Rebirth Online Entertainment
Chapter 173: Release Personal Firewall
Chapter [-]: Release Personal Firewall
Tang Dynasty Software was very low-key at the beginning, and did not want to attract the attention of the media. 【
Aishang Reading Network] Because many employees in the company are members of the hacker alliance.For the safety of company members, Chen Jia issued a confidentiality order and did not publicize that Tangchao Software is a subsidiary of Tangchao Information.However, Chen Jiayi underestimated the power of the media.
Within a few days, there was news that Tangchao Software was a subsidiary of Tangchao Information.Although there is no absolute evidence for this news, only a photo of "Zhang Zixian" having a cordial conversation with "Zhuo Hang", the person in charge of Tang Dynasty software, was shown.Many media saw this, as if they smelled fishy, they sent several reporters to investigate.
There is no impenetrable wall in the world, no matter how good Tangchao Information and Tangchao software are, there are times when they are negligent, and many clues are revealed one by one.Seeing that it could no longer be concealed, Tang Dynasty information and Tang Dynasty software were announced on the same day.Tangchao Software, a subsidiary of Tangchao Information, is currently developing an enterprise firewall.
"Firewall."
When Tangchao Software publicly announced that it was developing an enterprise firewall, several people in the industry stared with wide eyes and could hardly believe it.Software that is a bit more advanced than anti-virus software, such as the firewall, and many information technologies in the West have not been passed on to China.Because of this, the computer Internet has been developed for many years, but there has never been a decent firewall company in China.Most software companies with a bit of technology have also turned to anti-virus software.
It is precisely because there is no firewall technology in China, so Tangchao Software said that it is developing an enterprise firewall, which aroused suspicion from several people.
"Tang Dynasty Firewall, can you trust it?"
After learning about the software development firewall of Tang Dynasty, most people in the industry are still very worried about him.
Although they have absolute trust in Tang Dynasty's game technology, online games and security software are definitely not the same concept.The former is called Internet technology, not software technology, and the latter is called software technology.And Internet technology, in jargon, is technology without technology.But software technology, its technology-nature-is much better than the Internet.
Many software graduates usually choose software companies first, and then Internet companies.
Not only that, the author analyzed the prospect of Tang Dynasty software very professionally.
The article not only pointed out the current situation of China's firewall technology, but also pointed out the direction that Tang Dynasty Company was engaged in recently.It's okay for him to do network application technology, but if he wants to do a firewall.Even if Tang Dynasty Software becomes China's No. 1, it won't rank in the world.It was a waste of money, and in the end, domestic companies had to use foreign firewalls.
Seeing these comments, Chen Jiayi also understood.
Although these media speak too much, they are also telling the truth.Take the later Skynet firewall, which is well-known in China.However, in 2010, the company went bankrupt.Why it closed down, just think about it.It's just that the benefits are not good, and the business cannot continue.
Regarding the media's comments, Tang Dynasty Software did not respond too much. Chen Jiayi instructed that as long as the firewall is made carefully, it will be fine.Moreover, the Personal Edition of Jinsi Tangchao Firewall has almost been produced, and it can be released to the market at any time as soon as the time comes.
You have to ask, why is the software development speed of the Tang Dynasty so fast?
In fact, this is quite simple. The reason is that Chen Jiayi has been researching firewall technology in the hacker alliance and alliance members before.Moreover, the Hacking Alliance has finally created a powerful personal firewall during the period of research.Take it out now, and with a little modification, it can be released on the market.
However, the personal firewall is actually a tasteless thing for ordinary people.It's the same whether players use it or not.Using it does not necessarily increase the sense of security, and not using it does not necessarily mean that something is missing.
You know, a firewall is not the same as an antivirus software.
Anti-virus software is required for every personal computer, but it doesn't matter whether you need a firewall or not.Moreover, Microsoft's operating system also comes with a wnows firewall.It is still somewhat effective to deal with general non-malicious attacks.But if you are dealing with hackers, even if you install a better firewall, you will still be hacked.
"Mr. Chen, as for Guang, we're afraid..."
