This guide to hurrying around the pits will help you grab the last chance in “Double Eleven” -Chinanews.com



[ad_1]

  This guide to grabbing and avoiding holes will help you take the last chance in “Double Eleven”

Our reporter Chen Xi

The “Double Eleven” front is getting longer and longer: starting from midnight on November 1st of this year, the promotional activities of the major e-commerce companies began. It is understood that the first day of the event, nearly 100 million users flocked to Taobao to place orders. And as the date approaches “Double Eleven” day, the battleground of all kinds of soaring discounts is everywhere and many large-scale discount products are instantly “lost”.

For some popular, limited-selling, or low-priced products in the live broadcasting halls of Internet celebrities, “hard to find one” is the norm for most consumers. As a result, under the dual factor of low prices and limited quantities, an “instant” full-time industrial chain has also emerged. When you open the web search, you can see various plug-ins or apps known as “snapshot artifacts”, their prices range from free to several hundred yuan, without exception, advertised as “safe” and “easy to use”.

The success rate is up to 95%, it is easy to get started and there is no risk of account loss … Is the plug-in software called “snapshot artifact” really that magical? Faced with thousands of competitors, what determines the speed of our “hands”? To that end, a reporter from the Science and Technology Daily interviewed relevant experts to explain what happened behind the shopping trip.

  In addition to hand speed and hardware, you need a little luck if you want to give it a try.

“Shopping on an e-commerce platform has many links that determine the success or failure of a snapshot. Any delayed link will lead to eventual loss.” Zhao Laiping, associate professor in the Department of Intelligence and Computer Science at Tianjin University, introduced that the first thing is to fight the speed of the user’s hand. After opening the snapshot, the user acted like “click to buy” the first time.

The second is whether the equipment used in the snapshot is powerful. “It mainly depends on the hardware performance of the computer or mobile phone. The focus is on the working frequency of the central processing unit (CPU) and the size of the hardware memory. The better the hardware performance, the higher it is. the speed of data processing and the speed of response after receiving the capture command The fastest. In addition, the operation of the software must take up memory. If too many software are open at the same time or too many programs are running in the background, the speed Device processing will be affected accordingly when memory is limited. ”Zhao Laiping said.

The network is like a highway for data transmission Once the client sends a request, the fluidity of the network determines whether the data command can be sent to the server at a fast enough rate.

“General home broadband is connected to the operator’s backbone network through the optical modem port. The greater the bandwidth, the greater the data throughput that can be supported.” Zhao Laiping pointed out that general domestic broadband will be linked to more access terminals, such as mobile phones. , Computer, smart TV, etc., if you browse the Internet at the same time, it will occupy the bandwidth and affect the network data transmission speed.

If we can get the best conditions in the previous steps, does that mean we will be successful in filming?

“This is not necessarily true, because even if the given commands can be transmitted quickly, the final result depends on the processing speed of the server. If you want to” run “on the server to beat the others, you may need a little luck. . ” Zhao Laiping introduced, as E-commerce platforms such as Taobao have more than a dozen data centers across the country. When the background receives a request from multiple people, it will be distributed to each node server for processing. Each server in the node will be processed on a “first come, first served” basis. However, the processing speed of each server on the node is not exactly the same. This is because the node server efficiency is inconsistent, with the result that the speed of background data feedback is also fast or slow, just as we queue up in the canteen for meals, integrating multiple teams Judging by this, there will always be situations where “getting there early” is not as good as “standing smart”.

“Sometimes we may find that the buy button is stuck during the snapshot and there is no response no matter how you click it. When the button returns to normal, the merchandise was stolen a long time ago. This is because there are too many simultaneous commands that exceed the background. The upper limit of processing capacity. “Zhao Laiping said, for example, that the simultaneous support capacity in the background is up to 1000 requests. When there are 1001 concurrent logins, the 1001st person’s browser will not receive the service response, so it has been on hold. state.

  Various software cheating tactics can be filled in automatically and multiple instructions can be sent at once

By knowing all aspects of the snapshot process, we can help improve hand speed, optimize hardware, and accelerate network speed. However, in the face of “recovery artifacts”, these efforts appear to be in vain.

