Job Recruitment Website - Property management company - Property safety frank report
Property safety frank report
Mystery of 360 Black Box: The secret of Qihoo 360 "cancer" gene yesterday was the day when all Qihoo 360 APP products were completely removed from Apple for one month. In addition, this Internet company, which started from claiming security, is facing the condemnation of "insecurity". After several months of investigation, and with the help of a group of programs "apes", the reporter of National Business Daily uncovered the inside story of 360.
360 products were removed from Apple's shelves.
Suspected of leaking user privacy, there is evidence that 360 mobile guards and 360 mobile phone address books will transmit highly sensitive information such as user name (mobile phone number), mobile phone IMEI code and password in clear text. It is equivalent to exposing the privacy of mobile phone users to the sun. All applications of 360 have been removed from Apple's shelves for a month, which has angered Apple in terms of privacy protection and may be permanently banned.
360 Black Box Mystery: Stealing personal privacy information like a worker bee According to the evaluation report, 360 security guard v7.3.0.2003l is suspected of violating the user's right to know, choose and prohibit, and recording and uploading user behavior data without consent. A company has launched a new product. The day before the launch, 360 also produced similar products, almost identical. It turns out that many employees have installed 360 products.
360 "stealing columns" infiltrated the security of online banking. Don't trust and rely on 360 "green website certification" easily. 360 browser directly blocks VeriSign, an authoritative certification authority, and replaces it with its own authentication mechanism. Technical experts test that using fake online banking of China Merchants Bank can easily pass the 360 certification. Using mainstream browsers such as IE will pop up an error reminder, and users will naturally stop trading after receiving the information to avoid losses.
360 back door secret passage: "the hand of God" or "the hand of the devil"? The "one-click repair" function of 360 security guards after scoring is a sharp weapon for them to occupy the market. With the help of fool-like "one-click repair", 360 security guards have the final say on what users use and don't use on their computers. As for whether it is all related to security, ordinary users naturally can't see the doorway, but will be grateful for these "rape" behaviors of 360-these users are not skilled in installing or uninstalling software, and 360 security guards are a "stupid camera"
360 winning "cheats": The mysterious V3 upgrade mechanism is inspired by the 360 high-level decision-making layer, and mandatory information is transmitted to the 360 security guards installed in the user's computer through the back door mechanism. The main instructions are product promotion, deleting competitor products, adding configuration data, etc. Internet experts said that if the Ministry of Industry and Information Technology wants to manage it, it will ban the V3 upgrade of 360, and 360 will die immediately.
360' s back door technical experts pointed out that all computers with 360 security browsers or 360 security guards have objectively become 360' s disposable "broilers". 360 browsers are on the order of hundreds of millions. If someone cracks the 360 security browser to control this back door, it will be a catastrophic event, which may completely lead to the paralysis of a country.
Every reporter
Terracotta Warriors and Horses of the Qin Dynasty
Yesterday (February 25), it was the day when all the APP products of Qihoo 360 were completely removed from Apple for one month.
Just before, the CFO of 360 went to the United States to "offer a humble apology", but the related products of 360 were not put back on the shelves.
source
According to the reporter of the National Business Daily, the National Copyright Administration has discussed and confirmed that the 360 search engine has seriously violated the international rules of robotics, and is currently drafting relevant punishment decisions, and will order 360 to stop the infringement and rectify it at the administrative punishment meeting in the near future.
It is reported that the representatives of the "two sessions" are drafting a proposal to severely punish unfair and vicious competition that undermines the industry and incorporate privacy protection into the "3 15" proposal.
According to an information strategy survey, the proportion of enterprises that answered "refusing to install 360" was as high as 60%.
An Internet company that initially claimed to be safe is facing the condemnation of "unsafe". ...
What the hell happened to 360? What kind of enterprise is this? With such questions, the reporter of National Business Daily uncovered the inside story of 360 through several months' investigation and with the help of a number of programs such as Weibo celebrity "Independent Investigator".
Zhou, the founder of 360, has always claimed that the secret of 360' s success is
Destructive innovation. However, the reporter's investigation found that the success of 360 is more important for its "innovation and destruction": destruction is the goal. By breaking and breaking the existing rules, we can gain market and benefit.
This destruction is based on trampling on the principle of least privilege, which is the most basic principle in the Internet world.
In order to fully restore the true face of 360, "independent investigators" unveiled it layer by layer with superhuman technical ability and efforts, and successfully cracked its internal mechanism.
360 made a fortune in.
"360 Security Guard" and "360 Security Browser", and these two products carry the cancer genes of this company as soon as they come out: they are built on the basis of violating the principle of least privilege.
The reporter of National Business Daily discovered for the first time how 360 implanted an illegal program into its huge "security guard" and "security browser" software, and cooperated with 360 Cloud through the "back door mechanism" in this illegal program, forming a unique secret internal mechanism in the world.
The most surprising thing is that even the inside of 360 is highly confidential.
V3 upgrade mechanism. When 360 wants to launch a war against competing products, it will start the "V3 mechanism"-through "security guards" and "security browsers", it will uninstall competitors' products in users' computers and install the products it wants to promote privately, thus occupying the market in one fell swoop in the most convenient way. This is the real secret of 360' s continuous success.
In this invisible war, 360 shows two kinds of rudeness: rudely infringing on the legitimate rights and interests of netizens (privacy, information and consent), rudely infringing on the basic rights and interests of peers, and unscrupulously destroying industry rules, thus realizing the crazy growth of its "one flower".
The "360" phenomenon not only has great destructive power to the industry, but also has serious destructive power to the Internet order and "cancerous infiltration" to the whole society.
