Bitcoin virus form
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers
What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese
In fact, the recent wncry virus is not the first time that blackmail software has become powerful. Not long ago, Android system also appeared a blackmail software, mobile phone encryption after ransom. After the software was checked and killed, it soon made a comeback with an upgraded version. This new version of blackmail software infects files with a random key, and even attackers don't know how to unlock it. Even users pay ransom in vain
we can see that with the continuous development of IT technology, although there are many IT employees, the main employees are mainly concentrated in the fields of mobile platform, cloud and artificial intelligence, and the most popular programming language has graally evolved from C and C + + for underlying operation to managed Java or even go language for modeling. The field of information security is a technology that directly faces the bottom. Fewer and fewer people are engaged in the bottom programming, which means that the number of practitioners of information security is getting smaller and smaller. The direct consequence of this phenomenon is that the backward technology can attack the advanced technology in the network world, which is very similar to the invasion of advanced civilization by the backward barbarians in human society. The recent outbreak of wncry virus may come from North Korea, which also confirms this trend from the side. Some organizations and even countries are not qualified to engage in high-end technology, but the virus they write can spread all over the world. Blackmailer software has further expanded the scope of attack, such as online games, smart cars and wearable devices have a large number of leaks. Reviewing the history of such software can be roughly divided into the following stages
from the current situation, there is no sign of easing the bifurcations of bitcoin, but the emergence of bitcoin ETF and wncry virus has pushed the price of bitcoin to new highs. Personally, I think the short-term rate of bitcoin will probably exceed 20000 RMB. However, considering that there is not all the competition for bifurcations among varieties such as lightcoin, from the perspective of investment, if bitcoin falls again e to the competition for bifurcations, it is actually good for lightcoin. Therefore, if some readers hold a lot of bitcoin and do not want to sell it, You can consider hedging with long Leyte
from the perspective of information security, the bifurcation problem is likely to affect bitcoin's status as a ransom for blackmail virus. The author thinks that the virus accepting Wright coin and ether coin as ransom will be born soon
however, blockchain currencies are more or less troubled by processing speed, and the encryption algorithm is not easy to upgrade. In the long run, the risk is relatively high, and the signs of short-term price manipulation are relatively obvious. If the psychological enrance is not strong, just watch their running track
the malware will scan the TCP 445 port (server message block / SMB) on the computer, spread in a worm like way, attack the host and encrypt the files stored on the host, and then ask for ransom in the form of bitcoin. The amount of extortion ranged from $300 to $600
on May 14, 2017, a variant of wannacry blackmail virus appeared: wannacry 2.0, which cancelled the kill switch and spread faster. As of May 15, 2017, wannacry has caused cyber attacks in at least 150 countries, which has affected the financial, energy, medical and other instries, causing serious crisis management problems. Some windows operating system users in China are infected. Campus network users bear the brunt of the infection. A large number of laboratory data and graation projects are locked and encrypted.
2. This kind of blackmail virus mainly infects windows system. It will use encryption technology to lock files, forbid users to access, and blackmail users
3. The attacker claimed that he could only unlock the file after asking for more than $300 worth of bitcoin. In fact, even if the ransom is paid, it may not be able to unlock the file
Why are they infected
once the blackmail worm attacks a user machine that can connect to the public network, it will scan the IP of the intranet and the public network. If the scanned IP has opened port 445, it will use the "enternal blue" vulnerability to install the back door. Once the backdoor is executed, a blackmailer virus named wana crypt0r will be released to encrypt all documents and files on the user's machine for blackmail
why use bitcoin
bitcoin is a kind of point-to-point network payment system and virtual pricing tool, commonly known as digital currency. Bitcoin is popular among cyber criminals because it is decentralized, unregulated and almost untraceable< Background of transmission and infection
this round of blackmailer worm virus mainly includes two family variants onion and wncry, which first broke out in Britain, Russia and other countries, and many enterprises and medical institutions were recruited in the system, resulting in heavy losses
global monitoring of security agencies has found that as many as 74 countries have suffered this blackmailer worm attack
since May 12, the spread of infection in China has also begun to increase sharply, and the outbreak has been intensified in many universities and enterprises
wannacry blackmail virus prevention method:
1. Install the latest security patch for the computer. Microsoft has released patch ms17-010 to fix the system vulnerability of "eternal blue" attack. Please install this security patch as soon as possible; For Windows XP, 2003 and other machines that Microsoft no longer provides security updates, we can use 360 "NSA Arsenal immunity tool" to detect whether there are vulnerabilities in the system, and close the ports affected by the vulnerabilities, so as to avoid being infringed by blackmail software and other viruses
2. Close ports 445, 135, 137, 138 and 139, and close network sharing
3. Strengthen the awareness of network security: don't click the unknown link, don't download the unknown file, don't open the unknown email...
