Illustrates the fact that the brutality of the development of information technology because of the fast, technical and application related to fast replacement of the management of the Internet should not be a simple blocking, clearance, and other means to stop, but standing on a higher level through technical management tools on the Internet for illegal and criminal acts to be tackled, the management of commercial software in place. Although the development of the Internet in China to a certain stage, however, the information security environment of the Internet has not been effectively reversed, is not closed several small sites, is not strictly implemented the policy record (the other hand, because the record mechanism inefficient, but a lot of delay in the normal operation). Information security, can not be imperfect, the industrial chain of the parties should safeguard the stability of Internet-based environment, not just think of the commercial interests of light.
From the evening on the 19th, Beijing, Tianjin, Shanghai, Hebei, Shanxi, Inner Mongolia, Liaoning, Jilin, Jiangsu, Heilongjiang, Zhejiang, Anhui, Hubei, Guangxi, Guangdong and other regions have experienced Internet users reflect the fault. (China May 20, Nanjing Xinhua)
The telecommunications sector to the media revealed that the failure was due to storm video client software flaws but, Storm video, said the real reason for failure to provide services because the domain name service provider "dnspod" by a large number of the server from an unknown source, "Broiler "attacks caused. >> Comment network information, Luoyang life: http://luoyanglife.com/ >> Luoyang discount forum I love life: http://bbs.luoyanglife.com/ >> Henan entrance examination Network: http://www.edu-ha.com/index.php >> just one sentence: http://log-by-me.blogspot.com/
Things here, I have the following questions:
1: Network mafia's power in the end whether the government regulation?
Letters over the past few years the Department of Public Works has been a strong push main site record, I believe that this policy is a good starting point is to effectively control the Internet, but before a point I mentioned: the filing system site, solely on the basis of stand gentleman, by not mean the development of the Internet to the present, gangs run the network, the entire Internet attacks, Trojans, viruses, abound. We can speculate from the common sense, the real place of these viruses and Trojans gang network, they will not go to the record, few people would go in the record to the competent authority. I think the real solution to this problem is to increase the authority of law enforcement gang network.
DNSPOD this thing to be attacked, in fact, is reflected in the Internet governance gaps, China's information industry has been lagging far behind the legislation of China's Internet industry rapid development, and related legislation remains a long time before. This is a network of criminal gangs run rampant in our country's deepest-seated reasons, and relevant authorities on the management of the Internet remain at the site is only a temporary solution, such as the record of the means.
The second point is: the Internet business management software, is there a good response.
Having said that, in recent years, China's Internet companies in order to seize the market, have used a variety of technology to seize the user's lower left-hand corner, the bottom right corner of the desktop, browser and other end-users of resources. Still remember a lot of media exposure over the network audio and video of the storm to stay stormlive the process of long-term memory. The major area of failure is an important reason for failure dnspod occupied by a large number of Internet users StormCodec client continually repeated due to failure to submit dns domain name resolution process of the network congestion.
Before a lot of IT media, have reported on the video, there are many loopholes in the storm, it is easy to be used. This also shows that this is a gap: a large number of customers of commercial software, how to order in a stable Internet efforts. We imagine, adding the storm is just a local audio and video player, then I think this incident will not happen again.
The Internet to seize a number of strategic customers of business software, including Tencent QQ, security guards, Storm video, foxmail, msn and other software. In the increasingly crowded Internet, the information superhighway, the Internet software as well as the control terminal is like a big one on this team how to effectively regulate and manage, it should be put on the agenda of the relevant departments, the software vendor through the Internet indirectly or direct control of the computer users in the control of the process, who have to monitor? Who is responsible for this, how to ensure that the software is in the use of the data transmission channel to meet the user application, or to achieve their business objectives? Simply can not control, I even thought of Microsoft's black screen, though; under pressure, and finally to nothing. However, the so-called lesson, a guide for the future, the lessons are worth considering. However, the Storm is also one of the victims of audio and video.
Illustrates the fact that the brutality of the development of information technology because of the fast, technical and application related to fast replacement of the management of the Internet should not be a simple blocking, clearance, and other means to stop, but standing on a higher level through technical management tools on the Internet for illegal and criminal acts to be tackled, the management of commercial software in place. Although the development of the Internet in China to a certain stage, however, the information security environment of the Internet has not been effectively reversed, is not closed several small sites, is not strictly implemented the policy record (the other hand, because the record mechanism inefficient, but a lot of delay in the normal operation).
Information security, can not be imperfect, the industrial chain of the parties should safeguard the stability of Internet-based environment, not just think of the commercial interests of light.
评论