Rebirth Online Entertainment

Chapter 448: Account Stealing Brother, Come Steal My Account!

Chapter [-]: Brother Stealing Account, Come Steal My Account!

"Everyone, I believe everyone knows, what is the purpose of this meeting?"

Once again Tang Dynasty company headquarters. 【

Aishang Reading Network]

However, this time, Chen Jia only summoned Zhao Danyang and Gu Xiaoyu.

Gu Xiaoyu is in charge of the Tang Dynasty Internet.

Its main products include Zhu Xian ol, Piao Miao Journey, Fantasy Westward Journey, Westward Journey, and the upcoming World of Warcraft, nf, it can be said that it controls most of the domestic game players.For such a game company, it is naturally necessary to do a good job in account security.Originally, this time, Chen Jiayi was going to call Chen Tianqiao over.It's just that Chen Tianqiao is in Shanghai, so he can think about it later, the headquarters will hold a meeting first, and then the specific plan will be finalized.

And Zhao Danyang, because Zhao Danyang is in charge of Tang Dynasty Information, his main product is instant messaging.Although instant messaging is not the main object of the theft, there are some low-level rookie hackers who often use stealing other people's tt accounts as a manifestation of technology.This also made a lot of people wait and lost their communication accounts.Even, because of the instant messaging account, he has a lot of business contacts.Including many friends, if lost, the consequences will be even worse than losing the game account.

Often a tt account is lost, it is estimated that for most people, I am afraid that it will be crazy.It's not just money, it's all the friends I've made over the years.However, if it is lost like this, it is estimated that they will lose the fun of surfing the Internet.After all, at the end of the day, most internet nerds like to chat with familiar people.It is really difficult for him to add some strangers he does not know.

So, Zhao Danyang, this time, Chen Jiayi also called him over.

"For account security, what suggestions do you two have?"

Both of them are bosses of Internet companies and often deal with the Internet.Account theft, I am afraid they know better than anyone else.Chen Jia wanted to hear what strategy they had.

"Mr. Chen, regarding instant messaging, at present, we may not be able to fundamentally solve the problem of account theft."

At this time, Zhao Danyang said.

It's not that the online game company is not safe, but that a lot of people, for example, have been infected with Trojan horses through some improper operations, such as entering h station and downloading a lot of viruses.There are also some that accept unknown files from strangers... These are all likely to be infected with Trojan horses, thereby allowing accounts to be stolen.But many people, they don't know the danger of doing so.

Even now, most people still use the Internet.And we know that the network, he is a local area network.In the local area network, it is easier for him to steal other people's passwords.For example, there are some novice hackers, they will make a keylogging software.When the user enters the account number in the account number input box, then this software will record it.

In this way, it is easy to steal other people's accounts.

This is why, in later generations, it is so dangerous to surf the Internet.Maybe, if you are not careful, your things, especially valuable things, will be stolen by others.Moreover, there are a lot of people who are engaged in stealing from others.Some are just for fun, some are for testing technology, and some are purely for making money.

But no matter what, such a thing cannot be attacked at all, and it is difficult to prevent it.For ordinary users, they have nothing to guard against, so, account passwords are easily stolen.The man who was on Pengfei.com just now, most likely, was hit by software such as keyloggers, and his account password was stolen.

Even if they pass the binding, in the end, the game characters are empty.What kind of money, equipment, maybe even the elementary wooden sticks on his body, leaving only a gun that cannot be thrown away, it is really miserable.Even, later generations still have a picture, in which a lot of newcomer characters are created, while the own characters are deleted.On it, write a few words for each character, what, tell you not to play games, but you still play games, if you don’t listen, I will steal your number.The last player character who left a message is -se-, also known as Brother Daoliu.

Although many people laughed out loud after seeing this picture.But, who knows, the seriousness of this hacking.If this matter is placed in front of your eyes, I am afraid you will not be able to laugh.What's more, this large number of account hackers are seriously infringing on the user safety of Tang Chao Company.

As a large company, the safety of users is naturally the top priority of Tang Dynasty Company.However, Zhao Danyang and Gu Xiaoyu were also very helpless.These hacking methods are not necessarily clever.But it works, and they can't stop it at all.Even, because it involves high-tech crime, it is difficult to catch.

For example, there is a rookie hacker who opens a computer on the Internet, and then implants a hacking software on the computer.Let me ask, how many of these methods can be noticed.Of course, some people have said it.The Internet can prohibit others from downloading, but if downloading is prohibited, it is estimated that there will not be many people playing on this Internet.

"However, we can do more to recover the account password."

At this moment, Zhao Danyang continued.

"Danyang, these are root symptoms rather than root causes."

Chen Jiayi shook his head.

