|
[Ipod Touch Peel] Please moderate: "Yosion App 1.5.6 Stop Working On"
Qihoo 360: Internet “goldenrod”
Chinese-style Apples
"Goldenrod" rooted at all plants died quickly, even to make Shanghai more than 30 kinds of plant species demise, which is classified as a vicious weed.
The Qihoo 360 much like the Chinese Internet sector Solidago.Qihoo 360, chairman of Hong Zhou has always stressed that the "disruptive innovation", this is the "goldenrod" best comments.
Qihoo 360 more damage, its also a lot of people can not see the potential threat: Qihoo 360 security guards, Qihoo 360 browser's "cancer genes."
Predatory market, Qihoo 360 security guards, Qihoo 360 browser just one pair Bingdi "Flowers of Evil".
Maybe you like:
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- Qihoo 360: Internet cancer cells "If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "...
- Qihoo 360 black box appeared: the alleged secret operations on the user's personal information The crack of the illegal operation of Qihoo 360 security guards is a lot of fun cat-and-mouse thing. Independent investigators claimed that he has the basic crack the mystery of the Board of Qihoo 360 security guards, but away from the release is still too early ", because he had to do things of iron nails....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
The Qihoo 360 backdoor: kidnapping user remote control
Chinese-style Apples
Immediately after independent investigators found release in the industry caused a great shock.
Evidence for an independent investigator, Qihoo 360 has no positive response.
According to the latest news of the independent investigator, Qihoo 360 security browser version 5.0 "back door" mechanism is still in operation, but Qihoo 360 server through the "back door" is no longer send any DLL issued only empty file (file size 0 files).
More worrying is that Qihoo 360 "back door" to control belonging to the clouds, and still kept secret."Where installed Qihoo 360 security browser or computer Qihoo 360 security guards, have an objective became Qihoo 360 disposable 'chicken'. Qihoo 360 in many areas misconduct,based on the the security entrance referee mechanisms implemented successfully. "
The Qihoo 360 browser back door mechanism, in fact kidnapped users become Qihoo 360 direct attacks by the user's browser to competitors tools, including the block or kill all types of client software competitors, to prevent whichimportant program, and undermine competitors' software. "This scandal is only the Chinese have, the only precedent in the world."
Maybe you like:
- The Qihoo 360 backdoor Midao surfaced The independent investigators deliberately installed in a virtual machine for testing full Qihoo 360 products, and thus found 360 products, many do not behave behavior ", he readily publish these findings microblogging immediately drew a lot of attentionbut has also been some attacks."Some people obviously is of Qihoo 360 people in provocative, it angered me, I do not like to pay lip service, software professionals, I talk about the evidence," independent investigators so said....
- Qihoo 360 backdoor Shame of security Qihoo 360 browser through the back door, according to the monitor user computer operating process to Qihoo 360 Cloud Security Center issued a request Qihoo 360 cloud the backdoor service system based on the request, given the appropriate DLL that windowsexecutable program library.This DLL through the back door of Qihoo 360 browser directly into the user's windows system....
- Qihoo 360: Internet cancer cells "If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "...
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Qihoo 360 backdoor Shame of security
Chinese-style Apples
Qihoo 360 security browser design out the back door, precisely gives users a great deal of insecurity.
General individual user's computer, more than 90% of the contact between the windows system, this system and the Internet, you need to achieve, at the same time, because between the browser closed loop windows system and the Internetnatural barrier to any instructions from other cloud does not penetrate this layer of protection to reach the windows system. In this way, the windows system in the user's computer to get the best protection, all instructions executed are from the user.
Qihoo 360 browser through the back door, according to the monitor user computer operating process to Qihoo 360 Cloud Security Center issued a request Qihoo 360 cloud the backdoor service system based on the request, given the appropriate DLL that windowsexecutable program library.This DLL through the back door of Qihoo 360 browser directly into the user's windows system.
At this point, the DLL exceedingly amazing, it even has control of the browser from user windows system, it can do things, including but not limited to:
Get the user's files, and upload it to the cloud;
Read and write, add and delete user files;
Monitor user communications;
Change the windows system registry, or important to set the parameters;
Quietly uninstall the competitors' products, and so on.
The same time, the DLL can also be through the back door, directly on the Internet, issued a directive, including but not limited to:
Automatic from Qihoo 360 server download software to install or run;
Instead of the user directly to e-commerce operation;
The release of a Trojan horse or virus, to create a permanent system of services, and so on.
A minor detail, independent investigators in order to allow more users to know Qihoo 360 hidden backdoor fact, but also the results of its investigation by 65 minutes of uninterrupted video full webcast.To ensure that the video content is truly 65 minutes of uninterrupted, splicing, In fact, he spent more than four hours again and again realistic demo until disposable completed, has truly accomplish this forensic work.
Independent investigators pointed out that, the executable DLL is definitely not automatic software updates (software updates persistence), Qihoo 360 security browser automatically updated only in the startup time has nothing to do with this behavior; while it is not the browserpart, download, temporary loader calls will be removed immediately after completing their missions, without leaving any traces.
