Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
August 29, in the 360 search around 16:30 P.M. released the "Building a safe, clean, effective competition in the Internet search market," one hours later, the network appeared "GF and other 4 brokerage mail exposure: Disable 360 browsers and series of products," such reports.
The report said, "GF Securities, the National Sea Securities, National Credit and Haitong Securities Four securities companies issued a succession of internal emergency notice, prohibit employees to use Qihoo 360 security guards, 360 Security browser two software, and requested the installation of the two software staff to uninstall as soon as possible." ”
360 products are suspected by virtue of 360 of the product's own published information.
Through this information, we can draw two information, first, the four securities companies before today, are the 360 products that have been used, including 360 security guards and 360 security browsers; second, the four securities companies are now aware of the "unreliability" of 360 products. What does this explain? The four securities companies have been using 360 products, and so far, there has been no disclosure of confidential information, and no one customer reflects the disclosure of personal data. Just today, the "internal emergency notice" disables 360 browsers and products.
So what information are they using to doubt the reliability of the 360 product? In the 360 browser privacy policy, it is noted that 360 secure browsers record useful information about browsing history on your computer. "As you can see, their information comes from the privacy policy of the 360 product itself." These "useful information" include browsing history, screenshots of most of the pages you've visited, cookies or networked storage data, temporary files left when you visit a Web site, and so on. This information is really private, not for outsiders know, just ask, this information, which browser can not record? Firefox, IE, Google and many other browsers, they do not record this information? The answer is clear. Is it only because of the presence of 360 search reptiles that this information is collected by 360?
Cloud Vulnerability Platform Technical experts comment is a cloud.
For cloud vulnerability platform of technical experts said, 360 search may be "Web site can not be external, such as background address, internal system, etc. exposed in search results", well, you provide the key words, our country people to search, whether there is really secret data found? The expert also believes that 360 Search spiders disregard the robots.txt protocol, crawl the content of the site, the subsequent data adjustment, there are potential threats. I think this information, for the vast number of search users may feel that is a threat, but for the vast number of webmasters, the announcement of this information, may be dismissive, because Baidu Spider crawler has the same threat.
360 antivirus and Jinshan Antivirus, who is more than a chip?
360 software security vulnerabilities, will secretly collect user information, thereby revealing users secret privacy, this is the 2010 Jinshan antivirus software announced. We reserve our views on the various struggles among our peers. Just ask a question, 360 software of this loophole, Jinshan is easy to find, or in-depth research, repeated testing after the discovery? It is inferior to people, learning competitor products, or malicious explosive materials or fabricated, we are not known.
360 Search just online, for the search engine market, is a blockbuster threat, through the search engine giant Baidu Company's series of measures, we can see, 360 search online influence; for users, if 360 search is true as stated, "Building a safe, clean, and effective competitive internet search market" Whether it is now, or for our next generation and the future, are conducive to harmless; for stationmaster, I as a stationmaster, I am very much hope 360 search can on-line, rise, superior.
Above by Gu Shilan original, article first out http://www.gushilan.com/360loudong.html, reprint please indicate the link, thank you.