It's good to say that instant messaging, most people steal, and won't be idle, and delete a lot of your characters.At most, see if you have tt coins.Moreover, it is easy to find it back.Through various settings, for example, you can also provide the qq numbers of ten friends, and even some password protections can be retrieved.However, as an online game, he can't.

In online games, the key is not the account, but the equipment and money in the account.If I stole your number, you will get it back.But I, too, will take all your things and sell them.

"Xiao Yu, do you have a better way?"

"This, Mr. Chen..."

Gu Xiaoyu slowed down, and then said, "For account hacking incidents, the Tang Dynasty network is the most damaged. Moreover, this incident of account hacking did not happen just now. We have also developed many security measures for this. For example, with What Mr. Zhao said about password protection... But this is a temporary solution, not the root cause, and cannot solve the problem of account theft."

In fact, the problem of account theft has always been difficult for online games to solve.Even if later generations of online games develop to a very high level, this incident cannot be resolved.Recently, if it weren't for the Cloud Security Alliance website created by Tang Dynasty Antivirus, maybe there would be more stolen accounts.

"Currently, we are considering whether to bind game equipment and the like."

At this time, Gu Xiaoyu continued.

"Binding?"

This binding is actually easy to understand.That is to give binding to important items and equipment.In later generations, Nine Tours acted as an agent of the Immortal Sword series. For the sake of account security, he adopted a series of equipment and bound them.Thus, others even steal his account.For some important things, you can't take them away.

"No."

Although this measure can effectively prevent theft.However, Chen Jiayi directly denied it.

Because he knows that a popular game lies in its openness.Just like Zhuxian ol, his community-sex.All equipment, as well as money, need to be circulated, and in this way, he has his community-ness.If it is bound, how does the commodity circulate and how does the money circulate?If it goes on for a long time, no matter how good the game is, it will come to an end.

To prevent account hacking at the expense of game quality, Chen Jiayi would never agree.

"That……"

Hearing Chen Jiayi's direct denial, Gu Xiaoyu also understood.

In fact, this method was just a random idea on his mind.Ask her to practice, she will not.You know, for the understanding of the game, this boss who stays on the front line every day.In some places, Chen Jiayi understands the characteristics of the game better than Chen Jiayi.Of course, she knows exactly what kind of damage bound items will do to the game.

"Let's analyze it, what is the main manifestation of account hacking now?"

Chen Jiayi also thought of a particularly good solution for the time being, but his understanding of the Internet is unique.Many things, even if there is no way for the time being.But after thinking about it, I can still think of an excellent solution.

"Now the most important manifestations of account theft are online account theft and computer poisoning and theft."

It should be these two.

In this world, no hacker has personally invaded your computer just to ask for your game account.If you come across it, then you can only consider yourself unlucky.For such special cases, Chen Jia has always looked directly at them.Moreover, there are basically no such examples.Those powerful hackers would never do such a painful thing.

"Net, net."

Now there are not as many personal computers as there are in later generations, and most gamers are only concentrated in the Internet.Naturally, account hacking on the Internet has become the first place where account hacking is concentrated.

"By the way, if we can't solve this problem of account theft through software technology, can we use other methods. For example, prevent theft through hardware."

Suddenly, a thought appeared before Chen Jiayi's eyes.

Just like when many software technology methods solve problems, it can be done through the Internet.However, if the Internet law solves the problem, whether it can be solved by hardware.

"hardware?"

Several people did not understand.

"Yes, it's the hardware."

Thinking of this, Chen Jiayi's thoughts suddenly became clear.Everything that I hadn't thought of before suddenly appeared.There are a lot of ways to deal with account hacking in later generations, but they come one after another.

"If we adopt the hardware encryption method, won't the account hacking problem be solved?"

This hardware reminded Chen Jiayi of the hardware security cards of later generations.

The so-called secret security card is to give a dynamic second password.After inputting the account password, a dynamic password must be input to enter the game.The dynamic password is also concentrated in the secret security card.This secret security card is displayed horizontally and vertically through the coordinates. Every time you log in, you can use a different password.In this way, even if someone can steal your account password, it is impossible to steal your second password, which is the password in the security card.

While recalling the secret security card, Chen Jiayi explained the secret security card to the two of them one by one.

Until now, Zhao Danyang and Gu Xiaoyu suddenly realized.

"Unexpectedly, through a small secret security card, the game account can be prevented from being stolen."

They are all masters of the Internet, and as soon as Chen Jia finished speaking, they already understood.

They have even thought of specific implementation methods for the secret security card that Chen Jiayi mentioned.For example, such a secret security card can be bound to the point card.As long as the player purchases 50 game point cards, a secret security card will be given randomly on the back.Therefore, on the game account, it is in case of loss.