Maybe you like:
- The Qihoo 360 backdoor Midao surfaced The independent investigators deliberately installed in a virtual machine for testing full Qihoo 360 products, and thus found 360 products, many do not behave behavior ", he readily publish these findings microblogging immediately drew a lot of attentionbut has also been some attacks."Some people obviously is of Qihoo 360 people in provocative, it angered me, I do not like to pay lip service, software professionals, I talk about the evidence," independent investigators so said....
- Qihoo 360: Internet cancer cells "If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "...
- Qihoo 360 black box appeared: the alleged secret operations on the user's personal information The crack of the illegal operation of Qihoo 360 security guards is a lot of fun cat-and-mouse thing. Independent investigators claimed that he has the basic crack the mystery of the Board of Qihoo 360 security guards, but away from the release is still too early ", because he had to do things of iron nails....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
The Qihoo 360 backdoor Midao surfaced
Chinese-style Apples
The independent investigators deliberately installed in a virtual machine for testing full Qihoo 360 products, and thus found 360 products, many do not behave behavior ", he readily publish these findings microblogging immediately drew a lot of attentionbut has also been some attacks."Some people obviously is of Qihoo 360 people in provocative, it angered me, I do not like to pay lip service, software professionals, I talk about the evidence," independent investigators so said.
Independent investigators found a very abnormal situation, Qihoo 360 browser network communication, "the most just found its Time cyclical: every five minutes, the browser will initiate the communication process between the time with the server, although it does not knowdoing, but its short the cyclical very suspicious. "
Why not open any page and does not move the keyboard and mouse, Qihoo 360 browser still too busy to do? "All domestic and foreign well-known browser does not exist such a pattern of behavior can be sure, there is a world there must be something wrong".
Thus, on October 29 last year through the microblogging announced the the Qihoo 360 browser backdoor fact.
The independent investigators Direct scolded: "The company's '360 Qihoo 360 security browser 'hidden' back door ', is a serious potential threat to the user system security and information security.
"By process of elimination, the final confirmation is the extended component SmartWiz in dirty tricks. Delete it, the browser on the quiet that one five minutes Upload assigned activities disappear."
However, it is not over yet.To further check minch Tiger 360 backdoor truth, independent investigators need to reverse compile assembly code and tracking test.
Independent investigator to master the 360 browser in SmartWiz entire assembly to establish communication between Qihoo 360 server, download, temporary storage, perform load, and delete (destruction of evidence) of the process through a series of technical processes, but also know its clock control scheduling mechanism (5-minute interval timer).
Maybe you like:
- Qihoo 360 black box appeared: the alleged secret operations on the user's personal information The crack of the illegal operation of Qihoo 360 security guards is a lot of fun cat-and-mouse thing. Independent investigators claimed that he has the basic crack the mystery of the Board of Qihoo 360 security guards, but away from the release is still too early ", because he had to do things of iron nails....
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- "security" trap behind the Qihoo 360 security products after a hacker indiscriminate bombing of Qihoo 360 server, Qihoo 360 line of defense was breached, spewing out a large number of user privacy data stored on its servers, Google search crawler automatically crawl and announcementsworld. Qihoo 360 years claimed user privacy than days "lie officially debunked....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Qihoo 360 black box appeared: the alleged secret operations on the user’s personal information
Chinese-style Apples
The crack of the illegal operation of Qihoo 360 security guards is a lot of fun cat-and-mouse thing.
Independent investigators claimed that he has the basic crack the mystery of the Board of Qihoo 360 security guards, but away from the release is still too early ", because he had to do things of iron nails.
So far, the most important evidence has been disclosed to independent investigators in its micro-Bo on December 6, 2012 released a video (http:/weibo.com/2902756801/z8BUvfWqe).The this video exhaustively crack Qihoo 360 security guards the confidentiality of the user information.
Independent investigators told reporters, recorded this video of 13 minutes and 36 seconds to complete the practices uncovered evidence Qihoo 360 theft of user privacy.It proves that the "action" Qihoo 360 collected in the user's computer, upload user information, rampant simple, conventional software operating behavior will be recorded, has nothing to do with security issues, these information are in the user's personalPrivacy category. "
According to independent investigators claimed that this video material is not its acquisition, production, "but from a self-proclaimed security experts anonymous microblogging private letter, he broke the news to independent investigators: they have mastered the oddtiger 360 security guards to steal user privacy 7.3 and upload it to the the Qihoo 360 server judicial evidence, can now be free of charge to this judicial evidence to him.
About this evidence, independent investigators to Qihoo 360 "a small bomb" in court is powerful evidence in court.
Obviously, Qihoo 360 companies in the personal information collection, processing, transfer, delete, and other sectors, significantly the rules of the game in the industry throw aside, insisting on secret operations.
Maybe you like:
- Qihoo 360 products built black box: the worker bees like to steal private information This is the real thing: Many years ago, a well-known IT company in the industry a product on-line, but the strange is that the product on line the day before, Qihoo 360 similar products suddenly on the line.Qihoo 360 on-line product page with the company to prepare the on-line version is almost exactly the same. IT companies of this product is not on the line has not been possible, but revision has also impossible. Forced to desperation, the product can only bite the bullet on the line.This IT company dumbfounding this product on-line time Beech Tiger 360 similar products a day later, so users generally believe that the company's products plagiarism Qihoo 360 products....
