• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    White Dream Of Computer Youth

    2011/1/22 11:23:00 82

    Computer Youth Entrepreneurial Dream

    Zhao Wei, a post-80s generation, is a business leader who can almost be described as "cute".

    He looks a little shy. He uses his index finger to push the fashionable black side glasses on his nose.

    If it weren't for the small and exquisite laptop that he carried with him, if he hadn't had the cold and deep Internet terminology, he might not have thought that the little boy in T-shirt and jeans was the godfather figure in the security circle of China's Internet security.


    Together with the company he founded, Zhao Wei worked hard to promote the development of the Internet.

    Zhao Wei, 27, summed up his career as a life: "our goal is to make you enjoy the Internet safely."


    "White dream" of "computer teenager"


    Zhao Wei said that his resume is very simple, and he can finish in two sentences: born in Xi'an in November 1981, he majored in instrumentation and automatic control in University.

    After graduating from university in 2003, he entered a domestic network security company. He joined an American Internet software company in late 2005 and founded his own company in 2007.

    Zhao Wei's experience can be condensed into one sentence: "Internet security is inextricably linked."


    Zhao Wei started playing computer at the age of 13, and liked to write various mental games.

    When he was in high school, he began to learn the technology of network security himself. He joined in the IT company's part-time job and Internet, and joined the "Green Corps" of the technologically sophisticated network group. During his college years, Zhao Wei and several Internet Security enthusiasts launched the "China security alliance".


    Many people call Zhao Wei such a "hacker", and then fear and disdain in the bottom of my heart.

    Zhao Wei said: "real hackers use technology to promote the development of the Internet.

    This noun is distorted by many people, so there are two groups: "black hat hacker" (using technology to attack others) and "white hat hacker" (finding Internet vulnerabilities, protecting networks and netizens).

    I wanted to be a hacker to protect others from childhood. "


    "Impulse" entrepreneurship starts from scratch


    After graduating from University, studying network security has become Zhao Wei's work and has become almost all his life.

    In the battle to capture security vulnerabilities, Zhao Wei gradually realized that there is a market gap in the field of malicious web monitoring in China.

    He decided to abandon his rich income and start from scratch.


    Why is Zhao Wei so used to living comfortably?


    Zhao Wei's answer is simply surprising: "these years of life and work are too relaxed, I am afraid to waste themselves.

    I like continuous challenges. "


    In August 2007, Zhao Wei and several friends set up their own company.

    They monitor the security status of about 2000000 domestic websites every day through the self developed Internet security monitoring platform, and tell them which websites are safe. They use web application evaluation system to help websites detect their own vulnerabilities, so that "black hat hackers" will not exploit the loopholes to "hang horses" (embedding Trojan horses into websites), and can not infringe on those who visit these websites.


    Combined with the company's business and carefully analyzing the market gaps found by Zhao Wei, you will find that Zhao Wei's entrepreneurship is not impulse at all, but based on the accurate grasp of China's Internet status and market.


    "The bottleneck of China's Internet development is Internet users' concerns about security, and people dare not do anything through the Internet.

    Internet users are stolen data and attacked, many times because they log in to unsafe sites.

    We protect the netizens from the source.

    When Internet users can use Internet Finance and consumption step by step, the Internet is really safe.


    Zhao Wei said.


    Small companies, big clients, "no fight, no deal."


    Zhao Wei rented a three bedroom office in Huilongguan, Beijing.

    Although office environment is not as good as high-grade office buildings, Zhao Wei and his colleagues are still cheerful.

    "The top executives of Microsoft have visited here many times.

    The Ma Yun of Alibaba was originally built in two rooms. We have one more room than him. "


    The usual way to start a business is to create a company and find customers.

    Zhao Wei first found the client and then founded the company.

    This customer is the giant of IT company in the world Microsoft.

    Zhao Wei said he and Microsoft were "no fight, no deal."


