Capítulo 131

Chapter 227 Chen Xu Fishing for Chickens (Part 2)

Chen Xu ultimately gave John a firewall, which was indeed much better than those firewalls on the market. Whether in terms of security or the accompanying antivirus software, this firewall was undoubtedly a top-notch product.

Of course, this new device is far inferior to the firewall Chen Xu gave to the military last time; at best, it's only one level better than current mainstream firewalls… Of course, Chen Xu might not care about this small difference, but that doesn't mean others don't. As the saying goes, "one should strive for even greater heights," and many firewalls have already reached their limits.

The firewall is named "Glacier," a name Chen Xu came up with on the spot. But it has one major drawback… its hardware requirements are extremely high!

Its basic configuration requires 128MB of RAM and a dual-core 2.0 CPU... This doesn't seem like much, right? But this is just the basic configuration!

In other words, running this firewall with this configuration will nearly saturate the system resources, making it impossible to perform any further tasks! Therefore, ordinary consumer computers simply cannot run this "Glacier" firewall perfectly. High-end configurations are required!

As you might have guessed, a backdoor was automatically opened in this firewall.

This backdoor is completely embedded within the firewall and cannot be patched. Furthermore, it's extremely well-hidden; even a skilled user wouldn't be able to detect it. This is because firewalls are inherently connected to the network, meaning they are simultaneously defending and transmitting data for Chen Xu.

Therefore, any computer with this firewall installed will become Chen Xu's botnet! It's important to know that installing such backdoors in firewalls or other system software is a major taboo and despicable. So this time, Chen Xu didn't use the SMMH identity at all… anyway, if anything goes wrong later, it won't be his problem.

However, Chen Xu did tell John about the backdoor installation in the firewall. His meaning was clear: this firewall was an opportunity. But he wasn't going to help him for nothing. He didn't want John's money; he just wanted the firewall distributed so John could use it to make money without worrying about piracy… What a joke! Xiao Min's stuff, while the firewall's technology wasn't advanced, it used a double helix structure, making it difficult for ordinary people to crack.

"This firewall is unique on the market, and you'll soon see its superiority. If you have skilled hackers, it's an incredibly powerful shield." This statement reveals how Chen Xu kept it hidden. The firewall he provided to the military with withstood attacks from a top global cybercrime organization for a full month, but this Ice River firewall still requires human operation to defend against hackers… Of course, its automatic defense is very effective against viruses embedded in the network, but based on current TCP/IP rules, the Ice River firewall cannot completely defend against many common hacker attack methods on its own.

After Chen Xu made his statement, John also fell silent.

He knew perfectly well what a blow it would be to a company's reputation if its firewall contained a backdoor. Once discovered, the company would inevitably face intense public condemnation. In the media-driven UK, such an incident would almost certainly result in the company's bankruptcy… there was no other choice.

So John asked, "So, is this backdoor program you've created discreet enough? Won't others discover it?"

Chen Xu replied, "Although the backdoor is well-hidden and rarely used, there's still a possibility it could be discovered. After all, this firewall is based on the rules of the current operating system, so it's still possible for someone to find out that your computer is sending data out on its own."

John was now in a real bind. The implication was that another expert might discover the backdoor… something he was certain of. Since the other side wasn't confident, the outcome wasn't just a possibility, it was a certainty!

Because he could foresee the effects of releasing the Ice River firewall. It was a product a whole level above current mainstream firewalls worldwide. While it would bring the company substantial profits, it would also undoubtedly attract many envious enemies.

Among these people are many experts and masters from large security companies. They will definitely try to crack this firewall. But if they discover a backdoor while cracking it, they will definitely pay the media to launch a verbal attack against them... That's for sure!

It's not worth it; it really will be a case of losing more than you gain!

But John didn't want to let this opportunity slip by.

This is a dilemma!

Chen Xu knew this was a difficult situation. But he also knew that the problem lay with John, not him. All he needed now were bots, lots and lots of bots… not too many, a few thousand or tens of thousands would be enough.

So he wasn't worried at all.

Based on the information, John wouldn't let such a golden opportunity slip by!

Because if he missed this opportunity, Liam's company would be finished, and with the company's demise, his life of extravagance would also come to an end.

Many people are like this; they aren't blind to the present or future crises. However, they often develop a mindset of simply getting by, much like the Southern Song Dynasty, clinging to life in a state of decline. They aren't unaware that without effort they will become beggars, but perhaps they are lazy, or perhaps they tried and failed, so they prefer to drift along, numbing themselves with a life of extravagance and debauchery.

