laitimes

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

author:CSDN

Author | Wang Qilong

Exhibiting | CSDN(ID:CSDNnews)

Through "the present in history", the future can be seen from the past, and the future can be changed from the present.

Today is September 27, 2021, and for the development of the Internet in China, today has taken place a very important event - the monopoly war between Tencent and 360. This battle without smoke and smoke treats the user's computer as a platform, so that the software that users use to disinfect every day conflicts with the software that they use to communicate every day. What other technological events in history have happened on September 27 that are closely related to our lives? Let's step into the time tunnel and find out.

September 27, 1930: "The father of hard drives" Alan Shugart was born

On December 18, 1987, Larry released Perl. Perl is a feature-rich computer programming language that runs on more than 100 computer platforms and is widely applicable, from what was originally developed for text processing, today, Perl is used for a variety of tasks including system administration, web development, network programming, GUI development, and more.

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

Source: Wikipedia

It can be said that Schugart's life is the life of the disk industry, and the two are inseparable. Growing up in Southern California, Schugart graduated from the University of Redlands with a Bachelor of Science degree in Engineering Physics in 1951; after graduation, Schugart joined IBM as a field engineer. He was responsible for IBM's development projects, including the development of the first hard disk drive; in 1967, IBM introduced the world's first floppy disk, which was 32 inches in diameter and later shrunk to 16 inches, developed by Schugart.

After leaving IBM, Schugart began his bumpy entrepreneurial career. In 1973, Alain Schugart founded Schugart United, a specialized floppy disk manufacturing company that was fired by the company's board of directors in 1974, and the company's name is still called Schugart. In 1979, Schugart co-founded Seagate Technologies, a specialized disk drive manufacturing company that was fired by the company's board of directors in 1998; Seagate Technologies was subsequently acquired by Veritas Software. In 1998, Schugart started his third business, founding Alan Schugart International, a company specializing in venture capital and public relations services.

As the most important component of the computer, the hard disk is really insignificant compared with its value, far less than the microprocessor chip, operating system, etc. In the past, people have been worried that the hard disk capacity is too small. Limited hard disk space has stretched many applications; since the birth of the personal computer, technology has advanced by leaps and bounds, but it is still far from meeting the hungry needs of users, which has become the most powerful driver of market growth and industrial development. However, by the end of the 1990s, the situation began to reverse, and users seemed to have the feeling of "eating enough" for the first time.

In 1994, Alain Schugart predicted that "in the future, if desktop computer users ask for a 100GB hard drive, it will be a matter of course." When he said this, the hard drive facing the personal computer had just exceeded 1GB. In June 2001, Maxtor introduced a 3.5-inch hard drive with a capacity of 100GB. It was the first hard drive to be used for A PERSONAL COMPUTER with a capacity of more than 100GB.

Today is the era of databases, and the demand for capacity in databases is endless, but this is not the case for civilian hard disks. Twenty years ago, a 100G hard drive was enough for many people to use in the short term, and a 1TB hard drive was enough to use for several years. The large-capacity of hard drives has entered a critical period, and Alain Schugart never agreed with the pessimists' "death penalty" pronounced on the hard disk drive industry, just as he would never admit that his career was over. What do you think of the development of hard disks in these decades? Feel free to share your views in the comments section.

Source: Wikipedia

September 27, 1954: Perl Language founder Larry Wall is born

The two great men born today, Alan Shugart and Larry Wall, have one thing in common, and that is that they were both born in Los Angeles. Born on September 27, 1954 in Los Angeles, USA, Larry Wall graduated

The University of California, Berkeley, is a programmer, system administrator, linguist and writer, and he is best known for the programming language Perl, which he designed.

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

Larry was the creator of the Perl language, studying chemistry, music, medicine, and natural linguistics as a student, but as a programmer, he never had a formal computer science education. Before graduating with a bachelor's degree, Larry worked for several years in the university's computer center. At graduate school at the University of California, Berkeley, he and his wife studied linguistics in order to find a language without writing and create a writing system for it; they would use this new writing system to translate different articles into that language, including the Bible.

The study of linguistics helped Larry in Perl's design. Perl was born out of what Larry Wall himself defined as the "three virtues of the programmer": he was lazy, impatient, and arrogant. Laziness refers to programmers who can't stand a lot of work, so they want to develop programs to simplify everything; impatience refers to the fact that the original tool is too inefficient and impatient; arrogance refers to the programmer's belief that he can do better. In fact, the connotation of these three virtues is diligence, patience and humility. Larry himself ran into these three problems and created the Perl language in this mindset.