The software is done well, but how widely it becomes a problem.It's not that this firewall is not powerful, it is useless even if it is strong.Everyone doesn't know what a firewall is, so it is more popular than anti-virus software.In this way, even if the personal version of the firewall is released from the market, it may not necessarily achieve any results.
Zhuo Hang, the person in charge of Tangchao Software, also known as "Ziyun" of the Hacker Alliance, said to Chen Jiayi.
"It's okay. We didn't plan to release a personal version of the firewall. It's just that there is already a personal version of the firewall in the alliance. It's a waste to keep it and not make good use of it. If you go out now, if the hype is good, you can also promote the enterprise version. .”
The personal version of the firewall is a weak point, Chen Jia knows it all the time.
To make money with a firewall, you can only rely on the enterprise version.Only enterprise companies, they will pay a lot of money to buy your firewall.Because they have a lot of company information, which are all commercial secrets.If it is taken by the opponent, in many cases, a company will go bankrupt.So, in many cases.The needs of enterprise users for firewalls are more urgent than the needs for antivirus software.
Chen Jiayi saw this, and also wanted to improve the hardware level of domestic computers.Firewall, Tangchao software must be done.Not to mention that the Hacking Alliance has been researching firewalls before, and has accumulated a lot of experience. Moreover, Chen Jiayi also taught them a series of firewall technologies for later generations.As long as the enterprise version of the firewall is developed.It can definitely occupy an important position in the world Internet security market.
Of course, even if he had no experience, Chen Jiayi had to find a way to build a firewall.Because there are too many things related to this, it would be ridiculous if a big country didn't even have a decent firewall.
Hearing Zhuo Hang's worried look, Chen Jia smiled reassuringly.Then, I suddenly had an idea and came up with a good idea, "Since everyone doesn't know what the firewall is for, why don't we demonstrate it for users to watch."
"Demo."
The R&D members didn't understand for a while, and they didn't know what the demonstration meant?
"Yes, it's a demonstration."
As soon as Chen Jia finished speaking, he came to the two computers and showed them to everyone.Said, "Here is an ordinary computer with only Microsoft's own firewall installed, and then we send a lot of garbage data to him."
……
After flipping through the presentation, everyone finally understood.
A few days later, Tangchao Software released the personal version of Tangchao Firewall against the doubts of the media and the support of some netizens.And, at the press conference.Zhuo Hang, the person in charge of Tangchao Software, declared that Tangchao Firewall Personal Edition adopts the world's top isolation technology, has a strict monitoring system, flexible security rules, detailed access records, and a complete alarm system... So much has been said , maybe, everyone is not very clear.
So, let's show the uniqueness of this firewall.
At this time, a video appeared on the big screen.
The video was shot by a real person. There is only a man in a black suit facing a computer alone. There is nothing around him.Some cold, some mysterious.But, after a while.I saw the man in black, but there was a clapping sound among the computer keyboards.A series of instructions flew out.
It turned out that he was a hacker.
Counting commands, spam messages began to be sent to a certain computer, and it only took 1 minute. The large amount of spam messages made the other party's operating system unable to handle it. Not long after that, the man in black successfully obtained The supreme control of the other party's computer.
A copy of the Word document appeared on the computer desktop of the man in black.
"Wow……"
The whole intrusion process didn't take 5 minutes, and the man in black obtained the information in the other party's computer.At this time, Zhuo Hang began to explain, "I believe everyone already understands that the other party's computer is a computer that has not been installed with a firewall. Therefore, the man in black used a little bit of hacking technology, and the key to success Take the other party's information.
If you have a lot of important information in your computer.However, if your computer is not equipped with a good firewall, perhaps, your information may be stolen by others.What's more, your tt software password, game account number, bank card number and so on may all be stolen.
"Then what shall we do?"
A netizen asked worriedly.
"This friend asked very well."
"Only using a super-performance-security firewall can effectively defend against such hacking, let's watch the next video..."
This video is still the man in black, he is still hacking other people's computers.But when he sent a lot of spam to a certain computer, suddenly, the icon in the lower right corner of the other party responded immediately.Start the alarm and start defense automatically.All the spam messages sent by the other party were quarantined.Moreover, the p address of the other party was also recorded.