That's a form of escapism.

It's like smoking opium.

But subconsciously, they know their money will eventually run out. Once the money is gone, they won't have the chance to smoke opium again. The problem is they don't have a good way to make money, so they can only drift along day by day. But when they are suddenly given a sure way to make a lot of money, enough to make them rich for a lifetime... they will unleash amazing potential and passion.

This is not contradictory.

Chen Xu finished his work and went to sleep, leaving the rest of the mess to John. John immediately convened an emergency meeting with his think tank to discuss the firewall.

At the same time, we will also conduct a test on this firewall.

After all, if the firewall wasn't as valuable as the mysterious person claimed, they wouldn't even need to consider it. They could simply refuse!

But the test results surprised everyone.

After various tests, the final result is that, apart from consuming too many resources, the stability and defense of this firewall are truly amazing!

It's fair to say that this Ice River Firewall is an impenetrable fortress!

Compared to ordinary firewalls commonly found on the market, it boasts higher stability and security, making it far more powerful. Its filtering of viruses and Trojans, and its screening of data streams, far surpass those of ordinary firewalls!

But it's ironic that a firewall could become a hacking tool. John and his team couldn't help but think, "Wouldn't it be great if this firewall had absolutely no backdoors?"

Liam can use this firewall to make a comeback, surpass other companies in the same industry, and even qualify to climb into the ranks of first-class companies and gain more market share!

So someone suggested unpacking the firewall and patching the backdoor ourselves, wouldn't that make it perfect?!

They acted on it without hesitation, but after a full three hours, all the programmers at Liam Corporation had to abandon this "foolish" idea... It was foolish because they realized the gap between them and their counterparts was too vast! They couldn't even get through the firewall's outer shell, let alone understand its workings!

This firewall program differs from other software. Other software comes in an installer containing various system files. For example, an .exe file is the executable program, and there are other files with their own functions… But this firewall consists entirely of a single .exe file – a complete, unified whole!

This overall structure meant that Liam's programmers couldn't even penetrate the outermost shell, let alone modify or patch it.

Only a few top programmers discovered that this firewall was constantly connected to the outside world, possibly using this method to open a backdoor. However, because Chen Xu was asleep at this time, they couldn't find out how the backdoor actually worked. This single backdoor, however, was a thorn in the side for everyone at Liam Corporation, causing them immense distress.

Many people in Liam will have trouble sleeping tonight.

"This is drugs!" After all other methods failed, John couldn't help but complain, "God, why use drugs to lure us? You know we're just mortals, we have no resistance to temptation! God! Why are you torturing us like this?!"

"How about we try a different approach?"

At this point, one of the think tank members offered an opinion: "First, we need to figure out, Mr. John, what that mysterious person's intention is. What is his or their purpose in creating such an advanced firewall with a backdoor? Does he want to steal user data, or does he want to control user computers? Or perhaps he just needs some high-quality botnets to provide data flow support for future hacking battles?!"

"What's the difference between these?"

"Of course there is a difference. If it's the first two possibilities, then we absolutely cannot agree to it, because once it's discovered, it will be a scandal, an absolute scandal! But if it's the third possibility, then I think we have a way."

Chapter 228 The Willing to Take the Bait (Part 1)

John became interested: "Tell me your thoughts."

“Yes,” the aide named Carter said after organizing his thoughts, “We know what a firewall does. It’s to prevent viruses and Trojans, ensure user network security, and protect user data from being stolen. Right? So, if the purpose of this firewall is to steal user data, then I’m sorry, no matter how well it’s done, we can’t accept it. Because that goes against the very purpose of firewall software.”

"That's right, let's continue, focusing on the third scenario!"

"The third scenario is that the attacker simply wants to use this software to acquire botnets—high-quality botnets! In the experiment just now, you've already seen the advantages of this firewall. A major feature is its stability! We know that when a firewall is attacked, it consumes a lot of system resources, causing it to crash. But this firewall won't!"

"Everyone here is a professional, and you should understand the significance of the data I just saw. This firewall consumes resources equivalent to those of an XP operating system! But whether it's in normal or working condition, its resource usage doesn't increase much! As you just saw, even when this firewall was subjected to a flood attack, its CPU usage remained high. That means it's incredibly stable, more stable than you can imagine. But because it's so stable, low-end computers simply can't run it! But why don't we think about this? Perhaps this is something that mysterious hacker deliberately set up?"

