Rebirth Online Entertainment

Chapter 641: 1 Account Stolen, All Accounts Suffered

If you implement multi-process browsing earlier, where will there be crashes?

In fact, this never crashes is just a function of multi-process. 【

Aishang Reading Network] Because each webpage is independent of each other and does not interfere with each other.This also causes you to open a Lunyi website much faster than usual.Because, the loading of the previous website will not affect your next website at all.So, if you are not fast, you have to be fast.

In addition, the security of individual users has also been greatly guaranteed.

"Technology, innovation."

In an instant, these two words once again surrounded Tang Dynasty Company.

We know that browsers have evolved over decades.But there are few real innovations.Even Apple, although Apple has always claimed that their products are at the highest peak in the world.However, a small number of viewers can really represent the whole world, which really makes many people doubt.

Until the emergence of Tang Dynasty Company, people finally saw what is innovation in this world, and what is the innovation of the public... This multi-process browsing can be said to be the biggest innovation of the browser until now. , now there is nothing to say.Those who understand browsers will be full of expectations for this browser after seeing this report. They want to witness the emergence of the best browser of this century.

three days later.

Tang Dynasty Company officially releases Tang Dynasty Browser globally.

Affected by this, friends who had always cared about Tang Dynasty Browser entered the website of Tang Dynasty Company one after another.Or, other download platforms, download the browser.If friends who work in the telecommunications bureau, perhaps, they can see that streams of data streams from all over the world are continuously sending download instructions to the Tang Dynasty browser.

download.

download.

These downloaded data have only one purpose, which is to download the Tang Dynasty browser.

The statistics in the background keep rolling, like a snowball, the number of downloads is getting bigger and bigger.

1000 million downloads per hour.

1000 million.

An awful number.

This download volume, even when Tang Chao announced the latest instant messaging version, did not reach such a record.If nothing else happens, and this record is kept, then Tangchao Browser will definitely be able to set a Guinness World Record for downloading in a single day.

Yes, that's right.Because, the current 1000 million is just an hour of downloads.Later, there is still time.Moreover, the current 1000 million per hour is far from the download peak.When it comes to the peak of Internet access, this record will continue.

2000 million.

3000 million.

No one can imagine that a small browser has attracted so many downloads.Moreover, the number of downloads is still topped by European and American users.Of course, when the download volume reaches 3000 million.The number of downloads of Tang Dynasty Browser in a single day has already set a Guinness World Record.

However, this is far from over.

As time goes by, with the number of users downloading, this number is still soaring.

4000 million.

5000 million.

……

Until the end, 6700 million, finally, the 24-hour downloads of the day, it stopped to this number.

6700 million.

When this number was announced, it really shocked the media.At the same time, it also frightened the competitors of Tang Dynasty Company.It never occurred to them, even if they thought, that Tang Dynasty Company has a huge Internet network that can help this time.But they believe that such a record is also impossible to achieve.Among their approximate forecast figures, the most is only about 3000 million.Moreover, when a media reported 3000 million downloads at that time, it had already caused a lot of discussion.

Because they think it's impossible, totally impossible.

However, until the figure of 6700 million was announced, a lot of people were waiting, all screaming.

"Okay, 6700 million downloads, I can tell you. The success of the Tang Dynasty browser, although there is strong publicity from the Tang Dynasty company. However, this is not the key point. The most important thing is the technological innovation of this browser. If not, then even if Tang Dynasty Company monopolizes the global Internet, it is impossible to achieve such a download volume..."

But without too much explanation, the Tang Dynasty browser has spread to the world with the strong support of users.In particular, when users downloaded and tried it, it received rave reviews.On the one hand, they vigorously praised Tang Dynasty Company for not being fake in its propaganda, saying one is right, and saying the other is two.On the other hand, after they have used it, they think that the Tang Dynasty browser is much easier to use than the e-browser.Not only the interface is beautiful, but also fast, safe, and never crash... What are you waiting for?Are you still willing to let an e monopolize you for a few years?

As a new generation of Internet users, we should use the most technologically advanced products.

Then, this Tang Dynasty browser is your best choice.

Tang Dynasty Group.

"15% market share."

Looking at the market share of Tang Dynasty Browser, Chen Jia nodded.

In the past few days, it is indeed very good to be able to achieve a market share of 15%.

You must know that in later generations, Google Chrome, which competes with e, only reached about 30% after several years.Moreover, when they started, they only occupied 3% of the market.Later, it fell to 1% of the market share.It is not easy for the Tang Dynasty browser to obtain such a good market.

However, just after Chen Jiayi smiled, a piece of bad news suddenly came.

"Tang Dynasty Company suffered a large-scale hacking incident."

"what?"

Another hacking incident.