"Look, this computer uses the Tangchao Firewall developed by Tangchao Software. The owner of the computer doesn't need to operate at all, and it has easily cut off the hackers' intrusion, ensuring the safety of the computer."
"From this point of view, it is very necessary for us to install this firewall. It is free anyway, so it is not for nothing."
Many netizens have made such remarks one after another.
In fact, this little strategy, if it is said to be clever, is not necessarily so clever.Chen Jiayi also knows that with such a publicity strategy, it can only be downloaded and used by some netizens at most, and it is still relatively difficult to spread it to the general public.At this time, Chen Jiayi thought of Shi Yuzhu's melatonin advertising method.
The so-called melatonin-style advertising is to advertise a certain type of product on the Internet by a large margin.
Today, without the Yongchao firewall, any of your accounts may be stolen.
Tomorrow, I will say that without the Tang Dynasty Firewall, your computer is equivalent to being naked for people to peek at.
The day after tomorrow is even more cloudy. Only the Tang Dynasty Firewall can protect your computer from hackers.
This is just a frontal advertisement, and Chen Jiayi's most powerful method is behind the scenes.
The so-called method is invasion.
This operation is a large-scale hacking plan issued by Tang Dynasty Software Company.
The goal of the intrusion is personal computers at home and abroad, but after they intrude, they don't steal anything.I only made some marks on it, so that netizens can find out that their computers have been invaded.In this way, some netizens who were hacked suddenly panicked.
【
Aishang Reading Network]
Tang Dynasty Software was very low-key at the beginning, and did not want to attract the attention of the media. 【
Aishang Reading Network] Because many employees in the company are members of the hacker alliance.For the safety of company members, Chen Jia issued a confidentiality order and did not publicize that Tangchao Software is a subsidiary of Tangchao Information.However, Chen Jiayi underestimated the power of the media.
Within a few days, there was news that Tangchao Software was a subsidiary of Tangchao Information.Although there is no absolute evidence for this news, only a photo of "Zhang Zixian" having a cordial conversation with "Zhuo Hang", the person in charge of Tang Dynasty software, was shown.Many media saw this, as if they smelled fishy, they sent several reporters to investigate.
There is no impenetrable wall in the world, no matter how good Tangchao Information and Tangchao software are, there are times when they are negligent, and many clues are revealed one by one.Seeing that it could no longer be concealed, Tang Dynasty information and Tang Dynasty software were announced on the same day.Tangchao Software, a subsidiary of Tangchao Information, is currently developing an enterprise firewall.
"Firewall."
When Tangchao Software publicly announced that it was developing an enterprise firewall, several people in the industry stared with wide eyes and could hardly believe it.Software that is a bit more advanced than anti-virus software, such as the firewall, and many information technologies in the West have not been passed on to China.Because of this, the computer Internet has been developed for many years, but there has never been a decent firewall company in China.Most software companies with a bit of technology have also turned to anti-virus software.
It is precisely because there is no firewall technology in China, so Tangchao Software said that it is developing an enterprise firewall, which aroused suspicion from several people.
"Tang Dynasty Firewall, can you trust it?"
After learning about the software development firewall of Tang Dynasty, most people in the industry are still very worried about him.
Although they have absolute trust in Tang Dynasty's game technology, online games and security software are definitely not the same concept.The former is called Internet technology, not software technology, and the latter is called software technology.And Internet technology, in jargon, is technology without technology.But software technology, its technology-nature-is much better than the Internet.
Many software graduates usually choose software companies first, and then Internet companies.
Not only that, the author analyzed the prospect of Tang Dynasty software very professionally.
The article not only pointed out the current situation of China's firewall technology, but also pointed out the direction that Tang Dynasty Company was engaged in recently.It's okay for him to do network application technology, but if he wants to do a firewall.Even if Tang Dynasty Software becomes China's No. 1, it won't rank in the world.It was a waste of money, and in the end, domestic companies had to use foreign firewalls.