"What are the advantages of his setup?" someone asked. "His setup will lose him the vast majority of his user base!"

“But he doesn’t need those junk computers!” Carter glared at the guy who had contradicted him without any politeness, and said, “As you all know, one high-end computer and an efficient network are worth ten or even more low-end computers… I’m referring to attacks. Besides, controlling botnets is a real pain! You might have 100,000 junk computers, but the effect might not be as good as 5,000 high-end computers. I think everyone here understands that!”

Everyone nodded in agreement. After all, they were experts and knew that the higher the quality of the botnets, the better. Otherwise, if there were only quantity and no quality, controlling so many botnets would be a huge problem. And just issuing commands was already maddening! One hundred thousand computers! That was definitely a troublesome matter!

Therefore, hackers now demand the highest performance and the fewest number of botnets possible!

Less is more!

John glanced at Carter: "You continue."

Carter nodded smugly. He continued, "So I'll assume he's just trying to acquire high-end computers to use as botnets. That's quite possible. If that's the case, assuming he doesn't steal user data, the purpose of these computers with the IceRiver firewall installed is to sacrifice some resources and bandwidth in exchange for greater security!"

"If we are honest with our user base, I think a group of users will be able to accept this approach! Of course, we may have to make some concessions on the price..."

How to make concessions?

Carl shook his head at the question. He was a computer scientist, not an economist. He could think of the problem, but he didn't have a proper solution.

"Boss, what I mean is, shouldn't you contact that mysterious hacker to confirm our thoughts?"

“No need!” John said decisively. “Carter, your analysis was absolutely right. He told me this. He said that on computers with this firewall installed, user data won’t be stolen. It will only consume some bandwidth. There won’t be any problems with system resources… because as long as a computer has this firewall installed, it automatically allocates a portion of system resources to the firewall. Then, when that mysterious person uses the botnet, the botnet’s system resource usage will not exceed the firewall’s limit! In other words, what we see as the firewall’s utilization rate is completely fake! It doesn’t use all of these resources at all; it just allocates them like dividing up territory! The user only pays for a little bandwidth. The firewall won’t monitor any of the user’s private information!”

Upon hearing John's words, everyone couldn't help but gasp.

Is this even possible?

No wonder the system only used slightly more resources than usual when the firewall was under attack. That means that the resources it "claimed" to use were not used up at all when the firewall was running normally, and were only used a little bit!

In other words, it claims to use 128MB of system memory, but in reality, it probably only uses tens of MB or even just a few MB! The extra resources are not used at all. They are only reserved for use as a botnet!

This method of resource utilization has never been used before, nor has anyone even thought of using it!

Because all antivirus software faces the same problem... that it consumes too many system resources during virus scanning, leading to complaints from low-end users. Therefore, in China, Kaspersky has a special meaning: it's like a slow, clattering bug, and then the computer crashes...

For many firewalls and antivirus software, 128MB is more than enough under normal circumstances. But once they start running at full capacity... it won't be enough.

However, if this is the case, it means that this Ice River firewall is only causing trouble within its own designated area and will not infringe on user data. At most, users will have to pay some bandwidth and resources in exchange for their network security... For some users, this may not be unacceptable, but it's not something they'll easily accept either.

If it's really that easy to accept, Chen Xu might as well just put this firewall on the internet for anyone to download, let those who are willing take the bait!

But then another problem arises.

So how can we get users to spend money?

In fact, when users pay money to buy your antivirus software, it is a transaction in itself.

I give you money, and you protect my computer's security... It's a fair deal.

However, once users have already paid for their bandwidth and system resources, asking them to pay more is something few would be willing to do. But if they don't charge, how will they make money?

Then this firewall is even more pointless!

This is a problem that needs to be addressed by the think tank.

A complete think tank requires talent from all fields, and naturally, sales talent is indispensable.

At this moment, everyone's attention was focused on a black man who was about twenty-five or twenty-six years old.

This black man is named Fabiano. Although he recently joined Liam's company, his experience is so impressive that no one dares to underestimate him. His resume is truly remarkable: he's worked as a salesman, selling everything from toothbrushes to computers and even servers; he's sold insurance, worked as a ticket seller, and even participated in multi-level marketing…

Fabiano is probably the one in the think tank who understands customer psychology best and is the best at selling things.