4. Back up the important files in your computer to the mobile hard disk and U disk as soon as possible (regularly in the future), and save the disk offline after the backup
5. It is recommended that users who are still using Windows XP and windows 2003 should upgrade to Windows 7 / windows 10 or windows 2008 / 2012 / 2016 as soon as possible.
Hayek studied business cycle theory and monetary theory with his teacher Mises early in his academic career. In 1931, he published "price and proction". Because the proposition in the book is contrary to Keynes's "on money" published a year ago, they launched a debate
The most typical example of
is gold and silver. For a long time, gold and silver were the common currency in the world. The hard currency of trade in all countries did not belong to any one country. Even in the era of gold standard, the state issues legal paper money, but legal paper money is still anchored by the free competition of gold. Gold circulates freely in the world and is more rigid than paper money
There are at least three reasons that lead to the existence of a large number of competitive currencies:one is the existence of multi-level market, because the metal currency is not easy to cut, super zero denomination currency and silver currency coexist
In the 18th and 19th centuries, there were long-standing high-ranking gold coins in Bangladesh, such as mulu, Sika rupee, middle akut rupee, and low ranking copper coins and BEIBI coins. Because silver coins are not easy to cut, a large number of shell coins with zero denomination are needed in remote areas and small exchangethis situation existed for a long time in ancient China, and the copper coin standard lasted for more than a thousand years in ancient China, but the iron coin also circulated for a long time (such as the Song Dynasty), and the face value of iron coin was smaller than that of copper coin. In the Qing Dynasty, with the discovery of Potosi silver mine in South America, a large number of silver coins flowed into China. Around 1730, the use of silver and money accounted for half of the transactions. Compared with copper coin, silver coin has a larger denomination, which is convenient for large transaction and solves the problem that copper coin is not easy to transport
The second is seasonal deflation, and private coins balance market demandin the agricultural era, the transaction volume of agricultural procts accounted for a large proportion, and a large amount of money was used for agricultural procts transaction. However, agricultural procts have obvious seasonality, and the transportation and supply of metal money is extremely inconvenient, so the problem of insufficient money often appears in the harvest season. In his book, Professor Kuroda cites the example of Quanzhou, Fujian Province, China in 1606. The original inventory management money could not meet the rice trade, so the private money was imported to meet the market demand to balance supply and demand. This kind of situation happens every year in China. Every year, it is the peak of money demand near the Spring Festival. The central bank will release part of liquidity to balance supply and demand
Thirdly, metal currency is a kind of deflation currency, which circulates a variety of currencies in regional and specific areas In his book, Professor Kuroda cites Nadina Jebel's case, "the transactions of grains such as rice are used for sonoto silver coins, the transactions of oils and fats are only used for French akote rupees or British akote rupees, and the transactions of flax are only used for French akote rupees." At the beginning of the 20th century, in China, all kinds of silver coins were circulated in Jiujiang, Jiangxi Province. Mexican silver coins were used for the export of tea and porcelain procts in Shanghai, and silver coins issued locally in Jiangsu Province were used for the trade of local markets such as tobacco or beans. There are also silver bills used in Shanxi business circle, and various copper coins used in the coin community around the China Sea, including Japan, North Korea, Southeast Asia and other countriesthe problems of metal currency in multi-level market, seasonal deflation, regionality and specific fields do not exist in today's credit currency era. Many of the competitive currencies listed by Professor Kuroda also disappeared in the globalization of silver coins and the legal tender system
therefore, the monetary pattern of countries in the world we see today is one country one currency, which is legally issued by the state monopoly
Zhiben society is a hard core learning society that listens to hard lessons, reads hard books and reads hard texts. Wechat search "benshe" (ID: benshe0-1) to learn more in-depth contentat the meeting, the chairman of Haier's board of directors and chief executive officer delivered a speech entitled "nine years of exploration of Haier's Internet model", which told the outside world about the changes that are taking place in Haier“ Zhang Ruimin believes that enterprises must take the initiative to subvert the closed situation, rather than being subverted by the closed situation, just like Stewart? As Kleiner said in "a century of management", there is no final answer to management, only eternal questioning. In the face of the changing era, what Haier should do is to ask and pursue forever, so that Haier can truly become an enterprise of the times
the following is the full text of the speech
