The rise of nanometers

Chapter 164 The escape door

December 21st.

Huang Xiuyuan's motorcade passed through Jiujiang, Gan Province, and then entered the southern Anhui region.

That day he stopped to rest in Qianshan County.

Xiao Yingnan reported to him some of the company's important tasks today, and then Zhang Lei brought dinner, a Jiangmao dumpling, Micha pork and Xuehu tribute lotus root, plus a Dingxue tribute cake and an apple.

Jiangmao dumplings are actually small wontons. Huang Xiuyuan took one bite at a time, picking up a piece of Xuehu tribute lotus root from time to time. Xuehu tribute lotus root is made of lotus root slices sandwiched with meat.

Halfway through the meal, he took another big gulp of the hot soup.

After eating, he turned on his laptop and connected to the hotel's network. This was a computer he specifically used to access the Internet. If it was a laptop that stored important information, it had been specially modified. Even the Internet module had been removed to prevent the laptop from being damaged. Some backdoors actively open the network connection system and upload files.

The laptop he was surfing the Internet on in front of him generally did not handle sensitive and important information.

Suddenly he found that the monitoring program he had implanted into the system prompted that the system was downloading patches in the background. When he opened the monitoring program, it turned out to be a vulnerability fix for the Microsoft system. There were two patches in total.

Huang Xiuyuan glanced at the patch code. Suddenly he frowned and typed quickly on the keyboard for several minutes.

He stripped down all the codes for the two patches. He is more familiar with Microsoft system code programs than Gates.

"Is it the butterfly effect?" In his memory, Microsoft did not carry out an update to fix the vulnerability on December 21, 2009.

I re-checked the codes of the two patches and looked at the effects after the patches were inserted into the system.

Huh? This is it?

Huang Xiuyuan's eyes suddenly shrank, he verified it again and found that one of the patches could actually cause a vulnerability in the email firewall.

The other patch is a related plug-in, and it happens to be related to the login page of Time Blog.

After downloading a New Blue Blog and a Penguin Taotao, Huang Xiuyuan found that the login pages of these two software were not associated with the plug-in.

As the same type of software, under normal circumstances, there is no reason to only associate the login page of Time Blog unless it is for some special purpose.

After rechecking this part of the code, he found that although these codes will not affect the login of Time Blog, as long as the computer system time is inconsistent with the standard time, it will cause Time Blog to be unable to log in and crash.

Damn it, are you planning to specifically optimize Time Blog?

Coupled with another email vulnerability, hackers can easily bypass firewalls, implant Trojans into computers, and change time data, which is just a trivial matter.

Moreover, the other party did it very covertly. The page association did not directly act on Time Blog, but on the video website that Time Blog was testing recently - Time Video.

Through time video, it affects the entire time system software.

This kind of very obscure backdoor would probably be impossible to discover if someone was not familiar with the system. If Huang Xiuyuan was not very familiar with Microsoft systems, he would most likely ignore these two patches.

He calmed down quickly. Judging from the current situation, it was 100% intentional to negatively optimize Time Blog. This was a conspiracy specifically targeting Time Blog.

If he guessed correctly, the other party's attack on Time Blog should be on the day when Time Video is officially launched after the public beta.

That is January 1 next year.

This is because the blame can be directly passed on to Time Blog itself. If there is a large number of gossips, saying that there is a problem with Time Information’s own update program, resulting in the inability to log in and crash, then Time Blog will definitely jump into the Yellow River and not be able to clean it up.

He immediately called Jiang Miao.

"Hey, Mr. Huang, what are your orders?"

"Microsoft updated two patches tonight. You immediately asked people to test these two patches. I found something wrong."

"Patch? Okay, I'll order you right away."

"Remember not to alert the enemy, collect all the evidence, and prepare patches immediately to plug the other party's loopholes."

"clear."

Jiang Miao, who was at the Shanmei headquarters, hung up the phone and came to the network monitoring department. Xiao Yuansheng, who was in charge of the night shift, immediately looked solemn after hearing the news.

Their network monitoring department is responsible for the firewall and information security of various software under Time Information. Although they noticed Microsoft's patch tonight, they didn't pay too much attention to it.

"All of you, please cheer up and start testing the risk items of the system." Xiao Yuansheng shouted and then turned around:

"Mr. Jiang, I need support from the software laboratory."

"no problem."

Through the internal communication software, network monitoring department and software laboratory, as well as elite programmers recruited by Jiang Miao, a comprehensive analysis of the two patches was conducted.

In the dead of night, the Time Information building is still brightly lit.

Around 3:40 in the morning.

After nearly nine hours of repeated testing, Xiao Yuansheng took an investigation report and went straight to the president's office on the ninth floor.

"Mr. Jiang, the situation is true. Those two patches are indeed abnormal. Patch A can bypass the firewall through email, leaving a backdoor for hackers to operate. Patch B is associated with Time Video and then connected to the entire Time System software."

As he spoke, he typed a few codes on a computer. The system time was slowed down by one second. Once connected to the network and matched with the network's standard time, on the login time information page, Unable to log in.

Jiang Miao, who hadn't slept all night, rubbed her temples: "It's so hard to guard against it!"

"Indeed, if Mr. Huang hadn't discovered it, we would have been kept in the dark. When the other party attacks, we will be caught off guard." Xiao Yuansheng was still frightened.

Jiang Miao immediately ordered: "We still let down our vigilance too much. We must learn a lesson. From today on, all software related to us, even operating system updates, must be alert. The enemy is always trying to subvert us."

"I understand. I will deeply review the lessons learned this time." Xiao Yuansheng also understood.

Time information is very important to the Suiren system. If we want to promote domestic systems, domestic frameworks and domestic chips, then as the basic disk of the software ecosystem, time information must not be left behind.

The enemy is aware of this weak link and plans to abolish the influence of Time Information in the software industry before the Suiren system has closed the loop.

As long as there is no software ecosystem support, Suiren's new semiconductor system will be self-defeating and will at best survive within official organizations and some companies.

Jiang Miao immediately collected all the evidence and contacted Qin Lizhang who was stationed in Shantou Mei. After explaining the situation, he made a copy of the information to the other party.

Time Information also prepared relevant patches within two days, ready to plug the loopholes in the email system at any time.

Qin Lizhang had also made arrangements. The emergence of this incident made the higher-ups more concerned about the security of foreign software.

After all, today you can optimize the Time Blog, but tomorrow you can block the official account. This kind of thing is absolutely intolerable.

December 25th.

Time Information is on the Time Blog, directly attacking Microsoft and listing the evidence that the patch has set up a backdoor.

On the same day, it was revealed that Microsoft’s Greater China branch was being interviewed.

Suddenly the Internet was in an uproar.

Thank you for your support (ω`), and thank you book friends "Shui Luan丿 Jiangnan" and "Ya Zhi on New Year's Day" for your rewards!

Five updates today, the first!乛v乛hehe

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like