    This tortuous story begins 6 years ago.

    "In 2003, my colleagues and I discovered some security holes in Microsoft products and sent them to Microsoft.

    mail

    More than half a year passed, and no one spoke to us.

    We searched for people to contact Microsoft and published these vulnerabilities on the Internet.

    This attracted the attention of Microsoft, and we began to help Microsoft patch holes.

    Microsoft believes that we have the ability to provide security services for them, so we become Microsoft's only security service provider in China.


    "Small companies and big customers are our goals."

    Speaking of the size of the company, Zhao Wei was very frank and calm.

    "We are a technology company and are very pragmatic in staffing.

    The era of "big fish eating small fish" has passed, and now is the age of "fast fish eating slow fish".


    Character is more important than technology.


    On some IT websites, we can see a notice recently advertised by the company: "we are a small family.

    company

    You must have never heard of it.

    We don't have bureaucratic flavour...

    We do not ask for it.

    Education

    Sex and age... "


    Zhao Wei said this announcement has brought great talents to the company.

    "Our training is very strong, so we only require talents to have basic skills.

    This kind of training is attractive to many people because they can learn real skills from us. "


    Through Zhao Wei's description, some of the company's "different" places gradually become clear: we call each other in the company's network name; flexible work system is adopted; when the team reaches the stage goal, they choose a working day to celebrate, for example, to climb the mountain; the company has a "concept library"; if the idea is adopted, the person who gives the idea can be rewarded, the person with the greatest number of ideas can also be rewarded; the employee buys the book company to reimburse, the amount is unlimited.


    Zhao Wei shoulders the heavy responsibility of storing technical force for the company, and his "talent secret" does not seem to be complicated.

    "A lot of kids have technology, but they only do 'black caps', and what we want is just technical experts.

    Facts have proved that I am not mistaken.

    The black industry, the individuals and organizations that profit from stealing data, has been digging up the children of our company.


    Xiao G is the youngest employee of the company. He is 19 years old and comes from Shantou, Guangdong.

    Two years ago, his high school blog about Internet Security caught Zhao Wei's attention.

    Zhao Wei, the "bone ash" character of Internet security, has always been an icon of little G. He heard that he could work with idols, and little G was wild with joy.


    After graduating from high school, Xiao G will work with Zhao Wei.

    When his parents disagreed, little G told his parents that he had worked for Zhao Wei for six months through the Internet.

    Then he bought himself a mobile phone and a ticket to Beijing with half a year's salary, and arrived in Beijing with 3000 yuan in cash.

    Zhao Wei said that small G grew very fast, and now it is the "one party member" of the company.


    As for the story, Zhao Wei squinted his eyes and praised himself: "I know the importance of talents to the company, so I spend a lot of time digging and observing the target on the Internet."


    "Even if you fight your life, you need to do something for network security."


    The struggle between "white hat hacker" and "black hat hacker" looks calm, but in the bones it is a thrilling struggle for life and death.


    In August 2004, Zhao Wei and his colleagues received reports from some foreign banks that hackers had used "phishing websites" (fake bank websites) to deceive users into entering bank accounts and passwords, and got tens of thousands of accounts information.

    Zhao Wei discovered that these hacking techniques were advanced, so he continued to track targets, research targets, set up countermeasures, destroy phishing websites, and give details to banks.


    One day in August 2008, when monitoring the security situation of domestic websites as usual, they found that network traffic was soaring.

    After locking the target, Zhao Wei found that the huge increase in the volume of traffic was a huge botnet that controls millions of "broilers" (maliciously controlled computers). Botnets manipulated "broilers" to steal data and wantonly attack websites.

    The company immediately informed the relevant departments of the state.


    With forward-looking services and products, the young company quickly established its technological advantages.

    In Zhao Wei's words, he and his company are more famous abroad than in China.

    He made numerous speeches at various security meetings around the world, and did safety training for Microsoft, Alibaba, Tencent and other enterprises.

