• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    White Dream Of Computer Youth

    2011/1/22 11:23:00 82

    Computer Youth Entrepreneurial Dream

    Zhao Wei, a post-80s generation, is a business leader who can almost be described as "cute".

    He looks a little shy. He uses his index finger to push the fashionable black side glasses on his nose.

    If it weren't for the small and exquisite laptop that he carried with him, if he hadn't had the cold and deep Internet terminology, he might not have thought that the little boy in T-shirt and jeans was the godfather figure in the security circle of China's Internet security.


    Together with the company he founded, Zhao Wei worked hard to promote the development of the Internet.

    Zhao Wei, 27, summed up his career as a life: "our goal is to make you enjoy the Internet safely."


    "White dream" of "computer teenager"


    Zhao Wei said that his resume is very simple, and he can finish in two sentences: born in Xi'an in November 1981, he majored in instrumentation and automatic control in University.

    After graduating from university in 2003, he entered a domestic network security company. He joined an American Internet software company in late 2005 and founded his own company in 2007.

    Zhao Wei's experience can be condensed into one sentence: "Internet security is inextricably linked."


    Zhao Wei started playing computer at the age of 13, and liked to write various mental games.

    When he was in high school, he began to learn the technology of network security himself. He joined in the IT company's part-time job and Internet, and joined the "Green Corps" of the technologically sophisticated network group. During his college years, Zhao Wei and several Internet Security enthusiasts launched the "China security alliance".


    Many people call Zhao Wei such a "hacker", and then fear and disdain in the bottom of my heart.

    Zhao Wei said: "real hackers use technology to promote the development of the Internet.

    This noun is distorted by many people, so there are two groups: "black hat hacker" (using technology to attack others) and "white hat hacker" (finding Internet vulnerabilities, protecting networks and netizens).

    I wanted to be a hacker to protect others from childhood. "


    "Impulse" entrepreneurship starts from scratch


    After graduating from University, studying network security has become Zhao Wei's work and has become almost all his life.

    In the battle to capture security vulnerabilities, Zhao Wei gradually realized that there is a market gap in the field of malicious web monitoring in China.

    He decided to abandon his rich income and start from scratch.


    Why is Zhao Wei so used to living comfortably?


    Zhao Wei's answer is simply surprising: "these years of life and work are too relaxed, I am afraid to waste themselves.

    I like continuous challenges. "


    In August 2007, Zhao Wei and several friends set up their own company.

    They monitor the security status of about 2000000 domestic websites every day through the self developed Internet security monitoring platform, and tell them which websites are safe. They use web application evaluation system to help websites detect their own vulnerabilities, so that "black hat hackers" will not exploit the loopholes to "hang horses" (embedding Trojan horses into websites), and can not infringe on those who visit these websites.


    Combined with the company's business and carefully analyzing the market gaps found by Zhao Wei, you will find that Zhao Wei's entrepreneurship is not impulse at all, but based on the accurate grasp of China's Internet status and market.


    "The bottleneck of China's Internet development is Internet users' concerns about security, and people dare not do anything through the Internet.

    Internet users are stolen data and attacked, many times because they log in to unsafe sites.

    We protect the netizens from the source.

    When Internet users can use Internet Finance and consumption step by step, the Internet is really safe.


    Zhao Wei said.


    Small companies, big clients, "no fight, no deal."


    Zhao Wei rented a three bedroom office in Huilongguan, Beijing.

    Although office environment is not as good as high-grade office buildings, Zhao Wei and his colleagues are still cheerful.

    "The top executives of Microsoft have visited here many times.

    The Ma Yun of Alibaba was originally built in two rooms. We have one more room than him. "


    The usual way to start a business is to create a company and find customers.

    Zhao Wei first found the client and then founded the company.

    This customer is the giant of IT company in the world Microsoft.

    Zhao Wei said he and Microsoft were "no fight, no deal."


    This tortuous story begins 6 years ago.

    "In 2003, my colleagues and I discovered some security holes in Microsoft products and sent them to Microsoft.

    mail

    More than half a year passed, and no one spoke to us.

    We searched for people to contact Microsoft and published these vulnerabilities on the Internet.

    This attracted the attention of Microsoft, and we began to help Microsoft patch holes.

    Microsoft believes that we have the ability to provide security services for them, so we become Microsoft's only security service provider in China.


    "Small companies and big customers are our goals."

    Speaking of the size of the company, Zhao Wei was very frank and calm.

    "We are a technology company and are very pragmatic in staffing.

    The era of "big fish eating small fish" has passed, and now is the age of "fast fish eating slow fish".


    Character is more important than technology.


    On some IT websites, we can see a notice recently advertised by the company: "we are a small family.

    company

    You must have never heard of it.

    We don't have bureaucratic flavour...

    We do not ask for it.

    Education

    Sex and age... "


    Zhao Wei said this announcement has brought great talents to the company.

    "Our training is very strong, so we only require talents to have basic skills.

    This kind of training is attractive to many people because they can learn real skills from us. "


    Through Zhao Wei's description, some of the company's "different" places gradually become clear: we call each other in the company's network name; flexible work system is adopted; when the team reaches the stage goal, they choose a working day to celebrate, for example, to climb the mountain; the company has a "concept library"; if the idea is adopted, the person who gives the idea can be rewarded, the person with the greatest number of ideas can also be rewarded; the employee buys the book company to reimburse, the amount is unlimited.


    Zhao Wei shoulders the heavy responsibility of storing technical force for the company, and his "talent secret" does not seem to be complicated.

    "A lot of kids have technology, but they only do 'black caps', and what we want is just technical experts.

    Facts have proved that I am not mistaken.

    The black industry, the individuals and organizations that profit from stealing data, has been digging up the children of our company.


