Visit China's most "cool" security company----Know Chuang Yu

Source: Internet
Author: User
Keywords China China
There is an unusually low-key and mysterious network security company, called Beijing know Chuang Yu. Before being named "Cool Company of China" by the cover story of "Waitan pictorial", I know that the knowledge of Chuang Yu Company is limited only--do safe. is so low-key a "cool" company, but in 2014 chose to hold a sensational industry in the nest of the Kcon hacker Congress, what is the magic to let the security circle to know so optimistic, this aroused the author's curiosity ... Know Chuang Yu Company CEO Zhao Good at seizing the network space "ghost" September 24, 2014 night, Beijing Indigo factory South Road Jin Wei building room 404 still brightly lit. On the same day, the internet suddenly exposed even more serious than "heart bleeding", "broken shell loophole", this loophole is considered to be a huge harm, lies in its system risk, hackers can penetrate vulnerabilities, direct access to the operation of the server, access to the "God mode" do whatever. Know that the research team is good at grasping the "ghost" house in the network, a slightly long hair face delicate little guy standing behind a bunch of programmers, from time to time pointing Pleaes, not far from the sofa on a full face stubble seemingly lazy "pull foot" while chewing on the side of the cat on the computer non-stop percussion, Next to a big screen above a map of the world, occasionally in some areas have a small bright spot jumped out, somewhat similar to the Earth from space shooting pictures of the night ... The dots on the map are growing, so that everyone is frowning. Showcase is aware of the 404 team's regular activity 404, a number that is no longer familiar to all programmers, and when it does, it means being attacked or stopped working. No one can imagine, the dozens of square meters large office area, is the current Chinese hackers the highest density area, and lead a group of young men are on the new "broken shell loophole" closely monitored the two people, it is Beijing know Chuang Yu Company's two-bit technology core force, the current Chinese hacker Circle Most representative of the two characters-"cosine" and " Black brother. " "The data is out!" At this time all eyes are cast on the cosine, "according to Zoomeye current statistics, China has at least 13000 servers have broken shell loopholes, the world about 140000 hosts risk!" The black brother who was chewing on the couch was catapulted from the sofa--"Don't go back tonight, hurry up and work!" As far as the Chengdu Tianfu Software Park Office, is also brightly lit. This is known as the location of the Chengdu branch of the company, responsible for the development and operation of a product called "Accelerated Music", this product can not only provide access to the site to speed up, but also effective against hacker attacks. The office wall also has two big screens, it is also a map of the world, and the difference is that countless lines from one point to another are almost woven into a net-a "real-time defense and Tracking system for cyberspace", which can present the cyber attack behavior in real time on a visual map, Let security technicians know the hacker's attack behavior at your fingertips. Network emptyReal time defense and tracking system that night, in fact, all the hackers, do not want to sleep-once a loophole is disclosed, it means that the two powerful forces on the network, another contest officially began, hackers busy "digging", do bad things, "white hat" are busy "analysis, positioning, tracking" attacks. After a clear understanding of the scope of the vulnerability, the relevant data will be quickly shared among the company's teams, and eventually sent to the Chengdu Branch to accelerate the orchestra team. After getting the leak information, the speed band will match the vulnerability in the history log to analyze, to make the best defense rules, and to unify the hundreds of defense nodes in the acceleration of the effect, soon hundreds of thousands of service sites will no longer be a headache for this loophole, because they are already in the security of accelerated music. For the site owners, in fact, no need for any operation, this kind of "butler" style of service, so that all the network attacks are quietly in the process of resolution. For the knowledge of the creation of the security team, every contingency is more like a mission. On the following day, know that the V1.0 security research team has launched a version of the emergency summary of the "broken Shell vulnerability" and posted it to the network. This was followed by the release of three versions and a defensive approach. In fact, in the knowledge of the creation of the company, such overtime has become the norm. For security professionals like cosine and heige, as long as there is a new "loophole" on the internet, it must mean that the need to fight day and night for several days, not only on the principle of cobwebs, but also to the fastest speed to know the extent of the damage, and quickly study the rescue method, and in the first time free to the community out. Zoomeye official website has such a description-"as the legendary Kui, Zoomeye's responsibility is to find out the" ghost "in cyberspace. In fact, in the domestic Chaos Complex network security industry, such as zoomeye such excellent products, is very rare. Safety technology is the road in the knowledge of Zhao CEO, the real hackers are not those who steal your QQ, stealing your account, the general public eyes of the "hacker" is actually the end of the "hacker technology" this AK to the netizens crazy shooting mob. Security technology is the "road", the real hacker should have a righteous heart, use the hands of the network security technology, for the benefit of netizens. Zhao 13 years old began to play computer, write game program, and then began self-study network security technology, from the beginning out of hand. In the early years, he became a senior security researcher at McAfee (McAfee), and was invited by Microsoft's first-line business to speak on security technology, in a major hacker circle, joined by the technology-cutting-edge network group "Green Corps". Founded on the knowledge of creation and the strong influence in the security world, Zhao was selected as Forbes "China and the US 30 entrepreneurs under 30 years of age" list. Zhao and security personnel together know founded 7 years, quickly become a security industry leader, and team strength and belief is inseparable. The company set up at the beginning of the SLOsGan is "for a better and safer Internet", the company name "Know" The word is also quite profound meaning--Zhao that, "unity of knowledge and doing" and "do a moral thing" is a network security companies should focus on the basic