Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 243 The most evil software in the history of China

Author: A willow tree in the eternal blue sky

...

Bai Huidong felt inspired by the spring breeze in the chairman's eyes.

He poured himself a sip of wine and continued, "There is a saying in our security circle. Although it is a bit exaggerated, it is not unreasonable: There are only two types of software in the world, one type has been cracked, and the other type does not know that it has been cracked.

was cracked.

No one is perfect, and every software developer may make mistakes during the design process. The defensive routines of the software have been fixed after it is released, but the crackers are people with infinite possibilities. This is just like how difficult it is to solve the problem.

As long as you meet someone who is willing to solve the mystery, it is only a matter of time before it is solved.

In fact, almost all programs can be cracked, only the difficulty and value are measured. If you look at various software from the perspective of assembly language, they are all open source, and every professional software may have loopholes, commonly known as bugs.

This is why every system or software releases a beta version in advance. Bugs are constantly found and fixed in the beta version to reduce the possibility of being cracked.

Therefore, I personally believe that it is not cost-effective for us to get involved in personal software under the current background that consumers’ awareness of genuineness is not yet complete.

The bigger the market, the higher the returns, and the greater our chances of being cracked."

Qing Yun nodded, this statement is very similar to "the bigger the storm, the more expensive the fish".

This is true for those who walk between black and white on the Internet.

The Internet is not a lawless place.

At this time, the user cannot use the interface after cracking it. He just removed the verification system, but when sending data for analysis, the correct data cannot be obtained because there is no correct card password.

But sometimes the light of law cannot shine in certain areas for a while.

After Chen Yue heard this, he was immediately shocked and his whole body stiffened and he leaned back to show his respect.

I personally think that since the revenue ceiling of this software is so high, it is worth investing heavily in security."

Emperor Yun patted Fang Yuan on the shoulder, "Xiao Fang, your idea is very good, very foreseeable and forward-looking."

If a software wants to avoid being cracked, it needs to solve these security issues as much as possible during the development stage to effectively prevent and reduce software vulnerabilities. After all, there is no perfect software, only software that needs to be continuously improved. This is a protracted battle.

Under the encouraging looks of Qin Manman's three daughters, Fang Yuan became more and more excited as he talked, and took another sip of beer.

“It is true that there is no strongest shield, nor the sharpest spear, there are only spears that keep pace with the times, and shields that keep pace with the times.

The former is illegal, and many hackers now dare not do it. The latter infringes on our copyright, and we can use legal weapons to protect our rights and interests.

It was Fangyuan who spoke.

Damn it, no one can beat it!

Emperor Yun believed that Bai Huidong... was not only very market-savvy!

You also understand my thoughts very well!

Add chicken legs! Must add chicken legs!

Only by being so logical and well-founded can we defeat that woman’s plan to indirectly regain financial power!

Chairman, Dean Qin, when I conceived this software, I even thought of a name, so I called it ‘Guan Jiapo’!”

The security of software is his job and is closely related to his income.

Bai Huidong blinked, he decided to give up escorting.

For example, to make a data statistics, the client program sends the data to the server. When sending, it is accompanied by a card secret or token for verification, and the server performs a parsing operation and returns the address.

Cracking and anti-cracking have always been a process of competition. Crackers often succeed if they specialize in one point.

So if we can’t find the key problem in the key link of the key issue, the key field, and we don’t grasp the key point, are we saying that we can’t solve the key problem and can’t find the key problem?

Xiaofang, are you right?"

She knew by looking at her smelly brother's appearance that he was ready to take action.

Then we have to face an embarrassing fact. If we cannot find the key problem and cannot solve the key problem, then we will go back to the old path of TOP.

Especially in highly professional fields.

"Brother Bai, I don't think that's the case. We can't stop eating because of choking!"

Hearing the chairman's praise, Fangyuan's excited expression made Qin Manman next to him twitch the corner of his mouth.

Fangyuan didn't see the murderous eyes all around.

Qin Manman was stunned. She had never seen such a shameless villain!

As for Tang Qianying, whose mouth was open, her fist was almost stuffed into her mouth.

But she also wanted to see how this bad guy came back.

In this way, if a cracker wants to crack, he must either break into our server, or he must rewrite the entire program to accommodate the local storage of data.

This game is against the wind.

All the men listened with ashen faces.

We can actually use this software for network server verification, and we can even store some of the user's data on the server we provide.

From the eyes of the three women present, they understood that the most evil software in the history of China was about to be born.

Seeing that his boss affirmed his thoughts so gently, he wanted to express his loyalty with all his heart and soul, and immediately refuted it on the spot,

"That's what I think about the problem that the software may be cracked. With the decline in network tariffs, Adsl networks are now very popular in urban households.

When Emperor Yun saw this, his neck twitched.

All it took was an Aced! The team was wiped out!

But Emperor Yun decided to struggle. He wanted to fight against the wind and defend the high ground against the wind.

In this way, this software is separated from the offline closed environment, and the difficulty of cracking will be greatly improved.

After Emperor Yun gave him the affirmation of being a handsome man, he changed the topic and said, "But our main strategy now is to return to our main business. The top priority is to find the key problem. So what is the key problem? Think about it carefully.

.

Of course, with this approach, we can make an argument that data stored on the server is more secure and cannot be easily tampered with.

If the user requests too many times, we can limit the number of requests. If it is too troublesome, we can use the CDN dynamic acceleration function.

But I think the benefits are worth ignoring the costs.

Should we find the key to the problem?

If a user wants to crack your program, they can only buy a card code and then call your interface directly. We allow this situation. After all, the user who bought the card code is a normal user.

Her father, who had climbed to the position of chief officer of a game, could not even say such nonsense.

Zhou Yan and others' eyes lit up.

It seems that the new boss’s rank is a bit high!

Having been in the workplace for a long time, everyone actually knows that no matter what, the boss will cheat. This is a kind of ability.

Especially in China, the boss's ability to deceive is the core competitiveness of an enterprise.
Chapter completed!
Prev Index    Favorite Next