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- "security" trap behind the Qihoo 360 security products after a hacker indiscriminate bombing of Qihoo 360 server, Qihoo 360 line of defense was breached, spewing out a large number of user privacy data stored on its servers, Google search crawler automatically crawl and announcementsworld. Qihoo 360 years claimed user privacy than days "lie officially debunked....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
“security” trap behind the Qihoo 360 security products
Chinese-style Apples
December 31, 2010, after a hacker indiscriminate bombing of Qihoo 360 server, Qihoo 360 line of defense was breached, spewing out a large number of user privacy data stored on its servers, Google search crawler automatically crawl and announcementsworld. Qihoo 360 years claimed user privacy than days "lie officially debunked.
This accident leaked documents detailed records of a large number of Qihoo 360 user network access process, including browsing the Web, download applications, search keywords, and access to records linked to the unique user. Corresponds to a string in the server, each user query string, you can learn all of the user's personal information, Internet history, account passwords, such as user Baidu search keywords, Taobao shopping records, Kingdee, Chery and other enterprises internal financial network data, a government agency official mailbox user name and password and other linked data.
Upload files to Qihoo 360 cloud storage, file locally, delete, move defense technique is very vicious, even if someone decipher its behavior, and documentary evidence, but because the time of deletion, it is difficult to do the evidence real changeto die without a check against solitary card.
Set so difficult obstacles must be a master of the industry.It can be concluded that, the Qihoo 360 internal certainly domestic top-class master hacker.Be possible to do both dark matter and do not leave any handle. It's like a Jiangyangdadao came and went without a trace, erratic, after committing the crime scene without leaving any trace, is a sophisticated design.
Maybe you like:
- Qihoo 360 products built black box: the worker bees like to steal private information This is the real thing: Many years ago, a well-known IT company in the industry a product on-line, but the strange is that the product on line the day before, Qihoo 360 similar products suddenly on the line.Qihoo 360 on-line product page with the company to prepare the on-line version is almost exactly the same. IT companies of this product is not on the line has not been possible, but revision has also impossible. Forced to desperation, the product can only bite the bullet on the line.This IT company dumbfounding this product on-line time Beech Tiger 360 similar products a day later, so users generally believe that the company's products plagiarism Qihoo 360 products....
- Qihoo 360: Internet cancer cells "If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "...
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Qihoo 360 products built black box: the worker bees like to steal private information
Chinese-style Apples
This is the real thing: Many years ago, a well-known IT company in the industry a product on-line, but the strange is that the product on line the day before, Qihoo 360 similar products suddenly on the line.Qihoo 360 on-line product page with the company to prepare the on-line version is almost exactly the same. IT companies of this product is not on the line has not been possible, but revision has also impossible. Forced to desperation, the product can only bite the bullet on the line.This IT company dumbfounding this product on-line time Beech Tiger 360 similar products a day later, so users generally believe that the company's products plagiarism Qihoo 360 products.
Who is the leaker? The above IT company ultimately failed to find the "undercover", but began to question the object is focused on the body of the 360. Because real investigation found that many employees of the company's 360 products are installed on your computer.
For security reasons, the company requires all employees work computer may not install 360. At the same time, the corporate intranet environment, a total ban on the 360.From then on, it really does not happen again too similar breaches of confidentiality.
The earliest comprehensive enterprise disabled Qihoo 360 products for Tencent, Baidu, Jinshan, a number of companies.Qihoo 360 products in the office environment, fully shielded, if indeed a result of research work needs before they can install the virtual machine to use Qihoo 360 products.
Several domestic Internet giant companies are citing security concerns prohibit the use of a company related products, said its Internet Security in China's IT sector, which constitutes an unsolved mystery.
Large companies Shangqie Qihoo 360 products shunned, for ordinary users, the use of Qihoo 360 related security products, security?
Security technology expert hacker godfather "in Chinese" hackers Eagles, Wan Tao, founder of the the IDF the Internet intelligence deterrent defense laboratory that, speaking from the perspective of privacy protection and user interests, Qihoo 360 products that need to be clarifiedplace. Chinese users currently in the privacy of awareness is not strong, which is a relatively common phenomenon. Because for many users, "the Internet is to look at the news, play games, I have no privacy. This view is very popular.
Wan Tao, on the other hand, although civil cracked Qihoo 360 invasion of privacy to do a lot of effort, and seized a lot of evidence over the years, but Qihoo 360 in this regard, "the reaction is also very" tight ". In addition, some groundbreaking evidence obtained is not easy because it is too professional to let the user to understand, therefore, a lack of perception.