quality. It is precisely because of this, or an unfinished young head green cosine in See Zhao less than half an hour of time to decide to join the know, although the security industry has been ranked first camp, but always with the knowledge of Chong-Yu continue to advance. Undoubtedly, know that Chuang Yu has become the most powerful domestic technical strength of a network security company, in the knowledge of Chuang Yu, has a large number of high-end hackers assembled a security laboratory (the 404 team mentioned above), responsible for network security vulnerabilities Mining and analysis, and the establishment of a large cloud monitoring cluster and cloud defense cluster, Three organic combination formed a knowledge of the global Web site security Situation Awareness system, the threat from cyberspace to advance the forecast, early deployment of prevention, real-time defense against attacks of the powerful ability. Know the global Web site security Situation Awareness System Company's cloud security detection platform cumulative detection of 23.9 billion pages, interception of more than 1 billion malicious Web site, cloud security protection platform real-time for more than 590,000 sites to provide real-time protection, to help the site against more than 300 million times a day of hacker attacks; Know Chuang Yu Independent research and development of the network space search engine "Zhong eye" (Zoomeye) currently contains more than 1 billion Domain name Web Service component fingerprint and more than 4 billion network IP mainstream port component fingerprint, real-time monitoring of global network security posture. No matter which product, is in the industry leading position. Know that Chuang-Yu will not only their own security products, solutions to serve the national loophole, the Ministry of Industry, the National Computer Virus Emergency treatment center, provincial and Municipal management Bureau, network security and other national government agencies, but also for the central bank, China Telecom, Microsoft and other industries and institutions export safety products and services. Not only that, the use of the security technology mastered, know that the creation of the society to the whole community to release the network security early warning, to help ordinary users away from network security threats. Know Chuang Yu CEO Zhao for the author to share a story: "March 2014 we through the CCTV to the community to disclose the major network security vulnerabilities of home cameras, the afternoon of an aunt directly to find the company, hoping to seek our help." This shows that the things we do are meaningful, through the disclosure of vulnerabilities over and over again, to promote the attention of all people to network security. "What we do now may not be all for making money, and when you look back in your old age, you will not regret what you are doing--because we are doing good deeds." Zhao told his employees more than once. Social Security is the Zhao CEO of Chuang Yu Company in 2014, Shanghai, a gathering of the speech so far impressive. In Zhao View, the use of microscope to observe code cobwebs, exploit research and network black production see recruit, just "Tao". The real "Hack" is the meaning of chopping and chopping, the real hacker spirit is to break through the conventional and the limit, to create a new world, and to have a just heart, to solve the real difficulties and needs of Chinese Internet users. What is the actual difficulties and needs of Chinese netizens?—— in Zhao View, the unique network security environment, the network is full of yellow gambling virus, cheat steal, is the source of the biggest security risks to netizens. This is not entirely a technical category of security, but the scope of social security. In this context, Zhao found a new field-the socialization of network security governance. "The socialization of network security, only by some institutions, or some enterprises to complete, basically can not be achieved, we can only unite all the strength of unity, in order to provide users with a truly safe and reassuring network environment." Based on this idea, in September 2012, know Chuang Yu United Tencent, Baidu, Jinshan co-founded the "Security Alliance." Its main task is to unite more and more internet manufacturers, hardware manufacturers, operators and so on, set up the industry unified security standards, Cross-platform Unified action, in order to combat the network of cross-platform fraud and other related to the direct interests of netizens online black production behavior. Give a simple example; if you find a fraudulent website, you can through the Security Alliance Platform (www.anquan.org) to report, normally within 5 minutes of the malicious Web site reported by you after being audited and identified as fraudulent site, the relevant site will be identified as a risk and the identity results of the synchronization to the Tencent, Baidu, Jinshan and other manufacturers of related products on display, so that netizens received access to the platform from the risk of the hint. So far, the security alliance has more than 500 million malicious Web site data accumulation, more than 100 partners, and 31 vendors daily real-time exchange of more than 55 million web site data, to provide users with strong protection. Zhao also put forward a new concept of "security crowdsourcing". A chance, Zhao found that the security Alliance online, every day will receive thousands of of netizens reported malicious Web site data, the timeliness of the data, accuracy even beyond the machine detection data results. That made Zhao's heart quake, and he quickly realised that the awakening of netizens might have brought the socialization of cyber-security to a new era--a new cyber-security war that belonged to the people. In 2013, the Security alliance formally began to form a civil volunteer team called the "civil million-man mission" to submit cheat website data to the security alliance on a daily basis, with students, soldiers, network enthusiasts, women, and old people. So far, nearly 4000 people have signed up. This is completely the Netizen security Consciousness big Area awakening! Those who make the network black production, every day are clamoring to kill me, so I always wear a pair of air-cushion shoes. "But I think we're doing the right thing and we have to stick with it," Zhao in an interview with reporters. Network security has been more and more attention by the State, this is the general trend, but also netizens a safe and secure Internet environment, is everyThe obligation of a true security person. "Whenever you think of me chatting with you at the same time, every minute also for netizens to avoid tens of millions of economic losses, I feel very happy," Zhao told reporters.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.