[Zhuantie] 360 amazing secret panel inside - of course including QQ files safe

2011-01-08  来源:本站原创  分类:Internet  人气:104 

These days, that we are a hot topic, is 360 dense disk is broken, I think, the so-called QQ file safe, at what time will it be broken?
Many people may think that 360 is 360 their original density disk, and then QQ copied the 360 ​​secret documents safe dish, so not safe QQ file hype. In fact, according to my understanding, 360 and QQ are copied someone else's creative product, as matter what, I'll talk with you can be learned, you have any suggestions welcome thread.
In fact, encryption technology area, have a few years ago, but that time has not product-oriented, there are several of these types of foreign products and domestic products of the encrypted area, I was deeply impressed encryption called Prayaya King of the product, and why, because until looking to U disk and removable hard disk encryption products, many domestic encryption products, are tied with the system very dead, need to install, but after the installation of this product is green software and very small, only a few hundred K, so at the time with a period of time, you can feel. Then chance, with the original product in the customer service chat person Hu, know.
The original 360 in 2,3 years ago, has been with Prayaya chat, and then was also very much appreciate Prayaya within 360 products, because there is a virtual desktop, and once 360 ​​Zhou whim, imagine what Prayaya's Hu , but it is 10 pm to call Hu people (he was in Guangzhou), let him appear before 9:00 the next day's office in Beijing, Oh, this happens, of course, different people have different approaches , some may Pidianpidian ran, but was said to Hu to gas, no go. However, as the product is better, 360 or with Prayaya cooperation, and has been hanging in the 360's recommended software first, and Thunder are still flying in front of the letter, we can go and see, www.360.cn/commend.html, has been hung up there for 2 years.

3Q last year, the eve of World War II and then, 360 has launched a dense disk, I looked at how so much like King Hu's encryption products? Then chatted online with Hu, he said no way, be copied, I was asked, your product and his What is the difference, he said, only 360 secret 128-bit disk encryption, as his 256-bit encryption In addition too focused on the interface plate 360 ​​close packing, safety done in general, should the product have time to do that, then really not two months, was broken. I asked him, he said, may also be following Zhou technicians to fool, and now must be very embarrassing, can only be quickly upgraded, patched, altered, re-encryption algorithm, or the reputation of this product will sweep up.
Then I saw QQ files safe, and more surprised, because the product name, such stunning products related to Hu, QQ file safe, file safe Hu is Prayaya, Oh, Tencent guys, not too creative a . I ask online Hu, Hu just sigh sigh, Tencent always been like that copy.
He also told me a story, that is, two years ago, the product of his time with the virtual desktop 360 and QQ talked about, the two feel that his product well, although the 360 ​​was not successful cooperation, but at least the He's hanging in the recommended products, where the 360 ​​character also decent, of course, is the original for the domestic software developers, at least for the people still respected. Tencent people to talk about cooperation, the old nonsense is very bad mood, Tencent sent over four or five individuals to talk with Hu, as if a very important way, but makes no mention of talking to business cooperation, are asking the product to achieve principle, then gradually see Hu wrong, and quickly come to a halt, and then asked, you have the ability to do a full Tencent out, Why do we us it? Tencent is not subdued the people all of a sudden. Later came to know these people are technical staff, a business person at all. So, Tencent there has always been the tradition of plagiarism, but now cover a lot of practice, for example, staged a now Tencent Tencent Technology, IT circle around to interview people, including some emerging companies, sadly, many emerging founder Tencent people to see the interview, will happily have their own characteristics of the product, planning, implementation principle all the right crystal clear, but they do not know their own products, has been far from dead. Because he trusted TX, this trust with Guo East Zhongshan Lang is the same reason.
So here advising to start the IT people to do the product to be low-key, when their products to 50,000 100,000 user base, when, and quickly opened a new domain name or server address, because in order to avoid the 360 ​​and TX collected your software information to enable them to analyze your products, do not the ambition to do what the whole of China first, preferably 50,000, 100,000 were quietly accumulating user, these days, not only have good ideas, good execution, but also have a good idea to prevent copying, or the environment in China, which can only be a dead end.

相关文章
  • [Zhuantie] 360 amazing secret panel inside - of course including QQ files safe 2011-01-08

    These days, that we are a hot topic, is 360 dense disk is broken, I think, the so-called QQ file safe, at what time will it be broken? Many people may think that 360 is 360 their original density disk, and then QQ copied the 360 ​​secret documents sa

  • [Zhuantie] 360 amazing secret panel inside - of course including the QQ documents safe 2011-01-08

    These days, everyone is hot to see a topic that is 360 dense disk is broken, I think, the so-called QQ files safe, at what time will it be broken? A lot of people may think that 360 is the 360 close their original disk and then copied the 360 QQ secr

  • 360 Statement Tencent threaten users to uninstall 360 and 360 will ensure the normal use of both QQ 2010-11-04

    Tencent threaten users to uninstall 360 and 360 will ensure that normal use of both QQ At 18:00 on November 3, Tencent brazenly issued a proclamation declaring the software will be equipped with 360 computers to stop running all the QQ software, whic

  • Hidden in a secret weapon in XP, totally clean junk files 2010-11-09

    We used the Windows built-in Disk Cleanup function, it can not completely clean the unnecessary files within Windows, because its functionality is hidden, this function will hide it completely open. Applicable version, this method is used to Win98se,