Maybe you like:
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- Investigators monologue: Why I anti-Qihoo 360? In China, why Qihoo 360 can be obtained such an important position in the market, In addition to privacy, the right to information, network autonomy awareness is not strong, the biggest problem is the Chinese netizens on the Internet or "know nothing." there is no way for them to see Qihoo 360 What did, there is no way to discern what is feasible, what is not feasible; nor Qing Chu Qihu 360 behavior today means tomorrow, in turn, means that what ....
- Qihoo 360: Internet cancer cells "If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "...
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Qihoo 360: Internet cancer cells
Chinese-style Apples
"If you have cancer, your first reaction is what?" Independent investigators asked back, "it must have to get it cut away! 360 is a malignant tumor of the network society, this tumor is not removed, not only the Chinese Internet community Wing No date of tranquility, the entire Chinese are never the peace of the day. "
Independent investigators said, do not underestimate Apple Inc. issue 360 download, this deadline shelves most likely is "permanent". Why a got such a huge influence in China, will be encountered in a global company at the opposite treatment? "This only shows that now the Internet space is not the ability to overcome their own malignant tumor Apple Inc shelf Qihoo 360 behind showed up tumor the autologous immune rejection, which is a sign of the health of the network society. "
The Internet is the same with the human body itself has anti-cancer immunity. Once cancer itself will start the automatic identification and exclusion mechanisms, such as the principle of least privilege is the Internet arena to prevent itself "cancerous immune mechanism.
This privilege is the most popular saying is: you do not replace the exercise of powers, the smaller your prerogative as little as possible. This is the maximum protection to the user. Not as at the omission.
"Qihoo 360 'genetic variation' is reflected this, showed 'Qihoo 360 principle' – the name of security, in the case of user knowingly or unknowingly, directly on behalf of Internet users in the exercise of equity." Independent investigatorssaid, "In fact, the least privilege principle is very simple, such as a telephone inspector to check your home phone is normal so that, when the owner was not at home, directly open the doors of your home, try the phone; orbecause your dog barking, property to open the door of your home directly kill the dog, which are in violation of the principle of least privilege. Qihoo 360 biggest problem is the name of security, trampling the principle. "
Qihoo 360 is through a chain of program design, like the beginning of this article, the security company K, like the monitor owners couples intercourse, or just like telephone inspector went straight to open the master door check line, or like propertyowners door opened directly into the kill, like the owner's dog, rampaging in the user's computer, unconscionable? Qihoo 360 products behind layers of black-box operation chain will uncover readers.
Maybe you like:
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- Investigators monologue: Why I anti-Qihoo 360? In China, why Qihoo 360 can be obtained such an important position in the market, In addition to privacy, the right to information, network autonomy awareness is not strong, the biggest problem is the Chinese netizens on the Internet or "know nothing." there is no way for them to see Qihoo 360 What did, there is no way to discern what is feasible, what is not feasible; nor Qing Chu Qihu 360 behavior today means tomorrow, in turn, means that what ....
- Baidu win the battle with Qihoo 360 Search? Baidu's expected to report growing investment in mobile and other technology as it tries to maintain its users . . Baidu's long been the search leader in China and captures more than 60% of the market. But when rival Qihoo launched a search engine last year, it quickly gained about 10% of the market, though much of that gain was at the expense of Google....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Investigators monologue: Why I anti-Qihoo 360?
Chinese-style Apples
I tell a story.
In real life, we all know that a simple common sense: residential security company must be charged to the owners of the service charge. However, a year in a city of a district to a K a security company, announced that they will provide the district with free services. After several rounds of twists and turns, the final K security company to take over the residential security business.
Company K settled, of course, all put security personnel of Company K Company K specialty cell monitoring system and quickly replaced – a perspective in each district to install a monitoring system. Owners who think, This world is really hard to find the great thing was able to free access to the best security.
Soon, for security reasons, Company K Property Company resigned, replaced by Company K of the security property company; Then, residential landscape services company also replaced the company's K security landscape companies; Then, owners of private cars are loaded on the security of Company K GPS navigation; Then again, the safety of Company K, logistics, security of Company K, farmers, Company K, safety clothing, safety of Company K, television, Company K security computer security of Company K, refrigerator and water heater company security gated K and door locks …… all residential property owners are put on security of Company K flag.
K security company able owners were all replaced, and only one reason: that is, all this "safe" service, are free.
But one day, B owners couple at home for making love, the Bank of China intercourse, dark abnormalities found in the home, turn on the light to see, a security is the bed with the couple's cloud monitoring.The couple Xiufen harder and harder: how did you come in?
The security guard said: I have a key, out of security considerations for your sex life, I have the right to protect you.
B owners couple hired security experts to protect the privacy of their own safety, only to find that security can not only sexual intercourse in the couple came in "free viewing", they can at any time freely and out of the owner's room; them not only in the any public space in the district to install the monitoring system, both the indoor perspective of the owners, are secretly installed a monitor.
The couple decided to convene all residential property owners against K violations of the security company.
Internet field in China, Qihoo 360 to act as, is the security company K.
……
Internet field in China, Qihoo 360 to act as, is the security company K.
