The 2013 Zhou still in the forefront of the battle, on the PC Internet, Zhou through the challenge of Baidu, Sogou and other giant enterprises to expand its sphere of influence, in addition to the Zhou personality, this can also be used to create "positioning" theory trout "reverse positioning" to explain, Trout has advised companies to reposition themselves against opponents, to use their opponents ' unavoidable flaws to express their virtues, and Zhou has earned a vested interest in this practice, and will this approach always work?
This reverse positioning is tricky. For this type of attack, be aware that your attack must resonate, and every time you put a negative label on your competitor, this negative label must quickly be recognized by the consumer.
Qihoo 360 In the past two years, through attacks on Tencent, Sogou, Baidu and other competitors, by reporting to the user the existence of loopholes, monopolies and other information to improve the market share of 360, but at the same time attacking each other, the odd tiger itself has been frequently criticized.
· Security vulnerabilities. November 26, Cloud vulnerability platform disclosed on Weibo, found that the 360 account system has "arbitrary user password modification" loophole, belong to the avoidable "design defect/Logic error", the use of 360 account saved phone, text, records and the cloud disk in the private files are likely to be browse to download. This vulnerability affects 360 mobile phone guards, 360 cloud disk, 360 browser cloud synchronization, such as Qihoo 360, a variety of network applications and security products. The 360 security defender official microblogging release news, and has made technical processing. But in fact the loophole was exposed in June 2012.
· Search tampering. December 5, users use 360 browser "Baidu", the search is often found before the content. For example, through 360 browser Baidu search "Li Yuchun", the original search results page to the right of the representative works, height, occupation and other modules have disappeared. And in IE and other browsers use Baidu, the relevant information page can be fully presented.
During the Mid-Autumn Festival of September this year, 360 of Sogou browser users across the country in batches, time, and local tampering settings, the default Sogou browser to tamper with 360 or IE browser, ordinary users difficult to restore settings.
This April, 360 has been used to bundle its Web site navigation station, deliberately counterfeit, confusing Baidu search results, hijacked Baidu traffic Baidu's behavior by the first trial of Beijing Intermediate People's Court of Justice unfair competition behavior was established, and the previous tampering storm was not flat, Baidu again in the Recruit.
· Mobile monopolies. At the end of September, 360 mobile phone assistants launched the "one-button root" feature, which helps mobile users uninstall all of their mobile software, including system software. 360 would like Tencent, Baidu and other software to expel the user's mobile phone, but because the Huawei, Lenovo, Millet and other mobile phone manufacturers brought to the "removable" list, provoked them to counterattack, and 360 of the full range of products from their application store shelves. To this end Zhou can only communicate with the handset manufacturers, and in the new version of the 360 mobile phone assistant to cancel this function.
Qihoo 360 in combat everywhere at the same time, its own products are also frequent problems, not only on the Tencent, Baidu, Sogou, Jinshan, Millet and other business blacklist, but also let netizens and users to issue many questions. This "reverse positioning" there are several major hidden dangers, at the same time experienced a tiger attack, the internet giants have gradually figured out the 360 offensive, and launched a positive response.
December 3, 2013, Internet security vendors and Terminal Services in Beijing Hongxiang Building jointly signed the "Internet Terminal security Services self-discipline Convention" Tencent, Baidu, Sohu, Sogou, 360, Jinshan, Rising, Jiangmin, NetQin, the days of the letter, NetEase, UC, Thunder and other Internet security and terminal manufacturers and other participation, It is clear that Internet security enterprises should strictly regulate their behavior in users ' computers, and require the enterprises participating in the signing of the Convention to ensure the right of the users to know and choose the right, no longer by various excuses to the industry other manufacturers malicious suppression.
Experts believe that many of the core provisions of the Convention on Qihoo 360 of the various types of improper conduct of the special constraints, six provisions to clarify 360 repeated irregularities of misconduct. Perhaps Zhou's "reverse positioning" strategy is losing its effectiveness, and users are hard to pay for this vicious competition again, Qihoo 360 in the Internet area has become increasingly isolated, the future is to continue this strategy, Zhou 祎 should think clearly.