[Information Security] Threate of Micro $ OFT + CI $ CO

xiaoxiao2021-03-06  65

>> [Write in front]

This text should be found in a comment on INTERNET in June 2003 (now I have not been able to pass the source), the current topic is also my own, maybe I said some, but When one or two foreign companies have long monopolized several core products, we only have no truth, no fact, no speech, this is also one of the important reasons for anti-monopoly law. The following text may be a lot of inferior. It is the truth that is the judiciary of the judiciary. It is not necessarily true that the truth itself is not necessarily the truth, and it is not necessarily true. Today, it is more difficult to achieve evidence, never we can never be close to the truth, and "the heart of the defense is indispensable", this is indeed worth more.

【text】

In general, Microsoft products have a wide consensus in Japan, the European Union, and other countries, and relatively, Cisco products are far more than Microsoft products for national security. For example, Microsoft's products are installed in the installation of Microsoft products. When you have to submit the serial number, personal name, email address, company name, etc. What is the purpose? In fact, these data information sent through Microsoft's "back door" program to Microsoft American user information library. If the information fills in, the information filled in is true, Microsoft's piracy of Chinese individuals and businesses is said. Microsoft's operations in the network transfer process It can still be analyzed, from this point of view, the Cisco Router is the last gateway transmitted by the Internet information, and it is impossible to do his hands and feet. Therefore, Cisco products are more concealed for national security threats, and the harm is much larger.

In fact, Cisco products have the main source of information providing information for US intelligence. The Cisco product itself sets "back door" for intelligence purposes. In Cisco's problems, it often uses a super password, modifying or deleting unfavorable log information. Cisco can In response to related networks, add some "more" chips or enhanced chips in the product, even if it is physically completely isolated network, sensitive information can be obtained in a wireless manner. In particular, Cisco The goods have become a long project, saying that Cisco sets more traps on the product, first do something such as verification.

If Cisco works with Microsoft, it is seamless, you can steal any information and unknown. If Microsoft software can locate the MAC address of relevant sensitive information, Cisco triggers some illegal operations through his own back door. Of course, Microsoft can also Automatically retrieve sensitive information of the server or PC, in the appropriate conditions, through the rear door program, all or part of the relevant information.

If other countries have a little suspicious Cisco product security, it means that the security of Cisco can be guaranteed to a certain extent, and there is no problem with no doubt that the sound is very abnormal. If this article is in a few days on the Internet Not there, it will further prove the Cisco "Crisis" ability. The safety of its products is even more reason to suspect.

The US Intelligence Agency collects the main source of intelligence:

First, the Internet: The special analysis of Internet sensitive information and sensitive department information, due to Cisco carries the network topology, the network topology is clear, and the related information can be metastatic transfer And analyzing, the US intelligence department fully masters the Internet topology map of the world, collecting any information is in mastering. Second, satellite, through spy satellite collection and monitoring, can monitor the ground situation and monitor mobile phone calls, this Wei War It has been very obvious; the third, the global ground monitoring station (Taiwan, UK, Japan, etc.), as an additional role as information listening.

As the US intelligence department (not ruled out the Taiwan intelligence department), the Internet is actually the great threat of Cisco products to my country's security threats, but Cisco's research capacity is much larger than Microsoft, and the means of obtaining information is more concealed. (You can complete the hidden settings on the router, the customer can't find it at all), so it is not aware of the people.

These four enterprises (backgrounds are big, the relevant departments should be verified) Is Cisco into the Chinese market money laundering tool, which uses the national tax to collect individuals, these people use their status, directly to some The procurement project greets, directly determines the procurement of the project, through the sales of Cisco, they can get a large number of commission returns (national taxation and agency commission), if these illegal income comes from Cisco's profits from Cisco Original, and mainly from the loss of national taxes, the taxation of the state has become the black gold of Cisco to buy some people.

Now, Cisco has a production partner such as Foxconn in the Mainland. Some products are produced in these factories. Cisco has completed black money through the name of the US high price or improvement of the import of the company or improves the import of the company's import. These buyers. On the account. It is the existence of this wrong act. It is seriously damaged the international image of the motherland. I often face the question of American colleagues in the United States. I will feel the trend, some of the national failures, for the private point of sacrifice the interests of the nationality It is recommended that the relevant departments of the State for Cisco's taxation and illegal acts will conduct a special investigation, and the relevant lawless molecular rope will be related to the law.

Suggest:

1. Install Microsoft's Windows, Office, and Databases such as software, whether it is genuine or piracy, do not use real personal names and organizational names, especially those with sensitive information.

II. Special investigation and real-time check for Cisco's source code, some of the information of the back door pointing to the US CDT or Taiwan's intelligence department (Taiwan has an intelligence department in the United States, specializing in the mainland). Third. Do not use the firewall Cisco's equipment, once the safety product uses Cisco products, Cisco enters any network more unimpeded, and will not leave any clues. IV. Some key networks design topology and IP address have allocation, these should be the country Confidential, Cisco can't get this information so that Cisco can feed back this information to the US intelligence department. You can get information, Cisco built network, for the network topology and IP address information, as needed, for the network topology and IP address information, these are timed bombs .......................................................................................................................... .. Six. Require Cisco open source, and can only compile the program in China in China, to complete the program compilation of the relevant source code and the source code of Cisco compilation, and the actual product still contains traps.

转载请注明原文地址:https://www.9cbs.com/read-112702.html

New Post(0)