Readers friends, congratulations to you, to the era of big data, you will become the emperor! Of course, don’t be too happy. I’m talking about the emperor who was wearing a new dress.
Why do I say that? Because in the face of big data, you really is naked: what did you say, what has been done, what hobbies, what have been sick, where to live, relatives and friends who have, and so on, it knows. You know, you know it, you know it all, or you know it.
Even the things you don’t even know, big data may also know that, for example, it can be found that many of your subconscious habits: stand where you love collective photo ah, love the first step across the threshold when the left or the right foot, you love dealing with what kind of person you are, what your character ah, a friend and your views are not the same ah, etc..
Further, what will happen in the future, big data it is still possible to know, for example, according to your diet, less exercise and other information, it can be inferred that you may be. When you buy a cold medicine with a lot of people, the big data: the flu is about to break out! In fact, the big data has successfully predicted the results of the world cup, including the results of the presidential election, stock movements, price trends, user behavior, traffic conditions and a series of problems.
Of course, the you here is not just you, but also includes, but is not limited to, your family, your organization, your nation, and even your country.
So, in the end what is big data? The international authority of the consulting firm Gartner said: big data, is the need for new treatment mode in order to have more decision-making power, insight discovery and process optimization ability to adapt to the massive, high rates of growth and diversification of information assets. The McKinsey Global Institute said: big data is a large scale in the acquisition, storage, management and analysis greatly beyond the traditional scope of database software tools for data collection, data size, fast data transfer, with a massive variety of data types and low value density four characteristics. There are more authoritative experts and some other characteristics, such as big data, large capacity, species diversity, access speed, management quality variability, authenticity, sources of complexity, the value of the extraction repeatability, etc..
In fact, that is to say, the so-called big data, is composed of many data out of order to all sorts of strange things, piled together in something. For example, you take the initiative to say on the Internet, the micro-blog WeChat, save photos, send and receive e-mail, leaving traces of actions such as Internet records, are part of the big data. In do not know the circumstances, a lot of information, you are collected for example, is the road to access the camera video, mobile phone positioning system left a roadmap, in all cases recorded voice, while driving the GPS signal, electronic medical records, bus card records passive information, are also part of big data. Also, a variety of sensor devices automatically collect information about temperature, humidity, speed and other information, is still part of the big data. In short, everyone, each kind of communication and control devices, whether it is software or hardware, in fact, are the source of big data.
In a word, whether you like it or not, it is there, whether active or passive, you are contributing to the big data. Big data is inevitable.
Big data in the end is what magic weapon, only to know so many secrets? In the jargon, it uses a named data mining by technology, such as neural networks, genetic algorithms, decision tree method, rough set method, covering the positive examples and exclude the negative examples method, statistical analysis method, fuzzy method, tall method. The process of data mining can be divided into eight steps: data collection, data integration, data specification, data cleaning, data transformation, mining analysis, pattern evaluation, knowledge representation, and so on.
Big data mining, from the front, is the creation of value; from the negative, is to disclose the privacy! How big data privacy is leaked it? Please come with me to break down the classic human flesh search!
A large group of friends, for some agreed, for example, to discredit someone or beautify someone, make full use of all resources of their own, as far as possible to collect all the information or the parties, including but not limited to the Internet search information available (this is mainstream), the road to listen to passers-by said information, know the line the information of all kinds of speculation, information, and so on; then, the information will be in accordance with their own objective refined into new information, feedback to share online with Comrades. This completes the first human flesh iteration. Then, we in the first human iterative basis, learn from each other, make persistent efforts, overlapping information collection, processing and finishing work, so will be the birth of the second batch of human iteration. In this way, after N times of iteration after unremitting (news term called fermentation), the parties or the ugly (or good) on the picture. If a portrait material has really sit real, at least is the main fact, so, human flesh search is a success.
In fact, the so-called big data mining, in a sense, is automatically completed by the machine special human search only. But now, human, is no longer limited to discredit or praise someone, but more widely, for example, to find the best seller of goods buyers, for certain types of data to find the law, for correlation, for some things and so on, in a word, as long as the purpose, then, big data mining will be used.