From the beginning of the existence of the Internet, various account hacking incidents occurred along the way.However, with the efforts of Tang Dynasty Company, account hacking incidents have become less and less.Especially when there is a shadow system installed on the network, there are Tang Dynasty guards, Tang Dynasty antivirus, and cloud security alliance.Countless viruses and Trojan horses have been thoroughly checked and killed.In this way, the user's network security is also guaranteed.

However, as the saying goes, the height of the Tao is one foot, and the height of the devil is one foot.

Many hackers still have various methods to steal other people's account information.Especially for some ordinary friends, they often make mistakes.For example, he double-clicked an unknown ee file.Let me ask, under such circumstances, he is not poisoned, he is not infected with Trojan horses, it is strange.

Therefore, even if Tang Dynasty Company has built a huge security network, it cannot absolutely guarantee the safety of users.

"Zixian, what's going on?"

Judging from the news that came, this time the account hacking was even more serious than the previous one.

In the last large area, there were only about 5000 numbers.The 5000, the Tang Dynasty company can afford it.However, this time, as many as 5 account numbers and passwords were stolen.Xng lost 5 at a time, which instantly aroused the anger of thousands of netizens.

"Fuck, brother's ingot."

"Say, brother Alipay's cash."

"Oh my god, my purple outfit?"

Several people waited, wanting to cry.

"Mr. Chen, according to the information obtained so far, this account hacking incident is a hacker organization that specializes in stealing ordinary personal computer user accounts..."

"So it seems that they are fighting against Tang Dynasty Company?"

"you can say it this way."

"Have you found out who did it?"

It would be depressing to fight specifically against Tang Dynasty Company.

It should be said that there are many troubles for Tang Dynasty Company.For example, his competitors, and hackers from the United States.After all, Tang Dynasty Company has developed so much.I don't know how many companies have been suppressed. It is normal for these companies to secretly retaliate.In later generations, I don't know how many hacker attacks have occurred.

For example, these account hacking incidents happened from time to time in the development of the Internet in later generations.

"It's still under investigation."

"Well, hurry up."

Xng lost 5 accounts at a time. Of course, if he really had to use funds to bear it, Tang Chao Company would not take him seriously at all.However, the 5 accounts stolen by xng this time greatly damaged Tang Chao Company's network security.For their reputation, the loss is so great that it is simply difficult to estimate.

For example, when another theft broke out.Then some media began to question the network security of Tang Dynasty Company. They thought that they really couldn't believe it.The Tang Dynasty company, which has always been the most advanced technology for the Internet, unexpectedly had several large-scale thefts in quick succession.Let us ask whether the Tang Dynasty Company really has absolute security, or they are just in name.

Even, among some active users, they have begun to be disappointed with Tang Dynasty Company.You know, what they lost was not just one or two dollars, some even lost tens of thousands or hundreds of thousands.Under the pressure of these users, it is conceivable what everyone will think of Tang Dynasty Company.

Even some friends who believe in Tang Dynasty Company, friends who have always supported Tang Dynasty Company.When they discovered that Tang Dynasty Company had once again been involved in a large-scale theft.I also have some worries in my heart, whether I will be stolen next time... This feeling is really unpleasant, even worse than their being stolen.

Fortunately, Tang Chao Company's follow-up service has been relatively good for this sudden theft incident.After a large area was stolen, Tang Dynasty Company quickly organized many customer service personnel.While appeasing users in all directions, they even personally sent customer service to call the stolen users this time, hoping that they would calm down.Tang Dynasty Company will definitely investigate this matter thoroughly and give the user an explanation.In addition, Tang Dynasty Company also apologized in person for this large-scale theft incident and made a promise that it will definitely investigate the matter thoroughly.

Originally, the user's own computer account was stolen unilaterally, which had nothing to do with Tang Chao Company.After all, Tang Dynasty Company can only guarantee the security of its own server, how can it guarantee the security of personal computers.However, this time, the hackers did not attack Tang Chao Company, but turned to the players, attacking their computers.

Especially, with more and more personal computers.Many users, they have left the Internet, began to enjoy the personal computer.It’s okay when you are online, because there is a shadow system, it is not easy to be stolen.Unless, the Internet wants to steal your number.However, once you switch back to your personal computer.There is a huge threat to their network security.Especially those friends who only know how to play online games and don't know other friends.Friends who don’t know how to prevent viruses and Trojan horses are most likely to be stolen when they log on to the Internet.

But, after all, these users are users of Tang Dynasty Company.Moreover, the theft this time was a large-scale theft, and the Tang Dynasty Company had no reason to entrust this matter.Moreover, Tang Dynasty Company has always established a positive image, and it will not leave this stolen incident alone.

In this way, the Tang Dynasty Company took comprehensive countermeasures just after the theft happened.

"By the way, Zixian, how could Alipay and online games be involved in the stolen account this time?"