Seeing these comments, Chen Jiayi also understood.
Although these media speak too much, they are also telling the truth.Take the later Skynet firewall, which is well-known in China.However, in 2010, the company went bankrupt.Why it closed down, just think about it.It's just that the benefits are not good, and the business cannot continue.
Regarding the media's comments, Tang Dynasty Software did not respond too much. Chen Jiayi instructed that as long as the firewall is made carefully, it will be fine.Moreover, the Personal Edition of Jinsi Tangchao Firewall has almost been produced, and it can be released to the market at any time as soon as the time comes.
You have to ask, why is the software development speed of the Tang Dynasty so fast?
In fact, this is quite simple. The reason is that Chen Jiayi has been researching firewall technology in the hacker alliance and alliance members before.Moreover, the Hacking Alliance has finally created a powerful personal firewall during the period of research.Take it out now, and with a little modification, it can be released on the market.
However, the personal firewall is actually a tasteless thing for ordinary people.It's the same whether players use it or not.Using it does not necessarily increase the sense of security, and not using it does not necessarily mean that something is missing.
You know, a firewall is not the same as an antivirus software.
Anti-virus software is required for every personal computer, but it doesn't matter whether you need a firewall or not.Moreover, Microsoft's operating system also comes with a wnows firewall.It is still somewhat effective to deal with general non-malicious attacks.But if you are dealing with hackers, even if you install a better firewall, you will still be hacked.
"Mr. Chen, as for Guang, we're afraid..."
The software is done well, but how widely it becomes a problem.It's not that this firewall is not powerful, it is useless even if it is strong.Everyone doesn't know what a firewall is, so it is more popular than anti-virus software.In this way, even if the personal version of the firewall is released from the market, it may not necessarily achieve any results.
Zhuo Hang, the person in charge of Tangchao Software, also known as "Ziyun" of the Hacker Alliance, said to Chen Jiayi.
"It's okay. We didn't plan to release a personal version of the firewall. It's just that there is already a personal version of the firewall in the alliance. It's a waste to keep it and not make good use of it. If you go out now, if the hype is good, you can also promote the enterprise version. .”
The personal version of the firewall is a weak point, Chen Jia knows it all the time.
To make money with a firewall, you can only rely on the enterprise version.Only enterprise companies, they will pay a lot of money to buy your firewall.Because they have a lot of company information, which are all commercial secrets.If it is taken by the opponent, in many cases, a company will go bankrupt.So, in many cases.The needs of enterprise users for firewalls are more urgent than the needs for antivirus software.
Chen Jiayi saw this, and also wanted to improve the hardware level of domestic computers.Firewall, Tangchao software must be done.Not to mention that the Hacking Alliance has been researching firewalls before, and has accumulated a lot of experience. Moreover, Chen Jiayi also taught them a series of firewall technologies for later generations.As long as the enterprise version of the firewall is developed.It can definitely occupy an important position in the world Internet security market.
Of course, even if he had no experience, Chen Jiayi had to find a way to build a firewall.Because there are too many things related to this, it would be ridiculous if a big country didn't even have a decent firewall.
Hearing Zhuo Hang's worried look, Chen Jia smiled reassuringly.Then, I suddenly had an idea and came up with a good idea, "Since everyone doesn't know what the firewall is for, why don't we demonstrate it for users to watch."
"Demo."
The R&D members didn't understand for a while, and they didn't know what the demonstration meant?
"Yes, it's a demonstration."
As soon as Chen Jia finished speaking, he came to the two computers and showed them to everyone.Said, "Here is an ordinary computer with only Microsoft's own firewall installed, and then we send a lot of garbage data to him."
……
After flipping through the presentation, everyone finally understood.
A few days later, Tangchao Software released the personal version of Tangchao Firewall against the doubts of the media and the support of some netizens.And, at the press conference.Zhuo Hang, the person in charge of Tangchao Software, declared that Tangchao Firewall Personal Edition adopts the world's top isolation technology, has a strict monitoring system, flexible security rules, detailed access records, and a complete alarm system... So much has been said , maybe, everyone is not very clear.