If the human and then, when compared to data mining, users are replaced by the computer; netizens collected information, replaced by vast amounts of heterogeneous data in the database; users looking for a variety of character related skills, instead of intelligent algorithm is appropriate; friends of mutual learning and inspire the practice, by all kinds of synchronization the operation is replaced; each iteration is still as usual, but the number of iterations of the machine more and faster. In fact, each iteration of a learning is the process of the machine; the final draw users satisfaction as , was temporarily replaced by mining results, because of large data mining, forever there is no end, the results will be more accurate, the degree of intelligence will become increasingly high, the user only according to their own standards, always choose the satisfactory results on the line. Of course, in addition to the similarity, human and data mining certainly there are many important differences, for example, the machine will not tired, they collected data will be more, faster, data sources will be more extensive, in short, the human, will eventually lose to the big data machine mining.
The security code, and hackers
Security is a very subjective concept, closely related to the angle. The same event, for different people, from a different point of view may come to the opposite conclusion. Therefore, the study of security must only be locked in an angle, for example, I perspective.
Secondly, security is a concept closely related to time. The same system, in yesterday’s safety, is by no means equal to today’s security; similarly, in today’s security, it is not equal to tomorrow’s security. Of course, a unsafe yesterday system, today will not automatically become safe.
What’s more, security is a concept which is closely related to the object. If A and B are two independent systems, if we only consider the security of the A system, then the security of the B system should be completely ignored.
When it comes to the concept of security, many readers will immediately think of hackers who endanger security. If the security is the core of confrontation, so in two against the protagonist (attacking and defending), offensive (hackers) is the first reason is that the protagonist, because of (red) (born hackers).
Broadly speaking, the destroyer of the system (or organization) is collectively referred to as the hacker, which is aimed at disrupting the existing order.
People develop software, the development of information products, the construction of the network system, we all want to safety first. However, the ideal is full, the reality is very skinny, any system can not be absolutely safe, its security also can be proved strictly, can only be tested by practice. No matter how serious, no matter how much time and effort it takes, as long as it is man-made, there will be security flaws, and these defects can sometimes be hard to detect. What shall I do? Of course, it is necessary to use special tools to dig, repair and deal with these potential defects.
In addition to take salary, from a purely technical point of view, these inspectors and hackers in fact nothing different; moreover, they are obviously indispensable, because, with the system defects in operation is more dangerous and more terrible. From this perspective, the emergence of hackers is inevitable. Because, even after the senior specialized personnel detection, also left some undetected defects, so the society appeared a number of volunteers, they do not divide day, tirelessly, for these repeated carpet search, hoping to find more bugs to change, or to prove their ability. These volunteers are commonly known as hackers.
The computer is made up of two parts: hardware and software. The former determines its physical strength. The specific manifestation of the software, in fact, is called the code of things, they are just some logical commands, so that the first step in the computer, second steps, etc.. The computer is also very obedient, the instruction lets it do anything, it does anything; lets it do the good deed, it does the good deed; lets it do the bad thing, it does the bad thing; even lets it commit suicide, it also can not hesitate to act according to the law.
Although human wishful thinking, will do good code to write code, the code will be referred to as; bad code called malicious code, but the computer from the point of view, they are all code, should be equally commands.
Only from the perspective of writing code, malicious code is easier to write good code, more difficult, because the good code’s goal is to put some work into, and malicious code is to put the work and the general law is screwed; failure to do difficult. Malicious code is a huge family, and even the formation of a black tribe. Such as viruses, worms, zombies, Trojans, etc., are representative of the typical malicious code.
A computer virus can attach itself to a variety of documents, such as a parasite, and when the file is copied or spread on the Internet, the virus spreads quickly along with the file. Because of its unique ability to copy, but also difficult to cut from the normal file, so the virus consumption and destruction of resources are very strong, and not easy to eradicate.
The worm can be recycled and spread quickly. The worm is a self – contained program that is able to operate independently. It can infect all other parts of the network. The worm mainly includes the host worm and the network worm. The former is completely contained in the host, and copies itself to other terminals through the network. Once it is done, it will commit suicide, allowing the clone to continue to do evil; therefore, at all times, there is only one copy of the worm running.
The zombie virus through the Internet Relay Chat server (IRC) to control a large computer; then these so-called computer has lost the ability to act independently, and can only listen to the vampire, namely the hacker command. Currently, the Internet has become one of the most popular hacker tools of crime. For mobile phone users, zombie attacks more legendary. Light, the phone is inexplicable chargeback, a friend was advertising messages late night harassment; heavy, deposit bath, damage to the eight party. The proliferation characteristics of mobile phones are very much like pyramid selling organization, a level of infection, the longer the infection and control of the phone will be more, exponential explosive growth. And it’s constantly changing. Some changes, even in the case of shutdown or lock, so that the phone is still automatically send information, and even, in turn, will try to destroy its anti-virus software to kill.
