Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 1396 Detonation

Chapter 1396: Detonation

"Just for this?" the opposite person asked in disbelief.

"Otherwise, it won't matter if I lose 1 billion, but I can't stand the bird's aura."

"Huang He, you are really a lunatic!" The president of Fantasy Computer is also a ruthless person. After scolding him on the phone, he hung up the phone directly and didn't give Boss Huang a chance to scold him instead.

But no matter how much you scold, the actual problems after painting still need to be solved. As Boss Huang comes out to lead the pace, the public opinion environment in the entire market has become even worse for Fantasy Computer.

Then such public opinion was quickly reflected in the specific sales data. Fantasy Computer's online and offline platforms reported that sales data had sharply decreased, with a drop of as much as about 40%. If this range continues, then the collapse of Fantasy Computer will only be a matter of instantaneous.

Some people may find it strange that this fantasy computer company has a big business, even if sales drops as much as 40%, it will not collapse in a flash.

The problem lies in the four words "family": "Home, big business". A few years ago, Fantasy Computer spent a huge amount of money to acquire IBM's personal computer business in the United States, and then made arrangements in various regions around the world. The methods were extremely simple and crude, which was to acquire the strongest computer sales company in the local area.

Later, these departments were integrated together and became the current international fantasy film, becoming the world's number one personal computer sales company, with a market share of about 30% of the global market.

This also brings a huge problem, that is, Fantasy Computer consumes or even overdraws a large amount of funds, leaving the entire company's capital chain in an extremely tight state. Once a large-scale capital loss occurs, resulting in a broken capital chain, let alone Fantasy Computer, even Microsoft will show you what to do.

Knowing this situation, Fantasy Computer still dares to acquire companies so much and very quickly. In addition to the huge ambitions of its helmsman, it is more important that they have enough financial confidence to do these things, and this part of the financial confidence comes from their income in China.

Fantasy Computer obtains a total revenue of RMB 300 billion in China every year, and its net profit exceeds 10 billion. This is why Fantasy Computer dares to acquire a large number of companies in such an exaggerated way, because it owns China, an inexhaustible and inexhaustible funding database.

As long as Fantasy Computer's market position in China is still there, Fantasy Computer can gradually settle the huge acquisition fee.

But now my basic market is moving, with a drop of more than 40%, which instantly makes the capital chain of Fantasy Computer tight.

Now the total amount of loans that Fantasy Computer needs to repay is as high as 16 billion yuan per year. If this loan cannot be repaid, Fantasy Computer will inevitably enter a state of collapse.

However, the helmman is full of confidence in this. He expressed his extremely confident attitude at an internal executive meeting. The 40% sales decline will not have any big problems. First of all, this sales decline is temporary.

The most important thing is that Fantasy Computer currently has no major competitors in China. If there is no major competitor that can threaten the market position, the sales volume of this 40% decline will sooner or later rise. After all, it is impossible for users not to buy a whole computer.

If you buy a whole computer, besides Apple, the strongest and best brand is fantasy.

At the same time, in order to further encourage the confidence of all employees, the helmsman further stated that in fact, domestic individual complete computer users only account for 38% of the total number of Fantasy computer users. The real majority of Fantasy computer sales are actually the office computers of corporate offices and major institutions. This is the market with the largest market and the most profitable ones.

This market cannot be disrupted by a little public opinion environment. After all, consumers in this market are the consumers who care the least about prices in the world, and they will not care about the prices in other countries.

In fact, the words of this helm are basically in line with the reality, that is, fantasy computers do not have to worry too much about public opinion issues, and can wait for time to soothe everything.

Of course, there is a prerequisite for this, that is, the partners of Fantasy Computer must be reliable partners, not huge cheats, such as those who like to install backdoors in the operating system.

There is also an international friend named SND.

Edward SND, who joined the US Army in 2004, was eager to participate in Latin America's military operations, but because he accidentally broke his legs during training, although he tried his best to return to the team after he recovered from his injury, he was still forced to retire.

However, it was precisely because of his strong patriotism during military training that he got a job in the Security Bureau and later worked as an information technology security guard, and was quickly improved with his outstanding network knowledge and computer skills.

In 2007, he was responsible for the work of a computer network security officer sent by the security department to Geneva, Switzerland, but in fact he was the same one.

He then left the security department and worked for Dell Computers, and then joined Boss Allen, a company specializing in security departments, responsible for a large number of cybersecurity issues.

During this process, Edward SND mastered a large amount of first-hand information. By the end of 2015, he felt that he could no longer bear the torture of his conscience and morality, so he resolutely chose to give up his annual salary of $200,000, secretly copied all the information, and went to Russia directly through secret means, and then handed the information in his hand to major media around the world, which immediately triggered a sensation in the LJ Sect time around the world.

The detonation time in history was actually in 2013. If it was two years late in this world line, many changes would naturally occur.

For example, the information collected by SND is more comprehensive, not only limited to the United States, but has almost found ways to retrieve all the information from its surveillance networks all over the world. In the end, all the information sent to the Internet is 12 times that of another world, and the total amount of information it provides has reached an astonishing 12.8TB.

