Not long ago, a tiger and Yahoo "director" of the War of words, has "rogue software" to the forefront of the topic, and this topic to the highest peak of the protagonist is the civil organization launched the "anti-Rogue Software Alliance litigation search" case. First of all, do not look at the case of victory or defeat, a single 80% of netizens have encountered rogue software, "indecent" one said, this value can be believed first, at least my friends around the 100% encountered such harassment. It is because of the "rogue" infringement of the audience so many, only to lead from the forum to the blog, from netizens to experts have to these malicious plug-ins lifted a "red card." What does "red card" mean? Generally speaking, we often watch sports games, such as watching football matches, yellow cards and red cards are not the same: yellow card means that he has a small problem at a certain point, it can continue to play. But, the red card will exit! We have rarely seen such a situation except for the full red card of pornographic sites. What's the reason for this? Most people have an abhorrence of the excessive advertising in traditional media, especially when it comes to watching TV dramas or movies. Generally speaking, the advertising of traditional media, though offensive, is acceptable. This is because the advertising audience is selective, willing to look at, do not want to "change Taiwan" it. And Rogue software broke this everyone is in compliance with the agreement, their misuse of technical behavior to the vast number of netizens have brought all kinds of unbearable troubles and insecurity, but also buried a lot of social problems. Some have cited an example, and now is widely used by many media, rogue software can be regarded as organized "triad." They are driven by commercial interests, on the one hand, harm the rights of computer users, on the other hand with false click rate to induce investors, organized to destroy the industry agreement, to touch the corner of the law. In essence, Rogue software is hated, the core factor is that it borrows technology advantage, forcing users to accept the "service", which is essentially a forced transaction behavior, and this forced transaction to "accept the service" in the position of no retrogression. We should see the referee rarely red card, before the rogue software has been given a yellow card, he did not cherish, this has a national anti-rogue software feat. 2005 Network Industry Association announced 10 rogue software list, and urged the relevant companies to carry out rectification. Only one months later, the information, based on a report of 2 million Internet users, was forced to be withdrawn by the Network Industry association, because most of the software vendors on the list had considerable power and background in the Chinese Internet. A spokesman for individual manufacturers said that it was wrong for the network association to make judgments without technical treatment, and even threatened to take legal action. This means that more than 2 million of the user data has been trampled, and many netizens began to curse "rogue" on the Internet from this day until today. Is "virus verdict" true? From an IT professional perspective on rogue software, it can be considered: "Spyware(Spyware), malicious shareware (malicious shareware), malicious advertising Software (Adware), etc., in the gray area between legitimate business software and computer viruses. But from the point of view of ordinary netizens, we think of it as a virus, the "Black Software", which is based on four points: argument one: The system home, until the reload for a system administrator, or a fan of Windows system, a small "rogue software" can be completely uninstalled. At least my server system does not allow the installation of non-service software because it is not allowed to surf through Internet Explorer. Faced with the popular rogue software, my server seems to have a natural immune capability. But ordinary non-professional users, they face the sky of "pop-up window", can only have a fear. The unit's colleagues told me: "I have tried to delete these ' rogue ', but in the blink of an eye in the list of the program to find their traces." The registry is like a book to me, I really can't stand it, you help me system reload it, thank you! "This passage is real, when ordinary users can not tolerate, the fastest solution for administrators is the use of cloning software to reload the system." Is there a difference between this process and the process following the virus infection? Deleted and installed features and "self-replicating" virus behavior is also quite consistent, alone, many network administrators have already ranked them as the virus ranks. Argument two: Forced binding, and Trojan with the same quality installation or use of countless free search tools, download software, players, is a rogue software "see every Day", bundled shareware became the favorite rogue. The bundled behavior of these shareware, as a kind of software that can install "backdoor program" on user's computer without the knowledge of computer users, should be divided into Trojan virus in theory. In addition, there is no intrinsic difference to spyware, and they also use "backdoor" to capture the user's privacy data and important information that will be sent to the operator on the other end of the Internet (the creator of the plugin). Even if these backdoor programs are exploited by hackers, the Internet could become a "zombie network." Because of the number of rogue software in the user system, we can also list it as one of the most important hidden dangers of network security. Argument three: Occupy the system resources, equal to the network worm according to the "Jiangmin published two anti-Rogue software manifesto-jie rogue software 10 sins" sixth "keep reading and writing in the background key values, after the deletion of repeated generation, injection thread, process protection itself is not deleted, hide their whereabouts, and constantly through the network with the outside data exchange, A large amount of CPU resources and network bandwidth, serious cause system panic. "A considerable number of users have been victims of the network worm virus. For the system host, the user is depressed, the network, depressed is the administrator. The available network bandwidth, such as gold, can not tolerate the refuge of rogue software. It's like treating the Blaster virus."The same attitude, all the people on the rogue software are Hengmeilengdui cold pair." Argument four: Uninstall tool, equal to kill tool only when dealing with a vicious virus outbreak, antivirus manufacturers will launch a Kill tool. Professional uninstall tools for rogue software are as many as some virus-killing tools. This is not necessary for us to comment on the treatment of petty theft we will give him the opportunity to treat the crime of the disease of the people will be like today, the emergence of "Red wanted". "Red card" after the view of "China's anti-rogue Software Alliance" is this time the network is the most unique search keyword. From the prosecution of the "search case", the anti-rogue Software alliance has claimed to put the search, Yahoo China, great and easy fun, and so on more than 100 of our well-known sites to the dock. However, from the actual frequency of action, it seems that the "one defendant a week" plan has been broken. But from a lot of Web site survey data show that a certain number of netizens are not very concerned about the lawsuit, the key is lively to see, can be unscrupulous to scold rogue software. After all, swearing is also a way to vent repressed emotions. If you have a love to pay attention to China's Internet development, I suggest you first look at the Chinese spam legislation process. "The burden of proof" has been difficult to implement a breakthrough since the enactment of the gateway. In contrast, the proof of rogue software is much easier. Some people say that after winning all the netizens can get compensation, I got a little creepy feeling when I heard the news. Although there are professionals who suggest that we currently have a lot of rogue software is suspected of breaking the law. However, in the "No. 268 article of the criminal law, the computer information system can not operate correctly because of the deletion, modification, increase and interference of the computer information system in violation of state regulations." The consequences are particularly serious in a prison term of more than 5 years. "The indictment, I think can only be a kind of hype." And if in accordance with the "intentional production of computer virus destruction procedures, the impact of the normal use of information systems, the consequences of serious ..." The terms of the lawsuit, these related to Internet sites will face China's hundreds of millions of users compensation. So if we can win these terms, China's dot com era will be overturned for the second time. In this regard, some people will ask: "You are so pessimistic, why so many civil organizations outraged and the manufacturers of the court?" "In fact, the reason to participate in the" anti-rogue "camp is very simple, people just want to sit in front of the computer, drink coffee, enjoy your blog, listen to the sound of the Irish bagpipes, don't let" it "suddenly pop out, break this calm thoughts and difficult to forget the mood. I believe that this "war between netizens and rogues" is not a compensation, but a quiet morning. Internet users need the network environment is required to protect the provisions of the law, the anti-rogue software movement after two months of public attention, finally attracted official attention. A few days ago, Mii openly said that it is possible to intervene in rogue software dispute, judging standards will be introduced, this is what we eagerly look forward to. Executive Editor Zhao Zhaoyi#51cto.comTEL: (010) 68476636-8001 to force (0 votes) is tempted (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title of the party (0 votes) passing (0 Votes) The original: Face Rogue software users to the "red card" return to the network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.