This demonstrates their network of connections.
Of course, Alcatel, Philips, and Ericsson in Europe still supported Xing Baohua and agreed to the alliance, not to mention IBM and Motorola.
With these companies leading the way, other hardware companies could only nod in agreement. A small number of companies, however, did not want to join but wanted to purchase the integrated firewall.
That's possible. The Security Alliance was founded to sell firewalls. Regardless of your client type, if you buy, they'll sell to you. They can only ensure your company's protection; if you're attacked, they'll provide related services.
Thus, Shield Network Security Company was established, headquartered in the United States. It attracted numerous hardware manufacturers as partners.
The CEO is still Uncle Qiao. Furthermore, Xing Baohua also persuaded Gates to bundle Aegis protection with Microsoft systems for sale.
Furthermore, IBM and Xiaomi computers will be sold pre-installed with these systems. Microsoft will pay a licensing fee and security fee for each unit shipped. If the bundled system is used on other brands of computers, how much licensing fee will be required for security?
Almost all of them involve overlapping interests.
At that time, Microsoft was not very powerful, and there were many other systems and threats in the market. This kind of bundled sales allowed them to quickly capture the market.
For machines running other operating systems to have a security system installed, a Microsoft operating system must be installed.
Because Shield Security only supports Microsoft systems, this is one of the benefits of the alliance.
Moreover, using Microsoft has a huge advantage: regardless of the brand of computer, as long as it uses a Microsoft system, it must install Shield Security in accordance with the bundling agreement.
Microsoft not only makes money from operating systems, but also from security software, since it is one of the shareholders.
Actually, there's a huge secret here, which no one has mentioned, and everyone's tacitly agreeing on it. Once a security system is installed, virtually no computer in the world has any secrets.
As long as the hacker doesn't do anything destructive, the security system can trace the hacker's location quickly based on the protocol.
Of course, these confidential things cannot be made public, otherwise many people will jump out and shout that there is no right to privacy, etc.
It's no use shouting; the right to privacy has long been gone.
Major security companies already have their customers' computer data, and they can access it anytime they want.
You are even less likely to know what he saw in you.
Unless you have solid evidence, you're nothing. All you can do is make a few noises, but they can't hear or see them, and it won't hurt them in the slightest.
Besides, this resolution aligns with the interests of the United States; they've long wanted to establish a regulatory system, but the cost has been prohibitively high. Just as I was about to go to sleep, Xing Baohua brought me a pillow—not bad.
Despite Xing Baohua being Chinese, a shareholder, and an initiator, he doesn't actually have the authority to manage the company. This makes things easier to negotiate: it's fine for a shareholder to make money, but it's not acceptable for them to control the core technology.
What if we need to monitor the data of important institutions in the United States?
This is why Xing Baohua brought in many European and American companies to act as a protective umbrella and cover for him.
technology?
He provided all the tools; he had already mastered what he needed to. The scanning and tracking tools he contributed were for use in ambushes.
You should know that he himself is a hacker! He's even more despicable than those hackers who steal funds.
Others steal data and money without damaging the hardware, but he must destroy everything to leave a trace.
Xing Baohua left himself a way out: he could use security routes to directly hack into all computers with security software installed, and he could also use security scan traces to retreat.
Even if staff check, they will only assume it's a normal scan of the hard drive and registry by the security software.
This effectively concealed the traces of Xing Baohua's intrusion.
The meeting concluded successfully, and a celebratory reception will be held in the evening to allow all the partners to strengthen their bonds.
The dance partners hired by the event planning company were all dressed up and looked quite flamboyant; I don't know where they came from.
Tall and slender.
They walk mostly in a straight line.
These big shots didn't seem very interested in these girls. They had their own planes, so after finishing their meals and dealing with the girls, they all rushed back home.
Those who were still squeezing onto the flight also wanted to go home and rest as soon as possible, since flying is tiring too.
Xing Baohua didn't get home until midnight. His pager was full of messages, but he was too busy to check them.
I opened it and glanced at it; they were all congratulatory messages from familiar friends.
The next day, Xing Baohua went to the software park to select several supervisors to work under Uncle Qiao in Da Meizi Country.
They will use the tools written by Xing Baohua as a basis to expand and update the version. Of course, the source code will be copied back and put into the software park for backup.
It was ostensibly for backup research, but it was mainly for Xing Baohua to see, to prevent him from being unaware of any updates and being mistakenly harmed.
Now, Xing Baohua has time to focus on tracking down the hackers who stole his money.
Although the "waiting for the rabbit to run into the tree stump" plan has identified several IP addresses, it is still uncertain whether the other party is the one who stole his money.
We need to identify the source and recover his funds.
Kazuo Fujiwara never imagined that his computer was being remotely monitored.
Every letter and every piece of code he types on his computer is continuously sent to a certain email address.
After the HK security meeting concluded, he learned from the media about the significance of this security measure, which meant that people would have to be extra careful if they wanted to hack into other people's computers in the future.
This guy seems very confident in his abilities, especially his unique hidden IP technique, which is like an ancient ninja hiding in the shadows, waiting for the right moment to unleash a deadly attack.
He used his computer to launch a hidden virus, but after activation, there was no response, which puzzled him. He then used a method of hiding his IP address to access the food delivery company's server and found his compressed file.
This chapter is not finished yet. Please click on the next page to continue reading the exciting content!
Continue read on readnovelmtl.com