At this point, he voiced his opinion: "We'll distribute this firewall completely free of charge." "Are you crazy?"

"Oh my god?! The company isn't making any money?!"

"Did a donkey kick you in the head?!"

As soon as he finished speaking, the conference room erupted in noise. Fabiano, however, remained calm. After John shouted "Quiet!" several times, he slowly said, "It's not that free things can't make money."

As soon as these words were spoken, everyone immediately fell silent.

We're all IT experts, so we naturally know what the so-called "free" things on the internet really mean. Of course, many free things are genuinely free, unlike some in China. They claim to be free... eliminating game time, but then add paid items, and even those require real money. This immediately disrupts the entire game's balance!

But like many portal websites, which update news daily and provide email addresses to users, they offer almost no paid services. So how do such large websites make money?!

Traffic, advertising!

The profits in this area are staggering!

Many websites survive entirely on advertising revenue, and they thrive and make more money the longer they live!

⚙️
Estilo de lectura

Tamaño de fuente

18

Ancho de página

800
1000
1280

Leer la piel

Lista de capítulos ×
Capítulo 1 Capítulo 2 Capítulo 3 Capítulo 4 Capítulo 5 Capítulo 6 Capítulo 7 Capítulo 8 Capítulo 9 Capítulo 10 Capítulo 11 Capítulo 12 Capítulo 13 Capítulo 14 Capítulo 15 Capítulo 16 Capítulo 17 Capítulo 18 Capítulo 19 Capítulo 20 Capítulo 21 Capítulo 22 Capítulo 23 Capítulo 24 Capítulo 25 Capítulo 26 Capítulo 27 Capítulo 28 Capítulo 29 Capítulo 30 Capítulo 31 Capítulo 32 Capítulo 33 Capítulo 34 Capítulo 35 Capítulo 36 Capítulo 37 Capítulo 38 Capítulo 39 Capítulo 40 Capítulo 41 Capítulo 42 Capítulo 43 Capítulo 44 Capítulo 45 Capítulo 46 Capítulo 47 Capítulo 48 Capítulo 49 Capítulo 50 Capítulo 51 Capítulo 52 Capítulo 53 Capítulo 54 Capítulo 55 Capítulo 56 Capítulo 57 Capítulo 58 Capítulo 59 Capítulo 60 Capítulo 61 Capítulo 62 Capítulo 63 Capítulo 64 Capítulo 65 Capítulo 66 Capítulo 67 Capítulo 68 Capítulo 69 Capítulo 70 Capítulo 71 Capítulo 72 Capítulo 73 Capítulo 74 Capítulo 75 Capítulo 76 Capítulo 77 Capítulo 78 Capítulo 79 Capítulo 80 Capítulo 81 Capítulo 82 Capítulo 83 Capítulo 84 Capítulo 85 Capítulo 86 Capítulo 87 Capítulo 88 Capítulo 89 Capítulo 90 Capítulo 91 Capítulo 92 Capítulo 93 Capítulo 94 Capítulo 95 Capítulo 96 Capítulo 97 Capítulo 98 Capítulo 99 Capítulo 100 Capítulo 101 Capítulo 102 Capítulo 103 Capítulo 104 Capítulo 105 Capítulo 106 Capítulo 107 Capítulo 108 Capítulo 109 Capítulo 110 Capítulo 111 Capítulo 112 Capítulo 113 Capítulo 114 Capítulo 115 Capítulo 116 Capítulo 117 Capítulo 118 Capítulo 119 Capítulo 120 Capítulo 121 Capítulo 122 Capítulo 123 Capítulo 124 Capítulo 125 Capítulo 126 Capítulo 127 Capítulo 128 Capítulo 129 Capítulo 130 Capítulo 131 Capítulo 132 Capítulo 133 Capítulo 134 Capítulo 135 Capítulo 136 Capítulo 137 Capítulo 138 Capítulo 139 Capítulo 140 Capítulo 141 Capítulo 142 Capítulo 143 Capítulo 144 Capítulo 145 Capítulo 