in September 2005, we put forward the "rendanheyi win-win" model, and we have been exploring the Internet model for more than nine years. So why do we have to persist for more than nine years? At present, what is Haier doing? The combination of these two issues is actually a cause and effect relationship or context, which includes the past tense, the present progressive tense and the future exploration of Haier's Internet model
why should we persevere for more than nine years
the so-called "win-win combination of human and single", "human" is the employee, and "single" is the user demand. It is very difficult for an employee to connect with his user needs, because it is not easy for an enterprise to find its own users. It is even more difficult for everyone to find their own users
Why did we propose the "rendanheyi win-win" model in September 2005? Because the most difficult part at that time was that it was difficult for the internal staff to understand the changes. Why? Some people say that we have developed very well now, and many enterprises are still learning from Haier. Why should we change? What are the benefits of change for us? Others feel that (change) can be a threat to themselves
however, at the beginning, we felt that the challenge of the Internet had come. What challenge? Zero distance of information - the original information is asymmetric, and users on the Internet get more information than enterprises. What is the challenge of zero distance information? It is the user personalization, which requires enterprises to change from mass manufacturing to mass customization. However, there is no way to carry out mass customization without every employee aiming at his users. Therefore, this is a choice that must be made to meet the challenges of the Internet era
at the beginning, it was difficult for Haier's internal staff to accept it. Why? Because our past culture is executive culture. We can develop from a small collective owned Street factory with only a few hundred people when we started our business in 1984. The main reason why we are able to stand out is that we refined a "Riqing model" at that time - "daily affairs end day by day, Riqing day by day". Today's things must be done today, and today's things must be improved compared with yesterday's. We have put forward a principle of 1% -- 1% higher than yesterday every day, which can be doubled in 70 days. The main reason why we are able to stand out from a large number of enterprises, creating famous brands, diversifying expansion and internationalization are relatively smooth is that although many Chinese enterprises are learning from foreign advanced management models, the management was too extensive at that time, and there was no way to put it in place, while the Riqing model put it in place. Until now, many enterprises have come to Haier to learn from Haier. After listening to the transformation of Haier, we are not interested in this. Just teach us the Riqing model
implementation in place is uniform and completely mandatory, which is definitely not good in the Internet era. Therefore, in 2005, we proposed to transform. However, it's hard to accept that we need to change our ideas, our mode of thinking and, more importantly, our management and organizational structure. Therefore, we have been exploring for such a long time, because at the beginning, we are always tangled, sometimes wandering, sometimes taking two steps, one step back, or even two steps back, which is a trial and error process
then, why do you insist all the time? It is based on such a concept: "there is no successful enterprise, only the enterprise of the times". All enterprises should not say that they are successful, as long as you feel that they are successful, but that is only because you have set foot on the rhythm of the times, and no enterprise can always set foot on the rhythm of the times, because the times change too fast, there is no way to predict it; We are human beings, not gods, and we can't step on it forever. So the only thing we have to do is to change ourselves. Enterprises can't change the times
how to do it? Haier has a very important idea - to be self righteous rather than self righteous“ What is "yes"? It's the times, it's the users, only with the changing users and the times The innovator's gene (39; S DNA) has a saying that "even if you look in the same direction, you will not see a new direction." Why do you have to look in the same direction? Because of self righteousness, I think it's OK to go down this road. As a matter of fact, this is no good. We have to take another road. Clayton? Christensen said that there are two types of innovation, one is continuous innovation, the other is destructive innovation. Continuous innovation is just a continuation of the past, while disruptive innovation needs to find a new way. Disruptive innovation is two outcomes for enterprises, either become a destroyer or be destroyed