Trojan (Trojan) through specific procedures to control another computer, it will not self reproduction, also do not deliberately infect other files, instead it should try to disguise themselves, not to attract the attention of the outside world, people in the imperceptibly into his computer, make it become a controlled end. When the trumpet sounded, the hacker commands in the control side, the Trojans began operations, or destroyed by the control side, or from stealing any documents, increase the password, or browse, copy, move, delete, modify the registry and computer configuration etc.. Trojan virus once started, it is very difficult to stop, because it will own loaded into the core software, each time the system is enabled, it will automatically start running; do, it will immediately contact (automatic change file name), or will soon be copied to other folders, can secretly obtain the right to use without permission of the user.
The risk prevention recommendations
Under the background of big data era, in the past has been left on the Internet massive debris information, how to carry out privacy protection? If you rely solely on technology, apparently powerless, and even more protection, the more disclosure of privacy, therefore, must be multi pronged. For example, from the law, to prohibit human flesh search for the purpose of data mining; increase the netizen’s right to be forgotten and other legal provisions, that is, users have the right to request the relevant network delete is directly related to their pieces of information. From the management point of view, you can also take measures to conduct a number of malicious acts of big data discovery, supervision and control. In addition, when necessary, also need to reshape the privacy concept, because, after all, the privacy itself is a related time, location, nationality, religion, culture and other things, in a sense is also a common thing.
For the future of network behavior, how to protect their privacy, at least not too much unnecessary debris information left on the Internet? Here, I would like to provide a very practical strategy, that is: anonymous! So, as long as do anonymous work, talk about what the privacy, that is, a source of water. Anonymous focus includes:
Identity anonymity. Any gossip or scandal, when we do not know that you are a party, what is your privacy is compromised? Certainly not! Perhaps you also stand on tiptoe, stretched out a long neck to squeeze forward, but also want to see a few more lively!
Attribute anonymity. If you think some of their own property (for example, where to work, what records, etc.) need to be kept confidential, so please remember: do not kill these to publish their own news on the Internet, or even to avoid things associated with these attributes. So it will be hard for others to you by. Relational anonymity. If you don’t want people to know that you’re a friend with Zhang three, it’s better to be a little off the Internet, not to focus on anything related to him.
Location anonymity. I don’t need to teach you this. At least do not take the initiative in the social media to expose their whereabouts at any time, as if afraid of other people do not know, you are now eating in a restaurant.
To sum up, before the big data, privacy philosophy is: the private hidden, and my identity can be open. In the future, the philosophy of privacy protection of big data will become: the private open (in fact, can not be not open), and my identity has been hidden, that is anonymous.
For our ordinary individual users, how to prevent malicious code? I hope these tips can help you.
1 never perform any unknown source or origin software or program, unless you are sure of their gas level has reach the peak of perfection;
2 never believe that your mailbox will not receive messages containing malicious code;
3 e-mail to a friend when the software, remember to tell each other to check the first drug, because the virus does not occur on your computer, probably on a friend’s computer resurrection;
4 never because you are good friends, it is easy to perform the software or program he sent me, because you are not sure whether he had installed virus firewall, maybe your friends in the hacking program also don’t know, I thought what is good stuff to share with you this mail;
50 million do not leave your personal data, because you never know if someone deliberately plan to collect, for the trouble you;
60 million do not easily believe that the network to meet new friends, because on the network, no one will know that you are a dog! You can’t tell if the other person wants to treat you as an experiment.
In the face of all kinds of hackers, we should pay attention to protect themselves, the following ten suggestions may be useful to you.
1 use anti-virus software and often upgrade, so that malicious programs away from your computer;
2 do not allow the store to store your credit card information, even if it is convenient for your future shopping;
3 when setting a password, use the password that is made up of numbers and letters;
4 pairs of different sites and procedures, the use of different passwords to prevent hacking;
5 use the latest version of the browser, e-mail and other network software;
6 do not send a credit card number to a suspicious site, pay attention to the browser at the bottom of the information bar displays the padlock icon or key icon;
7 confirm that you want to click on the site address is correct, do not be hackers with Li Gui fishing for fish;
- WORKINGSOLUTIONS MAILINGMEMBERS