September 27, 1983: Richard Stallman initiates GNU

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

Image source: CSDN Downloaded from The Oriental IC

On September 27, 1983, Richard Stallman launched GNU. GNU is a free and open source software project with the goal of creating a completely free Unix-like operating system. GNU consists of a series of applications, system libraries, development tools, and cores for resource allocation and hardware management.

GNU is pronounced /ɡnuː/, gNU's Not Unix! The initials are recursively abbreviated, Chinese translated as "Genu Project". GNU's own kernel, Hurd/GNU Mach, was slow to develop, coinciding with the release of the Linux kernel in 1991, so some components of the GNU project ran on top of the Linux kernel and became important basic components of the Linux system.

GNU is an important milestone in the history of open source software. In the early nineties, GNU had enough software to create a complete operating system, but the originally planned GNU kernel did not attract enough people to develop it, so the GNU system was not completed. In 1991, Linus Torvalds, who was majoring in computer science at the University of Helsinki in Finland, invented Linux, and GNU was integrated with the Linux kernel in December 1992, making it a complete operating system. The Linux operating system, on the other hand, includes GNU components and software from the Linux kernel and other free software projects, and is commonly referred to as GNU/Linux.

Today, thousands of programmers around the world are still active in the Linux community, sustaining the development of GNU/Linux in the form of open source software. Many companies also pay engineers to help maintain the Linux kernel and its ancillary software, and although GNU/Linux is open source, companies can still profit from it; companies like Dell, IBM, and HP sell Linux on their own servers. GNU software is also installed on many UNIX systems because the quality of GNU software is better than previous UNIX software. GNU tools are also widely ported to Windows and Mac OS.

September 27, 1996: Hacker Kevin Mitnick is indicted

What are your thoughts on hacking? Do you think hackers are as cool as they are in the movies, or do you think hackers are just programmers like yourself? Kevin David Mitnick, now a cybersecurity consultant born in Los Angeles on August 6, 1963, was the first hacker wanted by the FBI and the world's "number one computer hacker" by others.

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

Cruising the Pentagon, logging into the Kremlin, going in and out of all the world's computer systems, destroying the global financial order and rebuilding a new world pattern, no one can stop our attack, we are the masters of the world. —Kevin Mitnick

Kevin Mitnick's technology may not be the best among hackers, and even a considerable number of hackers hate him, thinking that he is an attack maniac who only uses attacks and does not understand technology, but the legend of his hacking experience is enough to shock the world and make all cybersecurity personnel lose face.

Mitnick was the first hacker to appear on the FBI's "Bounty Arrest" poster. Mitnick grew up with divorced parents, and lonely he became interested in computers. Micnick, a 15-year-old, broke into the computer console of the North American Air Defense Command System, and he and other friends rummaged through data on all U.S. nuclear warheads pointing to the former Soviet Union and its allies, and then sneaked out again.

The incident has become a major scandal for the U.S. military, and the Pentagon has remained silent about it. Afterwards, Clayton, a well-known American military intelligence expert, said: "If Mitnick had sold this information to the KGB at that time, he would have received at least $500,000 in honorariums." The United States, on the other hand, would have to spend billions of dollars to redeploy. ”

On September 27, 1996, Mitnick was finally taken to court. The trial lasted until March 16, 1999, when Mitnick pleaded guilty to five of those counts and two additional counts, resulting in a total sentence of 68 months, plus 3 years of residential surveillance. The FBI also accused him of causing hundreds of millions of dollars in damages, with the prosecution seeking $1.5 million in damages. According to Mitnick's intrusion, they suffered about $290 million in damages. These victims include high-tech companies such as Sun Systems, Novell Computer, NEC USA, and Nokia Mobile.

On January 21, 2000, a U.S. court announced his release from prison on parole. Of course, the legendary hacker was banned from using electronic devices, including any cell phone or computer. But in 2002, Mitnick received a Christmas gift from the Federal Communications Administration (FCC): radio has been one of Mitnick's hobbies since the age of 13, so the FCC decided to reinstate Mitnick's amateur radio license.

Mitnick believes it was this hobby that sparked his interest in computer hacking, but the license was not easily restored, and he had to pay a fine of up to $16,000 — but he was still happy that the license was restored.

Source: Wikipedia, Baidu Encyclopedia

September 27, 2001: Jan de Wit is convicted of Anna Kurnikova virus

Anna Kurnikova virus is a world-famous virus, and it is famous not only because of its wide range of transmission, but also because it exploits the weaknesses of human nature. The virus is a worm, once the recipient opens and executes an attachment in the e-mail called "AnnaKournikova.jpg.vbs", the computer will be poisoned and automatically copied, and the attachment file will be transmitted to all recipients on the e-mail address book, thereby paralyzing the e-mail server.