“Snapshot artifact” is actually a software plug-in or a software plug-in, as long as personal account information is entered into the software in advance, then the software will take over all subsequent operations. “Installing the ‘gunshot artifact’ is like having a cyborg to help you take the shot.” Zhao Laiping said, in the manual speed link, humans are not his adversaries at all. What we people take is based on the neural response, through the cooperation of human eyes and hands to complete. In the same operation, the reaction speed of the machine is much faster than that of man. Just enter the time to start running in the snapshot software, select the snapshot purchase task you want to participate in, and the snapshot software can run automatically.

At the same time, this cyborg can also shorten the ordering process. The purchase order process usually contains many steps. For example, after clicking on the purchase, the wallpaper will enter the shopping cart operation and then make the payment. Once the payment is complete, click on the payment page to confirm. “Each snap operation is actually made up of multiple sub-operations.” Zhao Laiping said that the speed of manually entering various information is obviously very slow. This plug-in software has the function of automatically interpreting the validity of the data. As long as the data to be filled in is entered in advance, the software can directly and intelligently identify the text corresponding to each option and automatically copy and paste the text at once, rather than step by step to complete each element. .

In this process, some plug-in software can violate the encrypted order protocol of various e-commerce platforms, directly bypass the image verification code security identification strategy, and use methods such as IP replacement and numbers of counterfeit device to further circumvent machine identification and e-commerce system identification. Protection, sending of activities directly to the server of the e-commerce platform.

“Also, whenever we send an order request, it can be forwarded to a busy node in the background or to a physically distant data center node.” Zhao Laiping explained that the plug-in software can send multiple requests simultaneously from the client side. It is equivalent to simulating multiple people sending background tasks together and queuing at different nodes at the same time, so that the likelihood of grabbing goods increases dramatically.

  Possibly leaking private information, use “grabbing artifacts” to watch out for insignificant gains

“The success rate of instant shooting software is much higher than that of people, but the quality of the different” instant shooting artifacts “is also uneven and the success rate for instant shooting is also different.” Zhao Laiping explained that the code written by the software is more efficient and the hardware itself Under these conditions, the execution speed is faster. If many people use the “snapshot artifact” to place orders at the same time and the quantity of goods is limited, it is very likely that the “snapshot artifact” may not be able to get the goods.

In addition, Zhao Laiping also reminded that the use of snapshot software will face the risk of personal data leakage. Previously, there have been many cases of data leaks caused by downloading capture software from unknown sources.

“Since the plug-in software is generally not an official source, during the use process you need to enter the data on the plug-in software, it can help you realize the auto-fill function of the form (the part of the web page which is mainly responsible for data collection). If the developer of the plug-in software If you have ulterior motives, you can take the opportunity to collect personal data and then resell it or use it for illegal behavior. ” Zhao Laiping said: “This unofficial software that has not been checked is likely to be infected with a virus. We install it on On your computer it is very possible to steal more information from us and cause more losses.”

Previously, there have been media reports that some criminals bundled the robbery software with “Alipay Hijacking Trojan Horse”, or directly disguised the Trojan horse program as hijacked software and attempted users to click to download the virus. Trojan horse with promotional content such as “free spike and quick spike”. The bundled installation package caused the user’s computer to be poisoned and later a remote control and online banking virus hack was implanted, which ultimately led to the disclosure of the bank card data and the theft of funds in the card by criminals.

It is understood that, in order to prevent urgent purchase software from compromising the fairness of transactions, many e-commerce platforms have adopted a variety of technical means such as keyword review and big data survey for “anti -snatching “. A senior security operations expert from Alibaba’s Security Department introduced that before the shopping festival, the technical department increased its attention to anomalous traffic. “Because the traffic used by the software is much higher than normal traffic, its IP address is also different from normal. The users are different.” Through continuous monitoring and analysis, once the accounts using the snapshot software have been identified, technicians will immediately stop the operation. Accounts with too many illegal operations may be blocked by the platform.

.

[ad_2]
Source link