Riding the wind of rebirth
Chapter 1446 Flood washed away the Dragon King Temple
Chapter 1446 Flood washed away the Dragon King Temple
A dongle is an encryption solution that prevents software from being pirated, cracked, and copied.
To develop the software industry in China, the pressure currently faced mainly comes from two aspects.
One is the various intellectual property patent protections established by foreign software giants to prevent imitation. Take a text editor as an example. A simple text box drop-down bar can theoretically be protected by patents. If you use it yourself If you add such a thing to your software, others can sue you.
Another aspect of pressure is extremely rampant piracy.
Software is just like the real thing. To prevent it from being stolen, you have to get a safe for it and lock it up.
The safe is to put a layer of protection program on the software, usually using a packing tool or API encryption mechanism, and the dongle is a door lock. The protected software can only be read through the dongle channel, otherwise it will be copied. It's also a bunch of gibberish.
However, any encryption tool, except for the quantum communication encryption mechanism known as "Schrödinger's cat" in a few decades, is theoretically possible to be cracked.
The software can use disassembly tools to translate the shell and practical code into an assembly language program, and then peel off the shell by studying the code.
This project is very complex and cannot be accomplished by a company of average strength. As an information technology company that relies on software, operating systems, and instruction sets, Clover certainly attaches great importance to software cracking and anti-cracking.
This thing is both a spear and a shield. For example, right now, after Samsung's chip design software arrives, it is immediately sent to Clover's independent laboratory for cracking.
Since the "black box effect" of software development tools is not particularly prominent now, the relationship between compilation and code and source code. Unlike later generations, various advanced development tools were interpreted so hard that even my mother could not recognize them. Therefore, the compiled code was decompiled into "assembly language-level source code" through disassembly and other methods, turning it into something that computer experts can understand. It is an important way to study and learn other people’s R&D ideas and imitate and develop similar technology products.
If the decryption method is to dismantle the cabinet, there is a simpler method, which is to "match the key".
Directly crack the algorithm mechanism of the decryption dog, and then use the program to simulate a "new dongle" to deceive the application to achieve the purpose of free reading. This is equivalent to equipping the safe with another, or even countless keys.
In this way, you only need to sell the source program equipped with this dongle and the fake dongle to customers, and customers can use this "simulated dog" to use this program at will, and the purpose of piracy is achieved.
It is normal in the industry to study other people's software through decompilation engineering. It is like writing an essay. After you understand how others write, you can "translate from Chinese to Chinese", follow other people's ideas, and write in your own language. Publish your own article.
Unless some paragraphs must be copied, of course they will be judged as plagiarism. The so-called intellectual property protection is actually to protect those passages that you can’t get around or avoid except by copying them.
In this case, all you have to do is pay a fee and let the other person agree to use his joke before the patent protection expires.
To put it in a more straightforward way, the Clover Company itself is doing what Xiang Yu is doing now openly, but with completely different purposes.
One is dismantling and researching, and the other is directly cashing out. From a legal perspective, the results are of course different.
"Let me tell you, isn't the purpose of our studies just to learn skills?" Wei Fei said: "Does someone like Xiang Yu have learned skills? With his current level, are there people everywhere he goes? Want him?"
"You want to be a lobbyist for the monk, right?" Zhou Zhi directly exposed Wei Fei's intentions: "The current domestic encryption algorithm itself is not very complicated, and Xiang Yu can't use it for a few years."
"Nowadays, the price of a Chinese card with a full code library is 5,000 yuan. I don't know how many sets Xiang Yu has cracked and how many sets he has sold." Zhou Zhi imagined Xiang Yu's operation method: "Theoretically, it is indeed possible to convert Chinese cards into Chinese characters. Cards and dongles are all converted into software, and then sold by selling hard drives. If Xiang Yu really achieves this level, it will be more than enough to be a software engineer in our company." After speaking, he was a little worried: " But if you really do it to this extent, it may not be a matter of punishment from the school..."
"How exaggerated can it be?" Zhang Lu asked.
"Maybe... it's enough for a sentence." Zhou Zhi said.
"I've finished calling my family. Who do you think is going?" At this time, Zhang Xinyi came back and saw several people with unhappy faces: "What's wrong? Is there something wrong?"
"It's okay. I remembered that I still have a phone call to make tonight. I'm going to call someone back first." Zhou Zhi stood up and said, "Xin Yi, eat something quickly. Why do I see you have lost weight again this time."
Arriving outside the cabin, Jiang Shu was a little surprised to see Zhou Zhi: "Huh? Why did you come out?"
"I'll make a call first." Zhou Zhi was a little worried: "It seems that after going to college, each of my classmates becomes more worried than the other."
After calling Shudu, Hu Tianyu hesitated and said that he seemed to have heard Lao Mai say that there was indeed such a thing in Xi'an, but he couldn't explain it clearly.
If something goes wrong, it's a monster. Zhou Zhi hung up the phone and dialed Mai Mingchuan again.
I finally learned the truth from Lao Mai. This matter was really related to Xiang Yu, but after clarifying the whole story, it was quite dumbfounding.
It can be said that a flood has washed away the Dragon King Temple.
The cause was a magazine owned by Xi'an Changfeng Publishing House. The employee in charge of computer operations learned about the value and market demand of the full-character library Hanka at work, so he had a crooked idea to crack it and then pirate it and sell it for money. .
This employee himself was not good enough, so under the guise of "recruiting", he went to the Computer Department of Xi'an University of Electronic Science and Technology to find someone, brought him back to the unit to study Hanka, and made a promise that this was a job requirement, and if he did it well he would be rewarded a lot. Big benefits.
However, the encryption dog of the full-code font library Hanka was upgraded to the algorithm by Clover Company. The two attempts to recruit people failed, and it was only the third time that Xiang Yu was recruited.
Although Xiang Yu has just finished his freshman year, he has been obsessed with computers since he came into contact with them. He studied programming without sleep and food, and his level improved rapidly.
He originally didn't expect to be able to crack the Hanka dongle, but luckily, a software engineer from Clover Company buried a backdoor program in the dongle for ease of maintenance, and Xiang Yu discovered it.
The design of this backdoor is a bit bizarre. It is a clock reading bypass. If the computer's system time is modified to 00:00, 1900, the engineer can read the dongle on the dongle without knowing the secret key. Readable and writable memory for maintenance.
This trick is indeed very effective in practical applications. The dongle will have a self-checking mechanism on a regular basis. At this time, the system administrator of the unit needs to enter his own secret key and the secondary secret key in the dongle. Only after matching can the Hanka be used again.
But the problem is that many managers of card-using units will forget the secret keys they have entered. At this time, Clover Company needs to send technicians to use the first-level secret key of the dongle maintenance personnel to enter the system and forget the keys used by the users. Erase the secondary secret key and restore the dongle to its original factory state.
(End of this chapter)
You'll Also Like
-
The richest man in the film and television world
Chapter 1589 3 hours ago -
Martin Variety in American Comics
Chapter 487 3 hours ago -
Master: This traitorous disciple is not a Holy Son
Chapter 1092 3 hours ago -
A thousand enlightenments in one night, starting from being a menial apprentice
Chapter 475 3 hours ago -
Invincible Divine Sword
Chapter 2030 3 hours ago -
Family Cultivation: I can catalyze spirit insects
Chapter 186 16 hours ago -
Bloodline World
Chapter 662 17 hours ago -
From Hogwarts to Strixhaven
Chapter 369 17 hours ago -
I changed the timeline with the game
Chapter 1000 18 hours ago -
How can I become the Pirate King if you don’t work hard?
Chapter 130 18 hours ago