610 Chapter 609 Sword Points to the Internet (Subscribe!) (2/2)
Face recognition.
This is different from micro-expression recognition. The former only recognizes people, while the latter directly recognizes hearts.
Because of the previous case of ”Xunqin.com”, the country is vigorously building a public video surveillance network during this period, and Tang Qing opened up analysis services for major cases, so there is a blind spot.
Except for airplanes, real-name authentication has not yet been implemented for other transportation vehicles. There are quite a lot of criminals at large across the country. This thing is given away as a good deed.
Sit for a while.
Tang Qing was greedy.
Let the soldiers pick some fruit from a training area.
Cocked Erlang's legs.
It's crisp and refreshing to eat in big mouthfuls.
This time Cui Han's invasion was to exploit the vulnerabilities in Microsoft's system. Tang Qing was surprised at how many vulnerabilities in Microsoft's operating system were. After learning about the vulnerabilities in Microsoft's operating system, Tang Qing was surprised.
The soldiers found hundreds of them. This is still a major loophole. Generally, there are more loopholes.
These Tang Qing also endured.
After all, most of the vulnerabilities are not intentional by Microsoft. There are too many underlying codes in the WINDOWS system, and it is extremely normal to have vulnerabilities.
There are so many that are not too shocking. After all, the soldiers have the second aid, and most of the vulnerabilities found are those that will not be discovered during the life of this software.
The key is that there are nearly 20 vulnerabilities in Nima that were left by Microsoft deliberately. These vulnerabilities were used by the FBI, CIA and other US intelligence agencies to monitor public information during the interception of Internet surveillance data in the command room.
As long as they want to know, they can invade any networked computer with a Microsoft operating system, obtain the highest authority, and browse the contents of the computer in secret without triggering any alarms and records.
Even turn on the camera function without lighting the camera.
Port data mirroring shows that they are quite rampant.
Tang Qing knew about it before, but didn't care about it. Anyway, the domestic confidential information is all on the internal network. No matter how powerful the CIA is, it is impossible to invade a physically disconnected LAN, but Cui Han's affairs remind him.
The fort can also be breached from within.
Before, because it intercepted the personal information of domestic users and the data in the computer at most, Tang Qing did not bother to care about it when people in the country did not care. Anyway, this information is even if you are doing sports with people naked. If you get it, it will be deleted as spam.
Now I find they can still play like this.
Tang Qing couldn't sit and watch the show.
It seems that he has to find something to do for Microsoft and the US intelligence agencies. As for the complete solution of domestic information security risks, it is impossible in a short period of time, so he should not be asked to patch Microsoft.
He is not so kind yet.
Besides, with so many vulnerabilities, it doesn't seem to be that difficult to kill Microsoft. If you add in the computer prowess of the analysts under him, you can grab a half of the country.
This idea.
It seems a bit crazy.
Tang Qing knew that Microsoft actually did not want to leave such loopholes, but in the face of the requirements of those intelligence agencies, in order to maintain the information security of the United States and maintain its leading global information advantage, Microsoft had to compromise.
This is the opportunity.
Although the current position of the Microsoft Empire seems to be extremely stable.
However, in the face of Tang Qing who has this group of'robots', it is relatively speaking, he has the inherent ability to overturn this industry.
If Tang Qing wants to get a share of this industry, he will definitely get it.
”Tang Yi, officially launched the Internet Industry Alliance Program to activate all the seed companies in the plan.” Tang Qing ordered immediately.
”Yes, commander in command.” Tang Yi finished speaking and began to operate.
This plan was established very early.
Just when it first cooperated with the state to obtain the “Blue Gene” supercomputer authority, the command office promoted the information security hosting service of the government website to the capital.
At that time he wanted to start with the anti-virus software industry.
The plan was to establish several information security companies, and then use some means and mergers and acquisitions to slowly control most of the global information security market. Later, this plan was established.
Of course, it involves not only information security, but also all aspects of the Internet field, and even the hardware field.
It's just that the company has just been established, and it's not time to do things. Every line needs to be accumulated. Therefore, only a certain degree of seed company creation has been carried out in various countries, and a total of less than 100 million US dollars of initial capital has been allocated.
His plan is to wait for the completion of the third Paixiu plan next month before working on both hardware and software.
However, due to Cui Han's affairs today, Tang Qing decided to do it in advance. Anyway, the cost of the software is almost nothing, but the promotion cost is a bit high and it is still within the acceptable range.
And the investment in hardware can only wait for the completion of the Pai Yao plan next month.
It's not that he has no money in his hands now.
But many plans are chained, one link after another, and it takes time to execute.
Even if you have 10 billion dollars, you have to make others willing to sell you things, but why do others sell them well?How to sell?What is the price?How to deal with competitors?How to avoid future troubles?
These all need time to operate.
In order to obtain the maximum benefit at the minimum cost.