Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 214

: Future generations plant trees and predecessors enjoy the shade

As the saying goes, those who came before us planted trees, and those who came after us will enjoy the shade.

When it comes to Lin Hui, it's the other way around.

Later generations planted trees, and predecessors enjoyed the shade.

Why do you say that?

Because some of the results that people produced only a few years ago in the past life.

In this time and space, forest dust can be transported almost unscrupulously.

Although Lin Hui knew that this kind of moving behavior was somewhat inappropriate.

But as the saying goes, if you have too many lice, don’t bite them, and if you have too many debts, don’t worry.

Lin Hui is now a dead pig and is not afraid of boiling water.

As long as the corresponding technology has sufficient value and the technical logic makes sense, there will be no risk of collision with others.

The forest ash will be transported diligently.

Such detection technology uses mobile phone virus/virus databases to detect mobile phone viruses/viruses.

Although using this technology cannot solve all mobile security problems faced by mobile terminals once and for all.

However, Lin Hui feels that it is quite valuable to use the technology of mobile phone virus/virus databases in previous lives and the following years to apply mobile phone virus/virus databases to detect mobile phone viruses/viruses in 2014.

Even though mobile phone viruses/viruses are constantly emerging, this technology will eliminate the need to worry about most possible mobile phone virus/virus threats within two years.

Of course, the mobile phone viruses/viruses mentioned here refer to conventional mobile phone viruses/viruses.

For some mobile malicious attacks with special nature, this technology may also be GG.

For example, if various underlying protocols are used to carry out attacks.

This technology to intercept cell phone viruses is likely to be useless.

For example, Lin Hui pointed out the time regression vulnerability in the iOS8beta version before:

If a hacker knows the characteristics of the time regression vulnerability in advance.

So for hackers, it is completely possible to attack iOS devices connected to the public network.

By artificially sending malicious network time protocol attacks to these devices, the iOS system time is calibrated to UTC 0.

Then the attacked device will be affected by this bug and cannot use the device after restarting the device.

The attack here takes advantage of the underlying protocol-Network Time Protocol.

When an iOS device is connected to a public network, the iOS system will use the Network Time Protocol service to calibrate the time zone and time.

The protocol this process relies on is the Network Time Protocol.

Network Time Protocol is one of the oldest network transmission protocols.

Its purpose is to transmit the time of precise timing devices such as atomic clocks to every networked device through the network, thereby providing the most accurate time synchronization capability.

Even the Network Time Protocol protocol itself has taken into account the possibility of tampering with time.

However, for a long time, network attacks using Network Time Protocol as the entry point have been common.

It can be said that it is difficult to prevent malicious attacks on mobile devices using the Network Time Protocol.

Even if it uses the patented technology that Lin Hui mentioned in his previous life, it will be difficult to prevent such malicious attacks.

Because this type of attack is mainly initiated deliberately by people.

The technology Lin Hui is now interested in is not very good at handling malicious attacks.

Since the previous technology of using mobile phone virus/virus library scanning to prevent mobile phone viruses/viruses cannot prevent malicious attacks.

But as long as this technology can deal with existing mobile phone viruses/viruses, it is enough for Lin Hui to highly recommend this technology.

Because you need to understand the difference between mobile phone viruses/viruses and malicious attacks.

Usually mobile phone viruses/viruses are scattered in all dark corners of the Internet. The distinctive feature of attacks presented by mobile phone viruses/viruses is "indiscriminate attacks."

From this perspective, mobile phone virus/virus attacks are somewhat similar to stray bullets on the battlefield.

Malicious attacks are "fixed-point scalpel attacks."

A bit like the bullets fired by a sniper on the battlefield.

The helmets worn by soldiers can hardly withstand the bullets fired by snipers.

But that doesn't mean the helmet has no effect.

On the contrary, the helmet is very effective.

Because the steel helmet can effectively avoid the losses caused to soldiers by stray bullets on the battlefield.

The technology that Lin Hui admired in his previous life was somewhat similar to the role of steel helmets on the battlefield.

Although this technology is not very useful for targeted scalpel-style malicious attacks.

But it is enough to deal with mobile phone viruses/viruses scattered in the dark corners of the Internet.

You know, ordinary users’ mobile devices almost never encounter targeted scalpel-style malicious attacks from hackers.

On the contrary, they are often troubled by indiscriminate attacks.

In this case, the technique of transporting forest ash is naturally very useful.

In short, Lin Hui believes that the value of this technology from his previous life is high enough.

And because the people who developed this technology in the previous life basically did not encrypt all the technical data of this technology.

It would be easy for Lin Hui to move it.

After all, there are a lot of ready-made application materials.

Despite this, Lin Hui did not act too hastily.

You know, it was not long ago that Lin Hui applied for some patents related to Nanfeng APP.

Now I have applied for some patents whose scope is almost completely different from the scope of the previously applied patents.

It is easy to cause unnecessary trouble.

In short, Lin Hui thinks it would be better to pursue patents related to mobile phone security after a while.



Mention the aspect of mobile phone security.

Lin Hui remembered several security vulnerabilities he submitted to Apple's bug bounty program a few days ago.

I don’t know if the previously submitted vulnerabilities have been adopted.

With Lin Hui's current wealth, he doesn't really care about the millions of dollars in reward for submitting bugs.

What Lin Hui cares about is the B.T.C. that is worth the same amount as these U.S. dollars.

After all, the former has little room for appreciation, while the latter is a huge profit.

Generally speaking, the ways to obtain B.T.C are the following:

——Buy, mine, earn.

Neither purchasing nor digging is suitable for forest ash.

Especially not suitable for Lin Hui, who is now worth billions.

You are already worth hundreds of millions, why are you still digging for it?

Maybe we can develop some pumping algorithm to draw a commission.

But there seems to be no need to dig it yourself, it’s shabby.

As for purchasing, the efficiency is too low.

And it’s easy to argue with the seller.

Anyway, Lin Hui thinks that the more suitable way for him to obtain coins is to earn them.

Submitting bugs is an excellent opportunity for Lin Hui to earn B.T.C.



Lin Hui couldn't wait to see the progress after the vulnerability was submitted not long ago.

Even though you can’t wait, you still need to take the necessary steps.

Lin Hui has taken a series of safety measures.

Including but not limited to using a new login device, connecting to a new proxy IP, changing the network environment, etc.

Although it's a bit troublesome, it's better to be careful.

This so-called vulnerability submission website is still very different from the regular official website.

This platform for security personnel to communicate with each other is very similar to a hacker/hacker forum.

It would be bad if you accidentally hit the road.

After all, Lin Hui is now carrying a shocking secret.

It's not that Lin Hui is making a fuss out of a molehill.

The fact is that even GitHub, a seemingly harmless website.

If you rashly download some open source code without knowing its specific purpose and then run it, it is easy to cause security problems.

Technology has been a double-edged sword from the day it came out.

All in all, it's better to be careful.
Chapter completed!
Prev Index    Favorite Next