Riding the wind of rebirth

Chapter 1856: The House Was Confiscated

Chapter 1856: The House Was Confiscated

"Our system was hacked and someone gained superuser privileges!"

"What?! Which system?! Which level of super user authority?" Zhou Zhi was immediately frightened when he heard this. Clover's security system was certified by Microsoft, and the two parties had in-depth cooperation. Clover actually also acted as a red hacker tester for the Microsoft system and discovered many bugs in the Microsoft Windows system. Clover provided a lot of upgrade packages to Microsoft, and then Microsoft secretly patched the loopholes under the guise of upgrading the system, such as overcoming the Y2K bug.

Of course, Microsoft was also generous in paying the hush money, and Clover also made its anti-virus and firewall software very well. This year, it was selected by Computer News as the most trustworthy firewall software of the year.

As a result, this happened. Zhou Zhi immediately thought of the active masters in the forum. One of them had a very bad criminal record in his previous life: "Could it be those old guns? Oh, and Zhou Xiaopao did it?"

Now, in addition to the four old guns "Qiu Lei Martin", there are several active young guns in the information technology section of the Clover Forum, and Zhou Xiaopao is one of them.

This person was first admitted to South China University of Technology, but because he insisted on studying computer science, he was admitted to the Communications and Computer Reform Class of Xi'an Jiaotong University.

The teaching reform class is like the "key class" in university. Zhou Xiaopao started working part-time during his college years and continued until 92, during which time he developed more than a dozen software and hardware products.

In 93, Zhou Xiaopao and two of his senior brothers developed an anti-virus card and earned more than yuan. Then they became ambitious and decided to do something big and enter the color printing design industry.

As a result, this industry suffered a series of blows, because the color printing design industry needs to use fonts, and the current fonts are all developed based on the Hanwen large character library, which involves legal issues of IP authorization.

Even if Zhou Zhi did not pursue the matter, operating system manufacturers such as Microsoft and Apple that use the Hanwen large font library would require software developers to meet such requirements. This led to Zhou Xiaopao's system being required to pay a licensing fee. However, Zhou Xiaopao expanded his business too quickly and did not prepare the money. Even though he finally received venture capital from AXA Fund, he still couldn't get over the anger.

On the other hand, antivirus cards were also wiped out by Clover antivirus software. This hardware-based antivirus card had many defects such as complicated installation and difficult upgrades. It could not compete with Clover's superior software installation, patches and online virus database upgrades. In the end, Zhou Xiaopao's company collapsed.

This year, Zhou Xiaopao returned to school and admitted his mistake to his tutor, handed in a geographic information system with more than 100,000 lines of code, passed the graduation defense and obtained a master's degree.

Zhou Zhi immediately extended an olive branch and invited him to work at Clover Company as the director of the virus firewall research laboratory, with the same salary as the three little ones.

As it turned out, he had backbone and was unwilling to associate with the "unfair" Clover, so he turned to Founder to develop an Internet email system.

This is simply asking for trouble. Clover's internal email system is now quite mature, and the Internet's email system is also being used very well through bundling with QQ and Windows browser. It is currently in a state of having no competitors and is only waiting to take off with the rise of the domestic Internet wave.

From Zhou Zhi's understanding of Zhou Xiaopao's experience in later generations, it seemed that this system was not successful. After years of ups and downs, Zhou Xiaopao finally founded a new company in 2006 and developed a security guard that could uninstall rogue software for free, which marked a complete turnaround.

Thinking of that powerful person and his abilities, and the fact that he was currently in the situation where "those with bare feet are not afraid of those who wear shoes", Zhou Zhi became suspicious at the first moment.

"It's not him!" Hu Tianyu and Clover Group are certainly not pushovers: "It's a mysterious user who hacked into the forum management portal through the forum, obtained super administrator privileges, and then jumped into the group's LAN through the isolated server. Now he has the highest level of user privileges in the group's office system! The privileges... are the same as yours!"

"Damn it!" Zhou Zhi felt goosebumps all over his body and sweat broke out on his forehead. If he obtained the same permissions as his own internal network users, the Clover Group would be completely transparent to him. "What about our Suzaku? Has it been contaminated?"

  Theoretically speaking, this user now has the same authority as Zhou Zhi, so he only needs to press the Enter key to destroy all systems of the Clover Group!

Of course, this system only exists in theory, because what this person destroyed was only the system that connected the Clover Group to the outside world. But Clover itself also has a very strict backup and disaster recovery system.

In particular, the disaster recovery system was placed at the foot of Longquan Mountain. According to the careful design requirements, even if the Shudu system was completely destroyed by force majeure, the Longquan Mountain Disaster Recovery System would be able to immediately take over all the operations of the Clover Group and operate normally.

This system is completely physically disconnected from the outside world and is a complete "information island". This information island only records the system changes of the Shudu headquarters in the form of streaming backup at a fixed time every week, then drives to the foot of Longquan Mountain and imports them into the system in the form of streaming backup.

This is a very strict physical isolation, the purpose of which is to prevent external intrusion.

This disaster backup system was named "Suzaku" by Zhou Zhi, which means that it can be reborn from the ashes even when it is absolutely necessary.

When Zhou Zhi asked this question, he had already made the worst-case scenario plan, because the core businesses of Clover Group are now too many and too large, and it is unrealistic to integrate all systems into Suzaku. Only the most core and important systems will be included in Suzaku's backup range.

If you have to activate Suzaku, there will be many problems.

Many non-critical subsystems are not included, so these subsystems must continue to be physically isolated from Suzaku until they are cleaned and screened, all loopholes are plugged, and all illegal codes and users are eliminated before they can be reconnected to the main system.

This is a difficult task that consumes time, labor and materials.

In addition, because there is a "time difference" between the backup in Suzaku and the main system, Suzaku can only guarantee to restore the core system to a certain point in time several days ago. This means that the work of the entire group for several days has been in vain and all employees need to make up for it again.

The workload is also terrifying.

There is also a third possibility, that is, the hacker has been lurking for more than a week, then he will encounter the most serious situation, that is, along with the streaming backup, the hacker's changes to the core system will also be brought to Suzaku, that is to say, Suzaku has been "contaminated."

Fortunately, Suzaku is physically disconnected from the outside world, so even if the hacker's backdoor has been brought into Suzaku, he will not be able to log in through the Internet. However, such a Suzaku needs to be "purified" by the technical force of the Clover Group before it can be put into use.

Of course, if you directly disconnect all external physical links of the Clover Group's main system and then clean them, the same effect can be achieved.

But the impact would be too great, and no one can guarantee that it was definitely done by external hackers.

What if it’s a mole in the unit?

Therefore, before the matter is clarified and the purification plan is out, we must not alert the enemy.

Such a terrible thing actually happened to the Clover Group, which is famous both at home and abroad for its information technology, and its property was actually ransacked.


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like