PDA

View Full Version : apparently did not regard it as rogue software


fangbjia5duo
03-21-2011, 03:54 PM
This may be the legendary
and do not dwell on whether the illegal plug the buttoned bodyguards,christian louboutin pumps (http://www.topchristianlouboutin.com/christian-louboutin-pumps-c-2.html), do not play word games with the 360, and directly say: never had the shaking conspiracy.
very dark, very violent. Will not disappoint you, and go on.
first layer: built-in back door, the user computer change interface. The interface has 360 digital signatures, and without making authority limits.
You did not understand? Well, said simply, is this something that can be used to break through all security software protection, is a
excuse the back door, are those who control access to bypass security procedures or systems. And the Rising in the 360 ​​and had a war, rising to 360 programs found in possession of the back door; 360 sorts of denial until the last to admit: This is a back door! The purpose of opening the back door
obvious: In any case, the 360 ​​can be controlled by the software user's computer, including installation, delete the specified software, upload, download any program or data file,jordan 9 (http://www.airjordanfan.com/air-jordan-9-ix-c-538.html), or use to attack others on the network computers. Incidentally, the back door may also be other hackers, a real
broiler. Is to let your computer of town and want what means you prefer. And you all know.
Topics: 360 unfair competition provoked outrage
second layer: the laying of landmines, ready to cut off the upgrade path
QQ security expert and then give them: 360 bodyguards through buttoning a shirt similar to the virus embedded logic, forced cut off the normal QQ software upgrade, repair itself and prevent the QQ. 360 at any time through its QQ software, even if the user found that vandalism, but also because they were kidnapped and 360 could not help the network channel to Tencent. Users found this code, said:
third layer: Forged QQ dropped to defraud the 600 million user privacy
feel that shocked even the experts! It is true,tory burch flat (http://www.hot-selling-toryburch.com/tory-burch-flats-c-20.html)!
360 buttoning a shirt bodyguard also embedded a terrible scam. Parsing code, found that 360 of its cloud operating by bodyguards issued instructions to buttoning a shirt, so the pop-up Also, the window will be completely simulated QQ prompt window, the possibility of a great friend you are deceived!
so-called But the experts think: this could a cover 360 actually take the initiative to obtain this information, the purpose of this trick: just to make the whole process seem like a steal
Oh, very clever, genius!
emotion Netizen, Hong Zhou era in the 3721 gangster buddies, and now the 360 ​​earlier interview, President Qi Xiangdong said, This is what the original!
had insider sources, the 360 ​​began as early as six months ago, QQ contemplating how to steal the user's privacy, stealing their behavior after being intercepted Tencent technical experts, theft scheme bankruptcy. The 360 ​​trick by creating Trojan QQ user privacy is the most direct evidence.
Topics: 360 unfair competition to provoke outrage
climax: the reduction of the presence of top-secret plan: 360 new products are brewing will set off a bloody, internal name of this product called
said that with the recent large imports of the popular Hong Zhou is said to be like the movie, oh.
This product has been initially formed at that time, 360 can be seen as Initially in the form of promotion because the safe deposit box: just 360 were washed, emerging from the shadow of rogue software name, but also need to obtain user trust, and secondly, technical exercise will take some time. After all, this is an unprecedented large projects.
safe compared to its predecessor, Pirates of the dream box, of course even better: all network connections for users of paramount right! Any network user interactions, must be carried out by the Pirates of the dream box, and accept the 360's In short, as we have security at the airport when the baggage must be X-ray scanning, the difference is that this box go 360 all,
understand it!
this way, the user all the information transmitted in the 360 ​​monitored. Not to mention the relationship between the chain, and want anything like Tannangquwu general. The insider said the Pirates of the dream of the box is much higher than the strategic value of IM itself, this is the real masterpiece shaking conspiracy.
for why the control box and came out only QQ, some people believe that the reasons for preterm birth. But more people tend to think that, of 360, the control of QQ to control everything. Well attacking distant past, the old Internet in the week but the
Topics: 360 Hong Zhou unfair competition provoked outrage
perfect performance
teachers in more than a month-long war of words on Tencent, the 360 ​​all the public appearances of things do the job by his deputy, Qi Xiangdong. The Hong Zhou is uncharacteristically no longer attack each other at great length, but the frequent occasions to attend various media to share the experience, like Lonely Yehe. He said 360
know the real plan, then this fight is really Hong Zhou obviously not as willing as bodyguards, he really 360 buttoning a shirt guard to take on this task is
360 companies from the beginning to start saliva constantly, only the last year to get involved Rising, Kingsoft, Baidu, Tencent and a series of unfair competition lawsuits. Many in the industry that overtly or covertly Hong Zhou is a Zhou Hongxin then accept the call 250 because he felt that 250 +110 = 360, which is his favorite role - Internet police. Grudge against her false police. instantaneous rain
industry experts said in the blog, prelude rogue software, creating a local does not exist, nor should the historical existence of rogue software and add glossary of mankind the 'rogue software' word. continue, but now 360 is to create a new history, not only the rogue software, it is not only illegal plug-in, is unprecedented in the history of human civilization, commerce, the blatant theft. Such behavior can not be timely if brought to justice, the Chinese Internet will completely fall into darkness. Remember, not only the darkness of these Internet companies, and ultimately the user of your darkness.
Chou, good China, Hong Zhou first rogue software is a masterpiece of 3721. However, leaving Yahoo, he immediately raised his knife to the 3721, and so
a recent interview, Hong Zhou recalled, not without emotion, 3721, that very heavy on my heart a little. In the development of 3721, when, apparently did not regard it as rogue software; to kill it, in order to establish their own severing of the image, it pains wear the hat of rogue software, the so-called Hong Zhou thing is the teacher himself. Now draw a conclusion, showing amazing that feeling of licking the calf. This is what disturbed the I am a bit dizzy.
However,rain under the eaves (http://BASILSANDS.COM/?q=comment/reply/842), this can help us down the path interpretation of the Hong Zhou of the second cycle.
buttoning a shirt, there are two extremes bodyguards prospects: one conspiracy to succeed, the Penguins defeat. This is not entirely unlikely event of 360 to achieve restoration of the Internet in China, not only of its opponents, even behind all the 360 ​​companies today, whether it is Sina, Sohu, Netease, or all, 4399, will be crushed into 肉泥. Think of Hitler, the British, the great Japanese in World War II the United States doing things right.
Another possibility is that 360 failed. Threat in their public relations and media madness, 360 reputation at stake. A little more power as long as its a few years to maintain it's On the other hand, 360 security guards, bodyguards and 360 buttoning a shirt full range of products will become the user's computer can not remove the zombies.
most exciting are: Hong Zhou most likely will further develop a product, specifically uninstall the zombie, so he raised the knife again, deeds.
Topics: 360 unfair competition provoke outrage