In China, why Qihoo 360 can be obtained such an important position in the market, In addition to privacy, the right to information, network autonomy awareness is not strong, the biggest problem is the Chinese netizens on the Internet or "know nothing." there is no way for them to see Qihoo 360 What did, there is no way to discern what is feasible, what is not feasible; nor Qing Chu Qihu 360 behavior today means tomorrow, in turn, means that what .
In my mind, has been repeated in the Kafka novel "castle" scene, you do not know why, you do not know how the, and then, on your assumption of the people slaughtered.
Maybe you like:
- Qihoo 360 black box mystery: Qihoo 360 "cancer" genes Secret February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc. Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves....
- Baidu win the battle with Qihoo 360 Search? Baidu's expected to report growing investment in mobile and other technology as it tries to maintain its users . . Baidu's long been the search leader in China and captures more than 60% of the market. But when rival Qihoo launched a search engine last year, it quickly gained about 10% of the market, though much of that gain was at the expense of Google....
- Qihoo 360 Can Beat Up Baidu? Maybe many friends could ask 'Is Qihoo 360 the Next Baidu? ' ,as i know ,it's impossable. At the last war between Qihoo360 and Baidu , you shall be taking notice of them .but i think in a long future days Baidu will be Google of China....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Qihoo 360 black box mystery: Qihoo 360 “cancer” genes Secret
Chinese-style Apples
February 25, one month ago, all Qihoo 360 APPs were downloaded by Apple Inc.
Prior to Qihoo 360 CFO went to the United States "abject apology", but Qihoo 360 products are not back on the shelves.
"Information strategy" in a survey results show that the answer "refuse to install Qihoo 360 companies up to 60%.
An Internet company started relying on the security is facing the "unsafe" denounce …
To fully restore the true face of Qihoo 360, the "independent investigators" have superhuman technical ability and hard work, stripping cocoon spinning like layers uncover the success of its internal mechanisms crack.
Qihoo 360 phenomenon, not only for the industry has a tremendous destructive serious destructive order on the Internet, but also to society as a whole "cancerous infiltration.
This "cancerous infiltration, let the original market competition to the underlying control the warring. "Daily Economic News" reporter was informed that Baidu is about to hit a large amount of money to invest in the security field, the fastest will be officially launched in the first half of this year, exactly the same experience "3Q war Tencent stationed in the area of security.
Sadly, the defense Qihoo 360 "cancerous infiltration, controlled from the ground up to the application layer several giant were to get involved, such direct consequence, the future of China's Internet will become a Tencent, Baidu,Ali, Qihoo 360 "Shikoku Dingli Optimus system. This will allow a full, rich rainforest of the ecological environment into a Big Mac for survival and loss of life.
Maybe you like:
- Baidu win the battle with Qihoo 360 Search? Baidu's expected to report growing investment in mobile and other technology as it tries to maintain its users . . Baidu's long been the search leader in China and captures more than 60% of the market. But when rival Qihoo launched a search engine last year, it quickly gained about 10% of the market, though much of that gain was at the expense of Google....
- Qihoo 360 Can Beat Up Baidu? Maybe many friends could ask 'Is Qihoo 360 the Next Baidu? ' ,as i know ,it's impossable. At the last war between Qihoo360 and Baidu , you shall be taking notice of them .but i think in a long future days Baidu will be Google of China....
- WeChat to set up US office Market value of China's largest Internet company is preparing to set up branches in the United States, social information development of its mobile services, WeChat, the north American market, the company director told the "global times" on Monday....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
The Apple iWatch watch patent Exposure: touch screen can be bent
Chinese-style Apples
Feb. 21 message, according to foreign media reports to AppleInsider see Thursday patent application reveals Apple is indeed developing wearable accessories equipment, not only has a flexible touch-screen display, and use the "bracelet" principle is also in line with the human bodyengineering requirements.
Apple for the first time in August 2011 submitted to the U.S. Patent and Trademark Office the bistable spring "with a flexible display patent applications, as described in the the wearable accessory equipment can easily be worn on the the users wrist or other parts of the body. The product can be used by multiple communication protocols such as Bluetooth or Wi-Fi connection to a portable device, complete set on the user's wrist flexible display relevant information is displayed in real time.
Although the device itself can be used in almost any part of the body, but the most suitable parts of the user's wrist. Apple did not use a clip or other cumbersome attachment method, but proposed the use of bi-stable spring: "The device is widely used bracelet, stratified by fiber wrapped sealed flexible steel bars. The bracelet usually 1 inch wide, 9 inches long. "
According to the patent document, the proposed invention to the most simple form of flexible display as well as the necessary electronic components embedded in traditional bracelet. This bi-stable spring made of thin steel bars and fibers, package and heated closed. The monitor will be with an adhesive glued to the side of the bracelet, and the logic board of the device, battery, and other components mounted to the other side. In this manner, mounting member, in wearing the bracelet will cover the the important electronic module.
In another case, the invention proposes a more robust design, the flexible display is mounted directly hand on the ring, with thicker, more comfortable fiber covering "framed". Patent that switch and key electronic components should also be durable, hand ring switch, depending on whether the user wears to take convex or concave configuration.