    Xiao G is the youngest employee of the company. He is 19 years old and comes from Shantou, Guangdong.

    Two years ago, his high school blog about Internet Security caught Zhao Wei's attention.

    Zhao Wei, the "bone ash" character of Internet security, has always been an icon of little G. He heard that he could work with idols, and little G was wild with joy.


    After graduating from high school, Xiao G will work with Zhao Wei.

    When his parents disagreed, little G told his parents that he had worked for Zhao Wei for six months through the Internet.

    Then he bought himself a mobile phone and a ticket to Beijing with half a year's salary, and arrived in Beijing with 3000 yuan in cash.

    Zhao Wei said that small G grew very fast, and now it is the "one party member" of the company.


    As for the story, Zhao Wei squinted his eyes and praised himself: "I know the importance of talents to the company, so I spend a lot of time digging and observing the target on the Internet."


    "Even if you fight your life, you need to do something for network security."


    The struggle between "white hat hacker" and "black hat hacker" looks calm, but in the bones it is a thrilling struggle for life and death.


    In August 2004, Zhao Wei and his colleagues received reports from some foreign banks that hackers had used "phishing websites" (fake bank websites) to deceive users into entering bank accounts and passwords, and got tens of thousands of accounts information.

    Zhao Wei discovered that these hacking techniques were advanced, so he continued to track targets, research targets, set up countermeasures, destroy phishing websites, and give details to banks.


    One day in August 2008, when monitoring the security situation of domestic websites as usual, they found that network traffic was soaring.

    After locking the target, Zhao Wei found that the huge increase in the volume of traffic was a huge botnet that controls millions of "broilers" (maliciously controlled computers). Botnets manipulated "broilers" to steal data and wantonly attack websites.

    The company immediately informed the relevant departments of the state.


    With forward-looking services and products, the young company quickly established its technological advantages.

    In Zhao Wei's words, he and his company are more famous abroad than in China.

    He made numerous speeches at various security meetings around the world, and did safety training for Microsoft, Alibaba, Tencent and other enterprises.

    He hoped that he could change the world's impression of China's cyber security and the impression of Chinese hackers.

    "Every loophole we found can be sold for hundreds of thousands of dollars, but we have not sold it, nor have we attacked anyone with these vulnerabilities, but rather share it with the industry without compensation.

    Recently, an international security forum was held in Japan. Please tell me how to deal with "black hat hacker". Some friends advised me not to go there, after all, flu was everywhere.

    I said, even if you fight your life, you need to do something for network security again.


    Entrepreneurial sentiment: we need to start a business happily.


    What is yours is yours, not yours, and how to grab it will not belong to you.


    Entrepreneurship itself is difficult, so we must strive to create an atmosphere of "happy entrepreneurship" and celebrate every step along the way with every employee.


    Crazy work is my weakness.

    Before Beijing hosted the Olympic Games, TV was always absent in my life because I wanted to spend all my time working.


    Employees are not for management.

    My job is more like a instructor.

    I will not simply tell my employees what to do. If he does not understand, I will tell him why he should do this, though sometimes it costs 20 times, but he understands that it will be 20 times better than what he did not understand.

    • Related reading

    How Does "Love Shrimp" Succeed?

    Thematic interview
    |
    2011/1/21 16:47:00
    48

    Ingenious Ingenious Operation Of &Nbsp; Shoe Stores Earn About One Hundred Thousand Annually.

    Thematic interview
    |
    2011/1/20 16:55:00
    64

    小湯包讓他6年狂賺500萬

    Thematic interview
    |
    2011/1/19 16:38:00
    55

    Interview With Li Huiqin, Secretary Of The Town Committee Of Houjie Town, "Tailor Made" To Plan The Transformation And Upgrading Of Houjie Shoe Industry

    Thematic interview
    |
    2011/1/19 10:30:00
    280

    Exclusive Interview With Sun Ruizhe -- Textile And Clothing Industry: Enhancing Competitiveness And Achieving A High Degree Of Rationalization

    Thematic interview
    |
    2011/1/19 8:37:00
    61
    Read the next article

    Agreement On Secrecy And Technology Achievement Agreement

    The license of software products obtained by Party A belongs to party a company. Party B shall not assign the software products and related use and publicity materials to third persons without authorization from the company. Otherwise, it shall be regarded as a tort.

    主站蜘蛛池模板: 日本免费精品视频| 特级黄一级播放| 男女爱爱视频网站| 日本乱理伦片在线观看网址| 国产精品久久久久久久福利院| 亚洲精品日韩专区silk| 91免费国产精品| 日韩高清国产一区在线| 国产精品香蕉在线观看不卡| 亚洲一区二区三区电影| 182tv在线观看国产路线一| 欧美激情一区二区| 国产老妇伦国产熟女老妇视频| 亚洲av无码乱码精品国产| 蜜桃久久久久久久久久久| 女人让男人直接桶| 亚洲变态另类一区二区三区| 青青草国产免费国产| 嫩草影院在线免费观看| 亚洲日韩一页精品发布| 香蕉精品视频在线观看| 日本高清在线不卡| 免费视频中文字幕| 一区二区三区在线视频播放| 精品久久久无码中字| 很污的视频网站| 亚洲日本在线电影| 视频一区视频二区制服丝袜| 成年女人免费v片| 亚洲精品自产拍在线观看动漫| 国产免费的野战视频| 日本大胆欧美艺术337p| 免费AV一区二区三区无码| 99久久久精品免费观看国产| 日韩美一区二区| 国产亚洲欧美精品久久久| 中文字幕免费观看全部电影| 波多野たの结衣老人绝伦| 国产精品久久免费视频| 主人丝袜脚下的绿帽王八奴| 美女18隐私羞羞视频网站|