we hope that Haier will become a destroyer of the old model and create two platforms: one is an investment driven platform and the other is a user pay platform. The so-called Investment Driven Platform refers to the transformation of an enterprise from a management and control organization into an investment platform. There are no longer various departments and business divisions, and all of them have to become entrepreneurial teams. The relationship between the company and these teams is just that of shareholders and entrepreneurs. In the past, the organizational structure was a positive triangle. Was it max? The bureaucracy proposed by Weber. The biggest characteristic of the hierarchical organization is that it is neat and uniform, the instructions are always in the end, and all people are required to implement them in place. And each employee is in different positions, different positions, pay is often related to rank, so do not care about user needs. However, in the Internet era, with personalized users and fragmented market, the uniform organization will be subverted. Therefore, the whole organization of Haier has changed from a triangle and pyramid to a flat structure. Before, the "positive triangle" was full of various levels, and now it has become an entrepreneurial team. So, what has Haier become? An ecosystem. From the previous relationship between superior and subordinate to the relationship between investors and entrepreneurs; Of course, this is not the same as ordinary investors, because first, they should be responsible for the correct strategic direction, and second, they should have a platform to drive employees on the right road. In the past, the functional departments, such as human resources, finance, strategy, information, etc., constituted the service platform, and the entrepreneurial micro businesses that have done a good job can purchase services on this platform. Therefore, employees are paid by the enterprise, now that there is no (in the traditional sense) superior and subordinate. Who is the superior of the enterprise? Who is the superior of the staff? It's the user. Therefore, to create value for users, there is salary; Without creating user value, there is no salary
the goal of our transformation is to transform the original accelerator for manufacturing procts into an accelerator for incubating makers. Originally, it was for scale. The more procts we made, the faster we made, and the more competitive we made, the better. Now we want to become incubators. In short, the enterprise should change from the original proct manufacturer to "maker manufacturer"
Joseph? Schumpeter has a very good saying that innovation is the re combination of proction factors, so innovation is not equal to the development of new procts, more importantly, the re combination of proction factors. How to regroup? What you need to do outside is how you need to do it to meet the needs of users and the market. Take a popular example, like playing poker, there is no way to control what cards you catch, but whether you can win depends on whether you can combine the cards in your hand to the best, including the coordination between each other and the judgment between opponents<
the investment driven platform of the two platforms
now Haier has no hierarchy, but only three kinds of people - platform owners, micro owners and makers, all around users. In the past, employees had to obey the command of their superiors. Now, to create value for users, they must become entrepreneurs and makers. These makers form small and micro start-ups, and makers and small and micro owners jointly create users and markets. However, small and micro owners are not appointed by enterprises, but jointly elected by makers. Makers and micro owners can choose from each other. If the micro owner has been working for a period of time and is considered incompetent by the makers of micro members, they can be elected. In fact, Haier's Micro owners are often selected. The most important thing is not limited to internal staff, but also the introction of external resources. These micro businesses, together with social resources, become an ecosystem to create different markets. This will form an ecosystem with many parallel platforms, facing different markets and users
I often refer to the author of wikieconomics, don? In Mr. Tapscott's two words, "the world is your R & D department" and "cooperate or disappear". I have extended the previous sentence, "the world is your human resources department", and the human resources of the whole world can be used by me. For example, several employees found on the Internet that some pregnant women said it was difficult to watch TV after pregnancy, and they wanted to watch TV in bed. As a result, these people set up a home projector, which is doing well now. They no longer have their own R & D department: R & D resources are from Silicon Valley in the United States, and the main core components are from Texas Instruments in the United States, which are proced in Wuhan Optical Valley. The latter sentence is a great challenge to traditional enterprises. In the past, enterprises must play games with upstream and downstream. Suppliers, marketers and so on all want to maximize their own interests. But now we need to work with users to create demand and maximize the interests of all parties
why does it take a long time to transform to the present? A big challenge is that tens of thousands of middle managers must turn into entrepreneurs, or they will leave. The "middle management" here is not the traditional middle-level leaders or managers, but the insulation wall between enterprises and users. These people do not necessarily have any positions, but all the resources from outside have to go through them. For example, if suppliers want to come to Haier, they have to go through them, which leads to many problems; Now, all the suppliers only need to access through the network. Before, it was a bit like Chinese universities, which were strict in and strict out, while American universities were strict in and strict out. Only in this way can the network be integrated into the best resources< br />