So, let's show the uniqueness of this firewall.
At this time, a video appeared on the big screen.
The video was shot by a real person. There is only a man in a black suit facing a computer alone. There is nothing around him.Some cold, some mysterious.But, after a while.I saw the man in black, but there was a clapping sound among the computer keyboards.A series of instructions flew out.
It turned out that he was a hacker.
Counting commands, spam messages began to be sent to a certain computer, and it only took 1 minute. The large amount of spam messages made the other party's operating system unable to handle it. Not long after that, the man in black successfully obtained The supreme control of the other party's computer.
A copy of the Word document appeared on the computer desktop of the man in black.
"Wow……"
The whole intrusion process didn't take 5 minutes, and the man in black obtained the information in the other party's computer.At this time, Zhuo Hang began to explain, "I believe everyone already understands that the other party's computer is a computer that has not been installed with a firewall. Therefore, the man in black used a little bit of hacking technology, and the key to success Take the other party's information.
If you have a lot of important information in your computer.However, if your computer is not equipped with a good firewall, perhaps, your information may be stolen by others.What's more, your tt software password, game account number, bank card number and so on may all be stolen.
"Then what shall we do?"
A netizen asked worriedly.
"This friend asked very well."
"Only using a super-performance-security firewall can effectively defend against such hacking, let's watch the next video..."
This video is still the man in black, he is still hacking other people's computers.But when he sent a lot of spam to a certain computer, suddenly, the icon in the lower right corner of the other party responded immediately.Start the alarm and start defense automatically.All the spam messages sent by the other party were quarantined.Moreover, the p address of the other party was also recorded.
"Look, this computer uses the Tangchao Firewall developed by Tangchao Software. The owner of the computer doesn't need to operate at all, and it has easily cut off the hackers' intrusion, ensuring the safety of the computer."
"From this point of view, it is very necessary for us to install this firewall. It is free anyway, so it is not for nothing."
Many netizens have made such remarks one after another.
In fact, this little strategy, if it is said to be clever, is not necessarily so clever.Chen Jiayi also knows that with such a publicity strategy, it can only be downloaded and used by some netizens at most, and it is still relatively difficult to spread it to the general public.At this time, Chen Jiayi thought of Shi Yuzhu's melatonin advertising method.
The so-called melatonin-style advertising is to advertise a certain type of product on the Internet by a large margin.
Today, without the Yongchao firewall, any of your accounts may be stolen.
Tomorrow, I will say that without the Tang Dynasty Firewall, your computer is equivalent to being naked for people to peek at.
The day after tomorrow is even more cloudy. Only the Tang Dynasty Firewall can protect your computer from hackers.
This is just a frontal advertisement, and Chen Jiayi's most powerful method is behind the scenes.
The so-called method is invasion.
This operation is a large-scale hacking plan issued by Tang Dynasty Software Company.
The goal of the intrusion is personal computers at home and abroad, but after they intrude, they don't steal anything.I only made some marks on it, so that netizens can find out that their computers have been invaded.In this way, some netizens who were hacked suddenly panicked.
【
Aishang Reading Network]
You'll Also Like
-
Hong Kong Variety Show: Me, the Traffic Enforcement and Control Team?
Chapter 1358 8 hours ago -
As a former member of C-group, I want to destroy mygo!
Chapter 81 8 hours ago -
Dragon Raja: Lu Mingfei Returns from Japan
Chapter 202 8 hours ago -
Infinity, progressing from Arasaka
Chapter 146 8 hours ago -
Funinna, please let me steal your heart!
Chapter 191 8 hours ago -
The Embers of King's Teyvat Journey
Chapter 605 8 hours ago -
I was living in the Five Dynasties period, just after crossing the Zhongdu Bridge.
Chapter 68 8 hours ago -
Being carried onto an ambulance at the start? But this is America!
Chapter 55 8 hours ago -
Fishing and Hunting 82, Starting with Three Sisters Who Overprotect Their Brothers
Chapter 95 8 hours ago -
Only I Have the Law: A Realistic Cultivation Game
Chapter 69 8 hours ago