"Boss, do you want a network administrator ?"
"What skills do you have ?"
"I can discover vulnerabilities on your website and ensure that you will not be attacked ."
"......"
Five years ago, this seemingly ordinary conversation may have appeared in the manager's office of any Internet cafe. However, in the "Big environment" of today's Internet, it became a threatening line on the phone. Maybe you still don't know. The simple inquiry that seems to be in the clothing of civilization is hidden behind the scenes but the primitive violence on the Internet.
Wandering between angels and demons
What is the "Big environment" here? Some website owners are quite touched by this: "At first it was a pure land, and it has become increasingly chaotic in recent years. A variety of viruses and Trojans are emerging, making them difficult to defend against. In addition, some people who have mastered hacking technology are also making our minds. Many people play the role of half an angel and half a devil in the name of genuine software ."
As the founder of Tianliang software network, Chen Peng's personal experience in recent years has proved his peer comments. "Our company's website is mainly for catering cash register management software. At ordinary times, there are dedicated network administrators, but in the event of Golden Week and weekend holidays, the company generally has all the holidays. At this time, it just gives some unscrupulous people the opportunity ."
According to him, just one weekend not long ago, his website was hacked, and the homepage page of the website was completely deleted. Instead, he wrote a sentence by the hacker himself, the content is about "your website is infected with viruses and Trojans". When Chen Peng was angry, Someone contacted him through a public phone, "I have discovered a vulnerability on your website and can help solve your problem", but the cost is a thousand RMB ". In other cases, some people appear in front of the anti-virus software provider to sell personal-developed "genuine" software, however, if Chen Peng doesn't buy the other party's account, a round of attacks against their company will arrive in a few days. More exaggerated, some hackers also pretend to be job seekers to find a job and said to Chen Peng, "I have discovered the vulnerabilities on your website. You can hire me as a network administrator to help you avoid these attacks ."
"I am used to this kind of behavior. The other party generally wants to pay for it, but it is usually not much. A maximum of thousands of yuan can be used to solve some problems that we cannot solve. In fact, it is not much for the other party, but we generally do not flat it in this way. We usually find the network administrator to block the vulnerability when detecting the vulnerability. A big deal is to re-upload all the content on the website. If it is particularly serious, we will turn to major anti-virus vendors or issue alerts. There is no special way to do anything else ."
However, unlike Chen Peng's resolute approach of not bowing to the other party, many website operators who are powerless to resist the attack mostly adopt the "financial loss and Disaster Tolerance" approach to solve the problem. After some webmasters in various regions suffer inexplicable hacker attacks, some "solution providers" require that they send money to a specified account to solve the attack problem, in order to make your website do not stop operating, many webmasters will choose to send money to the other party when they are helpless. "If an alarm is reported, this problem cannot be solved at half past one. I still need to file a case and collect evidence or something. My website cannot afford this time, so there is no way ......" Xiao Fei (not his real name) said his thoughts.
The personal software authors often use extreme methods to make profits when the above products seek money under the banner of genuine software. Group behavior targeting large enterprises is interpreted in the previous "gray pigeon" incident. "Gray pigeon" is known as a genuine remote control software. It has been sold on the Internet for several years in the name of "gray pigeon Studio". Through this software, it can remotely intrude into users' computers, attackers can obtain accounts, passwords, and private files. Therefore, they are used to extort money and steal others' privacy.
In computers connected to the Internet, everyone may be sold as "bots" by users of the "gray pigeon" software without knowing it. The price is determined based on the value of your computer, ranging from 1 cent to 5 yuan. In general, using this software can capture 3000 computers a night and earn at least several thousand yuan a night. This layer-by-layer control and tangle of interests have created a huge empire.
Integrated Software
[Content navigation] |
Page 2: Two Sides of personal anti-virus software |
Page 2: Two Sides of personal anti-virus software |