Kurnikova is a famous player in the Russian tennis world, and it can be said that the makers have used the charm of the "tennis beauty" Kurnikova to achieve the influence of this virus. Ironically, the first reaction of many victims at that time was not to be angry because of the virus, but to not see a picture of Anna Kurnikova. Fortunately, the maker Jan de Wit was only a teenager who liked to prank, and finally surrendered himself, so as not to cause a catastrophe.

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

In 2001, Jan de Wit from the Netherlands began spreading anna kurnikova virus on the Internet. Surprisingly, Jan de Wit is not the kind of "computer prodigy" we think, he knows very little about the writing of programs, just downloaded a completed virus program on the Internet, modified a small part according to the guidance, and completed the Anna Kurnikova virus. And every Internet user, whether for fun or venting, if he wants to create a virus, can easily achieve his goal whether he understands programming or not. The cost of creating chaos is so low that twenty years ago, when Internet law was not yet sound, it was chilling.

The Anna Kurnikova virus initially only attracted some lustful people, but because of the characteristics of the worm, it soon infected these people's corporate mailboxes, and eventually 55 companies were affected by the virus. On September 27, 2001, Jan de Wit surrendered and was convicted of the Anna Kurnikova virus; the judge sentenced the mischievous young man to 150 hours of community service, which made him understand the price of curiosity or impulsiveness, and at the same time made the young man do more labor and do a little more.

Over the years, even though the tactics have varied, the rationale for social engineering attacks is inseparable from the weaknesses of human nature, which have not changed much in the past decade and are unlikely to differ in the future. Today, in 2021, there are still many people searching for photos of Kurnikova, which is why various online traps are still enduring to this day.

September 27, 2010: "3Q Wars" officially began

The entanglement between Qihoo 360 and Tencent has a long history and has been vividly called the "3Q War" by the industry. This stems from the "mutual pinching" between the "star products" of the two sides in 2010. On September 27, 2010, 360 released its newly developed "Privacy Protector", which specifically collects whether QQ software violates user privacy. Subsequently, QQ immediately pointed out that 360 browser was suspected of borrowing yellow websites to promote. On November 3, 2010, Tencent announced that it would stop running QQ software on computers equipped with 360 software, and users would have to uninstall 360 software before they could log in to QQ, forcing users to "choose one of the two". For their own interests, from 2010 to 2014, the two companies staged a series of Internet wars and embarked on the road to litigation.

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

Do you remember the "QQ Doctor" icon now? QQ Doctor is a gadget launched by Tencent in 2010 to kill the Trojan, the interface and functions resemble 360, and it announced that norton anti-virus software will be given away for half a year. QQ Doctor is the origin of all subsequent disputes, and its birth allows us to confirm today that the instigator of this war is Tencent. If you don't know QQ Doctor, then you definitely know its current name: Tencent Computer Butler.

By mid-autumn in 2010, it was also the eve of the war. "QQ Software Management" and "QQ Doctor" are automatically upgraded to "QQ Computer Manager", covering functions such as cloud killing Trojan, system vulnerability patching, security protection, system maintenance and software management, which is also the mainstream function of 360 Security Guard. At that time, QQ Computer Manager would be directly forced to install in qq's user computers, and this next week Hongyi completely couldn't stand it, releasing a "privacy protector" tool directly for QQ, which caused a panic among netizens.

"Install 360 and don't want to use QQ" is the best summary of this war. The first time the parties went to court was on October 14, 2010, when Tencent voluntarily sued 360. In April 2011, the court of first instance held that 360's behavior had damaged Tencent's competitive advantage and constituted unfair competition, and sentenced Qihoo to accompany 400,000 yuan. This was not the only time the two sides went to court, and then Tencent took advantage of the victory to pursue and sue Qihoo 360 for unfair competition; then Qihoo did not sit still and sued Tencent for abusing its market dominance.

On the morning of October 16, 2014, the four-year-long "3Q War" finally came to an end. The Supreme People's Court pronounced a final judgment in the monopoly case of Qihoo 360 v. Tencent, finding that Tencent's QQ did not have a dominant market position and rejecting Qihoo 360's appeal. This has set a judicial benchmark for the monopoly case in the field of Internet in China, known as the "first case of Internet anti-unfair competition", and since then similar cases can be taken as a classic, but in fact, the influence of this case can almost be benchmarked against Apple vs Nokia, which is also extremely rare in the world. Seven years on, who do you think the real winner of the "3Q Wars" is? Join us for this review and vote to share your insights.

【Welcome to contribute】Taking history as a mirror, you can know the rise and fall. Since the development of computer science, there are many crucial events and figures, and all friends are welcome to work together to build "Today in History", Submission Email: [email protected].

The "3Q War" officially began; the first wanted computer hacker; the well-known "Beauty Virus" author was convicted | Today in history

Read on