When it is in the crimped state, or when the sleeve on the arm of the user, the hand ring showing in the form of uninterrupted screen. Above sensors such as gyroscopes and accelerometers, will help the positioning screen on the information, user-friendly browser. Although the bracelet is a major point of discussion, but the paper pointed out that, in any number of other materials may be used, such as the use of devices such as buttons or Velcro can be used as a point of attachment. This makes the design Interpretation leaving the space can be designed for the more traditional watch interface.
As for the availability of this invention is pointed out that the product does not need to be limited to the display from portable devices such as the iPhone, the basic interaction with the phone: "touch-screen user input, the user can perform many different tasks, including adjustments to the currently playingthe order of the list, view recent telephone records. Given a simple virtual keyboard on flexible displays that configuration, and can even manage the response to the current SMS. "
Existing "smart watches" as Pebble interactive features of the basic form of this Apple patent this idea to a higher level, as you can view and control the digital map. Apple wearable display is truly universal, because end detection sensor provides emergency response capacity to adapt to the size of the parts of the body. The sensor is located in one end of the apparatus, and not used in the display portion can be closed when the the little user uses the hand ring. In some cases, the touch screen itself can also be used as the terminal detection sensor.
In addition, the ambient light energy collector (commonly known as solar panels) and kinetic energy collecting devices, including hand ring to improve battery life. AMOLED display is also able to further enhance the efficiency of the product, although Apple has not yet launched the products using the technology.
Facilitate communication through the wireless protocol, although the author of the patent also contain synchronization and internal battery charging cable connector. The patent application published Thursday showed that Apple is developing iWatch. Rumors about this device has been speculation, many industry observers believe that wearable computing is the next logical development of mobile technology.
If you decide to production equipment proposed by Apple in the hands of multiple patents, including curved glass manufacturing process, solar cell multi-touch panels and dynamo kinetic energy technology. The documents show Thursday patent inventors Fletcher Rothkopf (Fletcher R. Rothkopf), Derek Wright (Derek W. Wright) and Scott Myers (Scott A. Myers ).
Maybe you like:
- Worry apple peel's Hot: patent war simmering Curiosity is human nature. Apple's being practiced of imitation, "apple peel 520" (hereinafter referred to as apple peel let fans experience to wait for a long time....
- Apple Peel 520 Screen Light Up When Getting A Call I just discovered this and thought I would share. If you install Insomnia from Cydia, the screen will light up when receiving calls....
- Exposure of Google Android strategy Google and recent Oracle case exposed the GoogleAndroid internal PPT. Google 2013 start Android new strategy: 1.Increase advertising revenue 2.Increase the sales income APP 3.A substantial increase in the volume of, began to replace thefunction of machine. The interior should be considered a firm foot,has become the industry giant, to maximize income, and into theadjacent markets. 2008-2010, Google focus in the Android ecosystem structures, so that the operators, equipment, user participation. 2010-2011, Google extends the core business, is committed to thesearch service, search advertising, display advertising and Appdevelopment and improvement....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Alibaba, China Ping An, Tencent join forces online to sell insurance approved
Chinese-style Apples
Alibaba's Jack Ma, China Ping Ma Mingzhe, Tencent Ma Huateng joined together to launch the establishment of Zhong An online property insurance company, has been before the China Insurance Regulatory Commission agreed to build 'three Ma' sell insurance "will be put into practice.
Alibaba held a 19.9% stake in Zhong An online, as the largest shareholder; China Ping An, Tencent tied for the second-largest shareholder to 15%. In addition, six other small and medium-sized shareholders. New company located in the Internet economy service, mainly engaged in network security, e-commerce, online shopping consumers' rights protection, social networks and other property and casualty insurance business, setting up branches.
Ping An of China official said, the Internet plays an important role in China's national economy, but also encountered in the development of a series of risks and bottlenecks Unlike traditional industry. Therefore, the public safety online sales of existing insurance products not only through the Internet, but through product innovation, Internet operators, participants and users of a whole range of solutions, resolve and manage the various risks of the Internet economy, the target customers include all the participants of the Internet economy, such as the Internet platform, Internet service providers, e-commerce merchants, consumers of online shopping, social network participants and other companies and individual customers.
No branches, but the Underwriting and other work involving on-site verification and survey claims service, public safety line to take the online and offline "mode combination. Customer claims can be submitted through the online application, centralized audit processing by Zhong An online claims department. Zhong An Online will contract form of outsourcing, will need to line processing site survey to assess the damage and other services outsourced to professional service companies, to address the demand for services in the customer line.
Maybe you like:
- C Apple Peel invite businesses nationwide to join C Apple Peel is a new product ,now invite businesses nationwide to join .(nationwide is meaning China ,but I believe busunesses worldwide is not long)...
- Motorola wins permanent injunction against Apple's iCloud:iPhone, iPad pulled from online store In the seemingly endless Apple-Motorola legal slugfest, Motorola has just taken a few new swings at its rival--possibly at the behest of its would-be acquirer, Google. Apple has lost out on two counts. Not only has it suffered a blow to its iCloud service in Germany, the company has also pulled most models of its iPhone and iPad from its online stores....
