompt the user, and then launch the anti-theft test.

Chen Yu communicated with Li Nan about this idea, and YY and other departments adopted Chen Yu's suggestions for the first time.

……

In the next few days, Chen Yu sat in the office and watched Microsoft's actions all the time.

In fact, Microsoft's action began after they contacted the world's top security companies.

In the first step, they also learn from Huanyu technology.

First, the hacker website offered a large reward for various loopholes in the Huanyu system.

Then hang a series of Trojans and viruses on a series of small film websites.

I have to say, this move is not useless.

When many people download small movies, they still get caught.

However, the number of successful recruits is not large.

This makes Microsoft and major anti-virus software companies a little strange.

These viruses and Trojans have been tested, as long as they are placed on the Huanyu system.

But the reality feedback to them is that the effect is so poor.

Such as Trojan horse program.

Either the Trojan horse has been cleared, or even if it has not been cleared, it seems that the stolen game password is false.

Those cleared will not be studied. It should be the 360 of Huanyu technology that has played a role.

But those that have not been cleared can't steal the account back. What's going on?

At first they couldn't figure it out.

But later, they found a fact that drove them crazy.

"Huanyu secret protection."

This is the security card for the business accounts of all subsidiaries of Huanyu technology.

This security card is mainly provided for online games.

Because online games have a lot of equipment, they are most likely to become the existence of stolen numbers.

So, at that time, in order to reduce the number theft of Huanyu technology online games, they came up with an idea of security card.

There are two kinds of security cards.

One is the security card earned by recharge.

In addition to entering the account password, the user also has to enter the password of another layer of security card.

Logically, the password of this secret card can also be stolen.

But it's impossible.

Because the password of the security card is dynamic.

The prepaid security card has corresponding coordinates, and the coordinates entered each time are different.

This is the primary version.

The more advanced version is the super dynamic password that is changed every 15 seconds.

This advanced version is no longer a recharge gift, but a small electronic instrument officially sold.

The instrument is bound to the user's account. Each time the account is entered, a dynamic password will be randomly generated.

Moreover, the dynamic password will be randomly regenerated into one in 15 minutes.

Can you imagine this heinous anti-theft technology?

Don't say you let their computer in a Trojan horse, even if you win dozens or hundreds of Trojan horses, you can't steal his number.

"Sister, there are such tricks."

"I said how Blizzard lost to Huanyu technology in China. Blizzard is thousands of miles away from this anti-theft means alone."

"Niucha, I have some accounts of Huanyu technology that I can't help."

The "mieyu group" composed of Microsoft and major top network security companies is a little crazy.

They always think that they are the top hackers and computer experts in the world.

Unexpectedly, they can't steal a game account.

This is a red fruit slap in the face.

However, they soon reorganized the flag and drum.

As the elites of the global computer industry, they cannot be defeated by such difficulties.

They calmly thought about the lock and analyzed the disadvantages of Huanyu technology.

They admit that Huanyu technology has indeed used security cards in many online games.

But not everyone and not all players use it.

Especially those who are not game accounts, such as YY accounts, circle accounts... Etc. Although they have little economic value and can't sell much money, they are also annoying if they are stolen. Moreover, it may be heartache for the game account to be stolen. Although they steal some YY accounts, circle accounts do not have much economic value, and ordinary hackers don't want to steal such accounts.

But they don't steal numbers for money. They are to crack down on the Huanyu system.

Once it was reorganized, a series of Trojans appeared.

Unfortunately

This time there are fewer accounts stolen than the last time.

"What's going on?"

"Do these people who play YY use secret protection?"

"Impossible."

The security experts were forced.

Try to log in YY account with the stolen password.

The system prompts that your login address is incorrect from your usual account address. Please complete the anti-theft test and unseal.