In my previous life, except for the Americans, people from various countries were all just a melon-eating crowd, and they did not have too much anger because of this revelation.

Because almost all of the information exposed before is the personal privacy of Americans, ordinary people abroad are not interested in collecting the privacy of their own people.

Secondly, everyone knows that the government’s collection of personal privacy is not harmful to me. On the contrary, if these privacy falls into the hands of neighbors and colleagues, it is the biggest crisis.

If the government wants it, just take it. Anyway, he can't use this privacy to blackmail my money. This is why SND seemed to have caused a lot of storm in his previous life, but in fact there was almost no change to the government. On the contrary, the US government simply used these actions that were originally intended to be hidden in private and directly recognized them, and then put them on the table. This also made SND's efforts a complete joke.

But as the world's information continues to enrich, many information that has never been published in the world has been released.

For example, a complete set of communication memorandums for security agencies and major terminal companies around the world. In these memorandums, the security department requires these communication enterprises to implant a hidden monitoring program in their own personal products to secretly monitor chat messages from all terminals. Once certain sensitive words and letters are involved, the entire message must be recorded in full as soon as possible and uploaded to the security department.

Not only that, the security agency initially required the hidden program in the background to have the permission to directly control the user's mobile phone in an emergency. Unless the user directly picks up the battery, even if the user chooses to shut down the phone, the entire terminal can be controlled under a black screen state, thereby protecting the security of the United States.

These orders are very direct and strong requirements. If these terminal companies do not agree to do this, they will give strict measures. In the end, major terminal companies almost completely accepted this requirement.

However, these terminal companies also stated very simply in their reply that they could not fully accomplish this requirement. At most, they would add a hidden mini program that can monitor text information and keyboard input to their mobile phones, but it is absolutely impossible to control the operation of the entire terminal in the background.

Because if you want to do this, you must control the terminal system, but now the terminal systems around the world are the new generation of Lingxiao terminal systems provided by Jiangnan Group.

Although the Lingxiao terminal system is free to all manufacturers, all manufacturers have is the right to use the system and the right to edit the outer layer of the system. The underlying logic of the entire system cannot be modified unless someone from the security department goes to Jiangnan Group to ask them to modify the marketing terminal system to meet their requirements.

As a result, the security agency really went to find it, but the person they contacted was reported directly without saying a few words, and they are still locked inside.

The security agency is angry, but there is no way. After all, they are just free authorization systems and they don’t even do terminal business. What else can you use to threaten them?

However, security agencies still gained a lot of privacy information on terminals.

In addition to terminal monitoring, there are many monitoring in all aspects, and the most exciting one is the requirements for the Windows operating system.

Just like the previous requirements for terminals, the security agency naturally put forward the same requirements for Microsoft. As a result, Microsoft agreed very simply and accepted the requirements of the security agency and designed such a backdoor program.

In the information of SND, all the code and data of this backdoor program are even provided in full. This backdoor program is not only valid for individual users, enterprises, servers, and only a part of the data exchange center.

This backdoor program can not only monitor various privacy messages, but most importantly, it can also lock the systems between the systems at critical moments.

This locking state is not a problem that a user lock or a blue screen can be solved by just reinstalling the system.

Instead, it directly locks all the user's hard disk data.

Some people may think it is nonsense. No matter how hard disk data is locked by a system, I just need to unplug the power supply, remove the hard disk, and find someone to recover the data. How can a program lock the hard disk data?

But this is indeed something that can be done, because Microsoft has designed a small trick, which is to encrypt all files.

Many people should have used compression tools. Using compression tools can compress a file and turn it into a new file with completely different data. If you add a password to the compression of this file, and the password is still a 268-bit English digital password, unless you can get the decompression password, even if Jobs is reborn, he will not be able to help you crack the password.

Microsoft has specially developed such a compression program that can compress all files and information in the user's hard disk, and then add a 268-bit English key to the compressed file. Even if you find someone to recover the data in the hard disk again, you will get a packaged and compressed encrypted document, and you cannot obtain all the information in it.

Now such a backdoor is widely present in all Microsoft systems. Once the security agency believes that a user's computer poses a threat to security, they can directly order Microsoft to directly control all files in the system through the backdoor, so that the computer and various data inside will basically be disabled.

It is also conceivable how important files and data are to users. For example, the thousands of G educational films in your hard drive are suddenly locked, and that kind of despair can be understood compared to it.

In addition to these two most important news, many other explosive news were released in the document, and then naturally the world media was in an uproar, and countless media reported it fundamentally.

Not to mention how the security agencies in the United States should deal with this bad situation, just talking about the internal situation of China, there are waves of waves, and at the same time, the problem of a re-producing old tune is re-producing again.

That is, China should use its own operating system instead of using a system developed by foreigners, which is an extremely fatal threat to China's network security.

At the beginning, only one or two experts mentioned this, and then it quickly received support from many netizens. But soon, a heavyweight expert joined the proposal, which immediately increased the whole thing by several orders of magnitude again.
Chapter completed!
Prev Index    Favorite Next