One of the user data that Tang Dynasty Company has the most funds on is Alipay and online game user accounts.Of course, Tang Dynasty Company is also aware of this aspect.Therefore, for Alipay and online games, a very strong confidentiality work has been made.Logically speaking, they just want to steal, and it is not so easy to steal.

"It may be that they used Renren.com, Baidu Tie account, and other Tang Dynasty company's websites in the past to follow the vine and completely steal our Tang Dynasty company account."

"I see."

Chen Jiayi understood what Zhang Zixian meant.

That's right, Tang Dynasty Company has indeed taken relatively strong security measures in online games, Alipay, and even in terms of anti-theft, it has also implemented relatively strong anti-theft measures.However, no matter how you guard against it.For your Internet website account, these security measures are much weaker.

Because, these websites are just pure Internet and don't have too many security defenses.But the problem is that the green ∷ novel website created by Tang Dynasty Company has linked all the websites of Tang Dynasty Company into one.Like Tang Dynasty Pass, as long as you have Tang Dynasty Pass, you can log in to any website under all Tang Dynasty companies.In this way, it will greatly facilitate many netizens.

However, this is convenient, but the problem is, if one of your account passwords is stolen.Then, all your product accounts and passwords will also be stolen.In other words, even without this pass.As long as one of your accounts is compromised, most of your accounts will also be compromised.

For no other reason than because.Many friends have the same account and password on various websites, various games, even Alipay...etc.

Few friends, they will have an account for a website.Or, one account per game.If so, then it is strange that you can remember your game account.So, in a situation like this.These hackers cleverly attacked Tang Dynasty's weaker companies in terms of security.Like Renren, Baidu Tie... etc., this one is stolen.A tragedy happened, and all his belongings were stolen.

Yes, the Internet is such a convenience.This is not only manifested in the positive side, but also in the negative side.

Just like the data leak of n website users in later generations, it caused the whole country to fall into a period of out-of-control Internet security.Many netizens edited their blogs, forums, games overnight...waiting for a password.Because, if they don't modify.The database scattered outside is very likely to steal all your account information.

This is a very thought-provoking thing.

Therefore, after the n incident broke out, it also sounded the alarm for many Internet friends.For example, when surfing the Internet, you should set up several account numbers, or, set up several passwords.Otherwise, an account is stolen.Then, all your Internet virtual items, I am afraid that all of them will be finished.

It's a pity, but Chen Jiayi knows that it's useless to ring such an alarm bell every day.

On the one hand, everyone is an ordinary person, and it is impossible to have such a sense of security.Even with such a security-conscious friend, it is impossible for him to get so many account numbers and passwords.Moreover, where do you store these account passwords?Don't tell me, when you go outside every day, do you still carry a notebook with account passwords?

Of course, you will say that you can record it in the computer, but, maybe, your computer will be invaded at once, and all the numbers and passwords will also be stolen...

Shaking his head, Chen Jiayi felt a little helpless about the phenomenon of "No. 5 is stolen, all of them are ruined".Fortunately, only about 600 people were stolen this time.Instead of exposing all [-] million databases like later generations.If this is the case, I am afraid that Tang Dynasty Company will face the most serious crisis of trust.

For example, the n website of later generations.He was originally a technical professional website, and this website covers almost 90% of technical personnel in China.However, after n user data leaked.This website has almost lost its popularity overnight.

Because everyone really doesn't have much confidence in the security of the website.Furthermore, after n website leaked lu user data, the website only issued an apology on Weibo, and did not ask users to change their account numbers and passwords.In addition, after n leaked lu for the first time, followed by two plus three, for some unknown reason, came to leak lu again.In the end, the leaked user data reached as many as 2000 million.

As a result, angry netizens completely lost confidence in the site.

After thinking about it, Chen Jiayi stopped thinking about n for the time being.Although today's large-scale theft has some similarities with n leaks.However, they are still fundamentally different.At the very least, n is n, and Tang Dynasty Company is Tang Dynasty Company. n will not be responsible, and Tang Dynasty Company will never leave users alone.

Of course, if it's an individual hacking incident, then that's fine.After all, this investigation starts from the investigation.It is impossible for Tang Dynasty Company to spend a lot of manpower to arrest because one or two people's accounts were stolen.After all, manpower is exhausted.But this serious and large-scale theft incident, no matter what, Chen Jiayi will catch it, and recover the damages, and give the user justice.

If not, like hereafter.Many companies have a record of large-scale account theft.However, the final result of the incident was that no one was found who stole it.For this, users have to pay for themselves.This, for the current Tang Dynasty Company, they do not want to see.Although, Tang Dynasty Company can not be held responsible.Because, it's not their fault.However, as a global Tang Dynasty company, he should not take on this responsibility.Only by giving users confidence can the Internet of Tang Dynasty Company become popular all over the world.

Losing these, the Tang Dynasty Company will have everything. ro! .



Aishang Reading Network]

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like