- ZTE apple peel for ipod touch sell in America ZTE Peel will not like the 520 apple which made by Yosion technology, you can not buy it in domestic market in China, it only sell in American....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Wechat mid-March press conference held in Beijing: a major event to be rough?
Chinese-style Apples
February 23, according to sources, Tencent plans to convene a major conference in Beijing in mid-March, the theme associated with the wechat, has received some media activities of the notice.
Wechat has previously announced the breaking of the 300 million users, 400 million users is just around the corner, and when the game industry is most concerned about the micro-channel Wechat launch gaming platform, the official game and, therefore, in March of this conference, perhaps particularly worth the waitIt is understood that this conference father of Wechatwithin the Framework will be the protagonist, visible activities have a significant relationship with the micro-channel future business will probably be an important plan to publish a series of Wechat2013 open platform.
Commercial development of the evolution of Japan wechat LINE Korean wechat kakao talk, the game has always been the highlight of another point in the sales of digital content, and combined O2O business model. kakao talk Line through the introduction of more than business income quickly overstating the the Kakao Talk highest-paid game products has reached an aggregate 80 million yuan monthly income, revenue targets, even more than the popular Korean side travel products. Kakao talk generally released game downloads in more than 10 million kakao talk game is completely changed distribution patterns and market structure of the smart machine game market in Korea.
the gamelook expected wechat official game of the year, at least 100 million in new revenue, domestic mobile gaming market will bring monthly domestic intelligence equipment sales continued this year with the outbreak, according to Flurry statistics, last year Chinese Newsmart mobile devices to 160 million units the 2013 gamelook domestic amount of the new equipment is expected to reach 200 million units, and therefore long-term optimism the estimates, wechat or 300 million monthly mobile game revenues can bring this mobile game market as a wholeThe growth is very critical.
Maybe you like:
- WeChat to set up US office Market value of China's largest Internet company is preparing to set up branches in the United States, social information development of its mobile services, WeChat, the north American market, the company director told the "global times" on Monday....
- Samsung Galaxy S4 Release Date at March 14th The Galaxy S IV is coming.The madness began when mobile-review's Eldar Murtazin tweeted that Samsung would rain on HTC's parade on March 14. Soon after, well-connected SamMobile added that the event would take place in New York City....
- WeChat (Weixin) 3.5 for iPhone Download Weixin is a robust and comprehensive voice chatting app with photo and video sharing! With Weixin, you can chat with one or more friends, and find people around through LBS. It is available for iOS, Android and Symbian platforms, and supports English, Traditional Chinese and Simplified Chinese. What's new in Weixin version 3.5:...
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
WeChat to set up US office
Chinese-style Apples
Market value of China's largest Internet company is preparing to set up branches in the United States, social information development of its mobile services, WeChat, the north American market, the company director told the "global times" on Monday.
"We WeChat we are planning to set up offices in the United States, tried to explore opportunities in the us market," tencent holdings, said in a statement by E-mail sent to the "global times" said.
Listed in Hong Kong, the company said the WeChat office will be responsible for the research and development of the United States market, and establishing and expanding enterprise customer partnerships with the United States.
"If foreign product market success in the United States, there are a lot of good IT products and the birth of the company, IT is relatively easy," tencent's products to enter other markets.
Tencent declined to give more detailed contact, office location and size of the "global times".
Tencent announced in last month's WeChat users has reached 3 million, including more than 100000 overseas users, about two years later, the shenzhen-based company launched mobile applications.
"This number is likely to exceed 5 million, at the end of this year, this will be the number of Internet users in the country. In other words, it means that the domestic market will soon be WeChat saturation," industry consultancy based in Beijing Internet lab founder Mr Fang told the "global times" on Monday.
Statistics released by the China Internet network information center, in the country's Internet users increased by 10%, compared with last year to $56.4 billion by the end of 2012, people access the Internet through mobile devices, and total rose 18%, to $420 million.
Maybe you like:
- Wechat mid-March press conference held in Beijing: a major event to be rough? February 23, according to sources, Tencent plans to convene a major conference in Beijing in mid-March, the theme associated with the wechat, has received some media activities of the notice....
- WeChat 4.0 is Closed Beta Testing Using Independent Domain WeChat 4.0(The old Weinxin) from Tencent.Inc will be released,now is Closed Beta Testing, What is WeChat? The introduction from weixin.qq.com(maybe some days later,this will change into WeChat.Me) 1.One of the hottest voice messaging apps 2.Supports video, photo, text messages and group chats 3.Low data consumption Now ,the new domain wechat.me will jump to the old web page weixin.qq.com ....
- FAQ (Frequently Asked Question) of WeChat (The Old Weixin) What is Weinxin?What is WeChat? In act, a new name of weixin will be WeChat after Weixin 4.0 . From the official site,they introduce with those words: Weixin is a lifestyle. One of the hottest voice messaging apps Supports video, photo, text messages and group chats Low data consumption Now,Weixin was downloaded more than 100 minilion in less than 350 days....