146 Capítulo 147 Capítulo 148 Capítulo 149 Capítulo 150 Capítulo 151 Capítulo 152 Capítulo 153 Capítulo 154 Capítulo 155 Capítulo 156 Capítulo 157 Capítulo 158 Capítulo 159 Capítulo 160 Capítulo 161 Capítulo 162 Capítulo 163 Capítulo 164 Capítulo 165 Capítulo 166 Capítulo 167 Capítulo 168 Capítulo 169 Capítulo 170 Capítulo 171 Capítulo 172 Capítulo 173 Capítulo 174 Capítulo 175 Capítulo 176 Capítulo 177 Capítulo 178 Capítulo 179 Capítulo 180 Capítulo 181 Capítulo 182 Capítulo 183 Capítulo 184 Capítulo 185 Capítulo 186 Capítulo 187 Capítulo 188 Capítulo 189 Capítulo 190 Capítulo 191 Capítulo 192 Capítulo 193 Capítulo 194 Capítulo 195 Capítulo 196 Capítulo 197 Capítulo 198 Capítulo 199 Capítulo 200 Capítulo 201 Capítulo 202 Capítulo 203 Capítulo 204 Capítulo 205 Capítulo 206 Capítulo 207 Capítulo 208 Capítulo 209 Capítulo 210 Capítulo 211 Capítulo 212 Capítulo 213 Capítulo 214 Capítulo 215 Capítulo 216 Capítulo 217 Capítulo 218 Capítulo 219 Capítulo 220 Capítulo 221 Capítulo 222 Capítulo 223 Capítulo 224 Capítulo 225 Capítulo 226 Capítulo 227 Capítulo 228 Capítulo 229 Capítulo 230 Capítulo 231 Capítulo 232 Capítulo 233 Capítulo 234 Capítulo 235 Capítulo 236 Capítulo 237 Capítulo 238 Capítulo 239 Capítulo 240 Capítulo 241 Capítulo 242 Capítulo 243 Capítulo 244 Capítulo 245 Capítulo 246 Capítulo 247 Capítulo 248 Capítulo 249 Capítulo 250 Capítulo 251 Capítulo 252 Capítulo 253 Capítulo 254 Capítulo 255 Capítulo 256 Capítulo 257 Capítulo 258 Capítulo 259 Capítulo 260 Capítulo 261 Capítulo 262 Capítulo 263 Capítulo 264 Capítulo 265 Capítulo 266 Capítulo 267 Capítulo 268 Capítulo 269 Capítulo 270 Capítulo 271 Capítulo 272 Capítulo 273 Capítulo 274 Capítulo 275 Capítulo 276 Capítulo 277 Capítulo 278 Capítulo 279 Capítulo 280 Capítulo 281 Capítulo 282 Capítulo 283 Capítulo 284 Capítulo 285 Capítulo 286 Capítulo 287 Capítulo 288 Capítulo 289 Capítulo 290 Capítulo 291 Capítulo 292 Capítulo 293 Capítulo 294 Capítulo 295 Capítulo 296 Capítulo 297 Capítulo 298 Capítulo 299 Capítulo 300 Capítulo 301 Capítulo 302 Capítulo 303 Capítulo 304 Capítulo 305 Capítulo 306 Capítulo 307 Capítulo 308 Capítulo 309 Capítulo 310 Capítulo 311 Capítulo 312 Capítulo 313 Capítulo 314 Capítulo 315 Capítulo 316 Capítulo 317 Capítulo 318 Capítulo 319 Capítulo 320 Capítulo 321 Capítulo 322 Capítulo 323 Capítulo 324 Capítulo 325 Capítulo 326 Capítulo 327 Capítulo 328 Capítulo 329 Capítulo 330 Capítulo 331 Capítulo 332 Capítulo 333 Capítulo 334 Capítulo 335 Capítulo 336 Capítulo 337 Capítulo 338 Capítulo 339 Capítulo 340 Capítulo 341 Capítulo 342 Capítulo 343 Capítulo 344 Capítulo 345 Capítulo 346 Capítulo 347 Capítulo 348 Capítulo 349 Capítulo 350 Capítulo 351 Capítulo 352 Capítulo 353 Capítulo 354 Capítulo 355 Capítulo 356 Capítulo 357 Capítulo 358 Capítulo 359 Capítulo 360 Capítulo 361 Capítulo 362 Capítulo 363 Capítulo 364 Capítulo 365 Capítulo 366 Capítulo 367 Capítulo 368 Capítulo 369 Capítulo 370 Capítulo 371 Capítulo 372 Capítulo 373 Capítulo 374 Capítulo 375 Capítulo 376 Capítulo 377 Capítulo 378 Capítulo 379 Capítulo 380 Capítulo 381 Capítulo 382