    He hoped that he could change the world's impression of China's cyber security and the impression of Chinese hackers.

    "Every loophole we found can be sold for hundreds of thousands of dollars, but we have not sold it, nor have we attacked anyone with these vulnerabilities, but rather share it with the industry without compensation.

    Recently, an international security forum was held in Japan. Please tell me how to deal with "black hat hacker". Some friends advised me not to go there, after all, flu was everywhere.

    I said, even if you fight your life, you need to do something for network security again.


    Entrepreneurial sentiment: we need to start a business happily.


    What is yours is yours, not yours, and how to grab it will not belong to you.


    Entrepreneurship itself is difficult, so we must strive to create an atmosphere of "happy entrepreneurship" and celebrate every step along the way with every employee.


    Crazy work is my weakness.

    Before Beijing hosted the Olympic Games, TV was always absent in my life because I wanted to spend all my time working.


    Employees are not for management.

    My job is more like a instructor.

    I will not simply tell my employees what to do. If he does not understand, I will tell him why he should do this, though sometimes it costs 20 times, but he understands that it will be 20 times better than what he did not understand.

    • Related reading

    How Does "Love Shrimp" Succeed?

    Thematic interview
    |
    2011/1/21 16:47:00
    48

    Ingenious Ingenious Operation Of &Nbsp; Shoe Stores Earn About One Hundred Thousand Annually.

    Thematic interview
    |
    2011/1/20 16:55:00
    64

    小湯包讓他6年狂賺500萬

    Thematic interview
    |
    2011/1/19 16:38:00
    55

    Interview With Li Huiqin, Secretary Of The Town Committee Of Houjie Town, "Tailor Made" To Plan The Transformation And Upgrading Of Houjie Shoe Industry

    Thematic interview
    |
    2011/1/19 10:30:00
    280

    Exclusive Interview With Sun Ruizhe -- Textile And Clothing Industry: Enhancing Competitiveness And Achieving A High Degree Of Rationalization

    Thematic interview
    |
    2011/1/19 8:37:00
    61
    Read the next article

    Agreement On Secrecy And Technology Achievement Agreement

    The license of software products obtained by Party A belongs to party a company. Party B shall not assign the software products and related use and publicity materials to third persons without authorization from the company. Otherwise, it shall be regarded as a tort.

    主站蜘蛛池模板: 在线观看黄色毛片| 国产一区二区三区免费在线视频| 国产精品青草久久| 国产日韩在线亚洲字幕中文| 国产喷水在线观看| 午夜成人在线视频| 亚洲欧美日韩丝袜另类| 国产激情自拍视频| 国产精品好好热在线观看| 国产成人精品a视频| 国产在视频线精品视频2021| 啊轻点灬大ji巴太粗太男| 亚洲综合国产成人丁香五月激情| 亲密爱人之无限诱惑| 亚裔玉videoshd和黑人| 亚洲av无一区二区三区| 东北鲜肉痞帅玩xvideos| 91av免费观看| 色综合久久精品中文字幕首页| 电影天堂2018| 日韩成人免费视频| 天天摸一摸视频寡妇| 国产无遮挡又黄又爽在线观看| 午夜亚洲国产精品福利| 亚洲成av人片在线观看无码| 久久一区二区精品综合| 91天堂素人精品系列网站| 被农民工玩酥了的张小婷| 波多野结av衣东京热无码专区| 日本暖暖视频在线播放| 天堂影院www陈冠希张柏芝| 国产在线精品国自产拍影院同性| 免费看美女吃男生私人部位 | 国产精品视频你懂的| 经典三级四虎在线观看| 欧美亚洲国产片在线观看| 最近2018免费中文字幕视频 | 最近免费韩国电影hd无吗高清| 小妇人电影中文在线观看| 国产成人精品免费视频大全五级 | 全彩acg无翼乌|