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Samsung Galaxy S4 Release Date at March 14th
Chinese-style Apples
The Galaxy S IV is coming.The madness began when mobile-review's Eldar Murtazintweetedthat Samsung would rain on HTC's parade on March 14. Soon after, well-connectedSamMobileadded that the event would take place in New York City.
Although the name of the original text did not mention a specific product, but the famous Samsung news broke the news source SamMobile not only confirm the Mota gold is true, and further that the Samsung Galaxy S4 press conference will be held in New York March 14. Subsequently, the JK Shin, head of Samsung's mobile division, confirmed in an interview with the Korea Technology website Edaily the above authenticity of the message.
at Interview, JK Shin said that, The Galaxy S3 conference held in London last year, the strong demand for mobile operators in the United States, with the Samsung Galaxy S4 conference moved to New York. This is, Samsung released flagship model in the United States for the first time since 2010.
Although Samsung has refused to disclose specific information about Galaxy S4, but the media generally believe that the next-generation Galaxy flagship may be equipped with a 1.9GHz quad-core processor, full HD screen with a resolution of 1920 × 1080, running Android 4.2 Jelly Beansystems.
Maybe you like:
- Wechat mid-March press conference held in Beijing: a major event to be rough? February 23, according to sources, Tencent plans to convene a major conference in Beijing in mid-March, the theme associated with the wechat, has received some media activities of the notice....
- Apple-Samsung Patent War:Samsung Ordered To Pay Apple $1.05 Billion AN JOSE, Calif. — After a year of scorched-earth litigation, a jury decided Friday that Samsung ripped off the innovative technology used by Apple to create its revolutionary iPhone and iPad. The jury ordered Samsung to pay Apple $1.05 billion in the latest skirmish of a global legal battle between the two tech giants. An appeal is expected....
- Samsung: Apple wouldn't have sold a single iPhone without stealing our tech Samsung has been researching and developing mobile telecommunications technology since at least as early as 1991 and invented much of the technology for today's smartphones. Indeed, Apple, which sold its first iPhone nearly twenty years after Samsung started developing mobile phone technology, could not have sold a single iPhone without the benefit of Samsung's patented technology. For good measure, Apple seeks to exclude Samsung from the market, based on its complaints that Samsung has used the very same public domain design concepts that Apple borrowed from other competitors, including Sony, to develop the iPhone. ...
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Apple has reportedly authorized Huawei IOS System?
Chinese-style Apples
Apple has reportedly authorized Huawei IOS System?
11:43 last night, the former vice president of Huawei, the incumbent president of Enterprise magazine @ visual Huawei microblogging broke the news: "According to reliable sources, China's Huawei and Apple reached a technology transfer agreement, Huawei can use Apple's IOS system, product Huawei brandphone, achieve the Apple restrict the Samsung purpose.
At first glance we see this message, we thought it is impossible, absolutely impossible, so we intend to ferret out the authenticity of this microblogging, but carefully find the author of "Huawei Vision" microbloggingwe ,we found that bloggers of "Huawei visual"have disappeared microblogging gone, it is estimated to be deleted. We think that obviously was in malicious speculation, Apple can not be the IOS system to other handset manufacturers, not to mention the Chinese companies Huawei and even if Apple is willing to , the U.S. government is not willing to.
From the current situation, this rumor is basically not fly. In other words even if Apple really authorized iOS system, that does not necessarily Huawei to know the propaganda style before Huawei sake of making criticisms outgoing before cooperation can be a good description of the problem and Durex.Therefore, we suggest that we should not be concerned about this topic, it is clear this is water army in speculation.
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Baidu win the battle with Qihoo 360 Search?
Chinese-style Apples
Baidu's expected to report growing investment in mobile and other technology as it tries to maintain its users .
.
Baidu's long been the search leader in China and captures more than 60% of the market. But when rival Qihoo launched a search engine last year, it quickly gained about 10% of the market, though much of that gain was at the expense of Google.
In fact ,Qihoo360 gain the 10% of the search market could be are all of the expense of Google (Not much or almost) .
However ,I must say ,althong Baidu win the battle between baidu and Qihoo360 at Chinese search market ,But we couldn't Baidu will win all the wars bacause there are another player Sohu and Tencent's Soso .
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
Qihoo 360 Can Beat Up Baidu?
Chinese-style Apples
Maybe many friends could ask 'Is Qihoo 360 the Next Baidu? ' ,as i know ,it's impossable.
At the last war between Qihoo360 and Baidu , you shall be taking notice of them .but i think in a long future days Baidu will be Google of China.
All we know that Qihoo had begun hersearch engine and 360 safeguard and 360 brower has a larger market . but my internet brower is not 360 brower but Google chrome ,however the first page is baidu dot com .
In fact , Baidu search and Baidu wenku and Baidu zhidao are ournecessaries ,and now baidu is building her Baidu Cloud .(I like to call it BCloud)
- Qihoo 360: Internet "goldenrod"
- The Qihoo 360 backdoor: kidnapping user remote control
- Qihoo 360 backdoor Shame of security
[Ipod Touch Peel] Please moderate: "Yosion App 1.5.6 Stop Working On"
|