Of course, there are still some electronic security cards in later generations.

For this security card, NetEase has a product called General Order.Through the random password issued in the general order, and then get his second password.However, this general order requires cost to make.Moreover, it is not the best solution to require players to purchase.What Chen Jiayi was quite satisfied with was to create a second password behind the point card.

"However, this can only protect virtual online game products. It is of no benefit to Tang Dynasty information."

Chen Jiayi muttered to himself.But he knew that no one would buy a tt password card, which was a troublesome thing.

"By the way, is there any security management software on the Internet now?"

At this time, Chen Jiayi suddenly asked.

"Network security management software?"

"Isn't there our Tang Dynasty antivirus and Tang Dynasty guards?"

For the Internet, they also use anti-virus software, but these are only on the host.Other extensions are generally not used.Because this greatly affects the speed of the computer.However, in this way, there is also a very big hidden danger for the extension.

"No, it's just personal security software."

Although personal security software can also be used by network users, it is of no use to the security management of the network.However, when mentioning this network security software, Chen Jiayi thought of a well-known security defense system in later generations.This system is Lenovo's freezing system.However, before the freezing system, the one that is more suitable for Internet users is the famous "shadow system."

shadow system.

What is the shadow system?

Generally speaking, the interpretation of the shadow system is to isolate and protect the wnows-operating system, and at the same time create a virtualized image system that is exactly the same as the real-operating system.After entering the shadow system, all operations are virtual, and all viruses and rogue software cannot infect the real operating system.If there is a problem with the system, or junk files are generated on the Internet, just restart the computer easily, and everything will return to the best state.

To put it simply, that is to say, the shadow system, no matter what you do on the network computer.However, as long as it is restarted, it will return to the original settings at the beginning of the network.And this initial setting is always clean, just like system restore.Restore to the original, not infected by the virus.

In this way, Trojan horses on the Internet are eliminated, and viruses are also managed.Most importantly, he does not affect user downloads.Because, when you use a computer with the Internet, you can also download it and transfer it to your USB flash drive.When you finish copying and shut down your computer, once you turn it off, there will be no more.No matter what you downloaded is a virus or a Trojan horse, delete them all.

In this way, when surfing the Internet, there will be no poisoning or Trojan horses from now on. Then, the security of the tt account will be guaranteed.As for my unsafe operation on my personal computer, I was infected with a virus or something.Then there is no way, Tang Dynasty Company, it is impossible to do everything.

"I think this plan can be handed over to Tang Dynasty Software."

Chen Jiayi briefly talked about the shadow system, and Zhao Danyang almost wanted to snatch this plan away.

However, Chen Jiayi will not hand over this system to Tang Dynasty Information.

Today's Tang Dynasty information is already strong enough, and adding a shadow system will make it even more hostile.It's better to leave it to Tangchao Software. More software will make Tangchao Software more famous...

So far, for this problem of account theft, Tang Dynasty Company has a good prevention and control method.

Later, Tang Dynasty Network, including *** Network, announced at the same time, "In order to combat account hacking, the two companies have joined forces to jointly issue Tang Dynasty Secret Security Cards. Users who purchase 50 Tang Dynasty Point Cards can receive a security card."

"Great, after having the secret security, who can steal my account number?"

After the players watched it, they expressed their opinions one after another.

Moreover, some players, even if they already have a point card, immediately bought a 50 yuan point card with a secret security card.

For him, he will use it in the future anyway, and buying it now will further protect his account security.

"Haha, account hacking brother, come and steal my account."

Another player speaks.

It seems that Brother Thief's prestige has been well-known in the game as early as in the game.

In short, the secret security card issued by Tang Dynasty Company instantly became popular on the Internet.Anyone who plays Tang Dynasty online games has used this security card one after another.Of course, other game companies saw it and took immediate action.For a while, in a relatively peaceful period of time, it seemed that everyone had rarely heard of a certain game account being stolen... But, this kind of thing didn't end.

Shanghai.

A game studio.

To the naked eye, this is a game studio, engaged in game gold mining activities.However, secretly, no one knew that this game studio was actually engaged in professional hacking.They use various methods to implant Trojan horse software on major networks, so as to steal other people's game accounts.

Of course, they don't steal from everyone. For some ordinary players, they probably don't have much interest.In addition, if there is a large area of ​​hacking, it will have a very big impact on them.At that time, it would be bad if Tang Dynasty Company was offended.Therefore, they have been very careful and only focus on some games to get rich. For their accounts, it is a one-time steal.

However, in the studio today, there was silence.

Until a long time later, the boss of the studio yelled, "Tang Chao Company, I will give you a lung."



Aishang Reading Network]

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like