This "cancer infiltration" has turned the original market competition into a battle for the bottom control. The National Business Daily reporter learned that Baidu is about to invest heavily in the security field and will be officially launched in the first half of this year at the earliest, just like Tencent's entry into the security field after the "3Q War".
More sadly, in order to prevent the "cancer infiltration" of 360, several giants from the bottom control to the application layer are involved. The direct consequence of this is that in the future, China Internet will become an Optimus Prime system with Tencent, Baidu, Ali and 360 as the "four countries". And this will turn a complete and rich tropical rainforest-style ecological environment into a place where giants struggle for survival.
Will 360 become a Buddha? This may be a protracted war. ...
The National Business Daily will continue to pay attention.
(For the sake of protecting the personal safety of journalists, the signatures of this group of journalists are all pseudonyms. )
Investigator monologue: Why do I object to 360?
Let me tell a story first.
In real life, we all know the simplest common sense: community security companies must charge service fees to owners. However, one year, a K security company came to a community in a city and announced that they would provide free services for the community. After many twists and turns, K Security Company finally took over the community security business.
After K company checked in, of course, all of them changed into K security personnel, and quickly changed into K company's specialty community monitoring system-monitoring systems were installed in every perspective of the community. Owners feel that this is really a great thing that is hard to find in the world, and they can get the best guarantee for free.
Soon, for safety reasons, K Company resigned from the property management company and replaced it with K Safety Property Management Company; Then, the community garden service company was replaced by K security garden company; Then, all owners' private cars are equipped with K-safe GPS navigation; Then, K-safe logistics, K-safe agricultural products, K-safe clothing, K-safe TV, K-safe computer, K-safe refrigerator and water heater, K-safe door control and lock ... all owners of the community have changed into K-safe signs.
There is only one reason why K security company can replace the owner's things: these "security" services are free.
But one day, when master B and his wife were having sex at home, they found it strange at home in the dark. When they turned on the light, a security guard was monitoring the couple's sex process before bed. The couple were ashamed and angry: How did you get in?
The security guard said, I have the key. For your sexual safety, I have the right to protect you.
B the owner and his wife seek security experts to protect their privacy, only to find that security guards can not only come in for "free viewing" when the couple make love, but also freely enter and leave the owner's room at any time; They not only installed a monitoring system in any public space in the community, but also secretly installed a monitor in any perspective of the owner's room.
The couple decided to call the owners of the whole community to oppose all violations of K Security Company.
But to the surprise of all the owners of the community, just the day before the trial, a large number of information about the owner B and his wife suddenly appeared on the Internet. For example, the picture of owner B with three moles on her ass is widely circulated on the Internet. B The payroll of the owner and his wife is a love letter from the owner and his ex-girlfriend 10, which was turned out from his ex-girlfriend's computer.
Master B and his wife suddenly fell into the whirlpool of the Internet. ...
In the field of Internet in China, 360 is K Security Company.
In China, why can 360 gain such an important market position? Apart from users' weak awareness of privacy, information and network autonomy, the biggest problem is that China netizens are still "white" about the Internet. They have no way to see what 360 has done and distinguish what is feasible and what is not. It is also unclear what some behaviors of 360 mean today and what they mean tomorrow.
I keep repeating the scenes in Kafka's novel Castle in my mind. You don't know why or what happened. Then, you were slaughtered.
In the moonlight of Bai Sen, Jojo grinds a long knife. ...
-confessions of independent investigators
technical article
360: Cancer Cells on the Internet
Every reporter
Terracotta Warriors and Horses of the Qin Dynasty
Shenzhen, mangrove forest, close to Shenzhen Bay Park, with winding seawall scenery belt; At the other end of the sea are mountains and buildings scattered in clouds. That is the Hong Kong Special Administrative Region.
After 100 days of arduous online technical exchanges, the reporter of China Business Daily finally made an appointment with an "independent investigator". This is the second meeting between us. This time, we only agreed to do one thing: reinterpret some unknown behaviors done by 360 (Qihoo 360 Technology Co., Ltd., this article is referred to as 360) behind the scenes on the Internet.
This process is long and complicated. For several days and nights, the online demonstrations conducted by independent investigators were shocking, and many dynamic processes could not be presented in printed words. In fact, what the independent investigators have disclosed on the Internet is impossible for most netizens to understand.
20 12 10, Weibo, a signature "independent investigator" began to attack 360. Today, the reporter of the National Business Daily has been following this person for three months: at first, communication was basically realized through the Internet, and gradually, direct communication was provided by telephone.
In the collision of ideas, the reporter found that "Independent Investigator" has a deep dislike of 360; His research on 360 is also very profound. What makes the reporter of National Business Daily extremely curious and puzzled is: Where does his motivation come from?
"If you have cancer, what is your first reaction?" The independent investigator asked, "That must be cut off quickly! And 360 is the cancer of the network society.
- Previous article:How about Beijing Wang Bo Kaiyuan Property Management Co., Ltd.?
- Next article:How to play in Zhoushan Wu Bi
- Related articles
- I lost something in the neighborhood for five months. How to deal with it?
- What is the appreciation space of Chengdu Dongyuan in sunny days?
- Property installation curtain wall
- Who is the developer of Chengdu Haibo Spring Diamond Plaza?
- What about Beijing Donghai Sheng Property Management Co., Ltd.?
- What is the telephone number of the sales office of Yanbian Paris Mansion?
- What is the telephone number of Xianning Mingmen Capital Marketing Center?
- How about R&F Property 400 customer service?
- What is the telephone number of Urumqi Zhonghai Yushanfu Marketing Center?
- Kunshan Lanting Tian Yue belongs to which community?