  • Recovery windows7 Explorer left panel navigation 2010-11-03

    Many friends in the use of Windows7 Explorer, when used in the left navigation panel inside the positioning operation, such as open library, open the C drive D drive, open the Favorites folder path and so on. However, also found an inconvenient time,

  • Tencent is not compatible with 360, 360 fatal!!! 2010-11-07

    [Transfer from www.shengwulin.cn ] night it is busy, messages pop up a QQ, Tencent QQ QQ To all users of the letter, a look at really is a shock. Tencent will take a policy is not compatible with 360 against 360. Thought for a long time before we fee

  • Panel dealing with the wireless network icon is missing 2010-10-30

    The wireless network icon on the panel is missing, always thought it was not the wireless network card driver, repeated re-installation. The results of a tragedy. I use the ubuntu operating system, one day after the update, the top panel have the rig

  • Statement 360 "Tencent blackmail users to uninstall 360" Zhou trick really ah! See you know who to believe. 2010-11-03

    360 360 Tencent threaten users to uninstall and QQ at the same time will ensure the normal use Source: Security Center, 360 :2010-11-03 has 49,037 comments I want to comment At 18:00 on November 3, Tencent brazenly issued a proclamation declaring the

  • Statement 360 360 360 Tencent threaten users to uninstall and QQ at the same time will ensure the normal use 2010-11-04

    Tencent threaten users to uninstall 360 and 360 will ensure that both normal QQ At 18:00 on November 3, Tencent brazenly issued a proclamation declaring the software will be equipped with 360 computers to stop running all the QQ software, which is se

  • QQ 360 a second election 2010-11-04

    QQ 360 QQ 360 two two choose a selection of a second election QQ 360 QQ 360 QQ 360 two two choose a selection of a second election QQ 360 QQ 360 QQ 360 two two choose a selection of a QQ 360 QQ 360 two two choose a select one QQ 360 QQ 360 two two ch

  • 360 Statement "Tencent blackmail users to uninstall 360" Zhou really move ah! To see if they know who to believe. 2010-11-03

    Tencent threaten users to uninstall 360 and 360 will ensure the normal use of both QQ Source: 360 Date :2010 Security Center -11-03 than 49,037 comments I want to comment At 18:00 on November 3, Tencent brazenly issued a proclamation declaring the so

  • Command-line mode method of access control panel items 2010-12-17

    Control panel to each tool is. Cpl files (in fact some DLL files) in the form provided to the system operation, these. Cpl files are located in: WindowsSystem32 folder. If we want to run these command line programs control panel, you can use command-

  • 3Q大战续集:腾讯再诉360索赔1.25亿 2014-04-11

    王峰 北京报道 3Q大战仍未终结. 本报从接近两公司系列诉讼案的律师处获悉,又一起腾讯诉360不正当竞争案将于9月18日在广东省高级人民法院开庭,腾讯向360索赔经济损失1.25亿元. 在8月份的交换证据中,腾讯提交了一份由第三方出具的<"QQ"品牌受损害价值评估报告书>,报告称QQ品牌受损害评估的市场公允价值为人民币7.34亿元. 而360方面并不认可这份估值.腾讯提供的一份360方面质证意见认为,(报告)"匪夷所思,完全违背客观事实和职业伦理."腾讯

  • windows dos command used 2011-03-07

    net use \ \ ip \ ipc $ "" / user: "" the establishment of air links IPC net use \ \ ip \ ipc $ "password" / user: "username" to establish links to non-empty IPC net use h: \ \ ip \ c $ "password" / user: &

  • Unix Toolbox - 少即是多 - 专注 2012-06-13

    Unix Toolbox This document is a collection of Unix/Linux/BSD commands and tasks which are useful for IT work or for advanced users. This is a practical guide with concise explanations, however the reader is supposed to know what s/he is doing. Unix T

  • 2000个软件开发领域的高频特殊词及精选例句(三) 2015-03-20

    superword是一个Java实现的英文单词分析软件,主要研究英语单词音近形似转化规律.前缀后缀规律.词之间的相似性规律等等. 551.单词 ibm 的匹配文本: The Basic Edition includes HDFS, Hbase, MapReduce, Hive, Mahout, Oozie, Pig, ZooKeeper, Hue, and several other open source tools, as well as a basic version of the IBM

  • Oracle concepts (Oracle 10.2) 2010-02-20

    1, Oracle introduced This chapter provides an overview for the Oracle database server, contains the following topics Oracle database architecture Oracle Database Features Oracle Database Application Development Oracle database architecture Oracle dat

  • MakeFile gcc compiler with make for macro 2010-03-08

    (MAKE) makefile variables in the seven core automatically $ @: Working target file name $%: Profile members of the structure of the file name element $ <: The first necessary condition of the file name $?: Timestamp in the objectives (the timestamp)

  • MySQL 5.1 installation process mid-year report apply security setting wrong solution received 2010-03-07

    MySQL 5.1 installation process mid-year report apply security setting wrong solution Favorites Mysql error apply security settings to install solution The security settings could not be applied to the database because the connection has failed with t

  • MYSQL installation there could not start the service mysql error: 0 treatment 2010-03-07

    When you install, reinstall when you could not start the service mysql error: 0 error, you can try the following two ways. 1, Mode 1 MySQL installation is there could not start the service mysql error: 0 prompt error solution: First, in the Administr