Chapter 1095 - No Theft System

"What do you think should be done?"

Rayleigh Benson, a senior programmer, had no idea where to start when faced with an operating system. Pen, fun, and www.biquge.info

Before that, they tried many methods, such as restarting the computer, pressing the del key, unplugging the network cable to be in a stand-alone state, and even disassembling the chassis and replacing it with a hard drive. But all of this to no avail, when they turn on the computer, the desktop is always that dark blue.

"Damn it, it's fucking unscientific!"

It's the weekend tonight, and it's long past the end of work, and there are few people in the office. At this time, a brightly dressed woman came out of the administrative office, glanced at the two of them in a daze, and shouted from afar: "Hey, Rayleigh, don't you two need to get off work?"

How can two senior engineers tell others about this kind of thing when they break their computers? The two of them said in unison: "We are testing a piece of software, and we will leave work later." ”

The woman didn't care about them, and just as she was about to leave, she suddenly turned around and walked towards them, took out a CD from Kun's bag as she went, and said with a smile: "Rayleigh, I bought a birthday CD for my daughter, and I want to add some birthday greetings to it." But you know, I don't know anything about computers. ”

"Hehe, you put it here, I'll get it for you tomorrow. ”

"Okay, thank you~"

After the well-dressed woman left, the two senior engineers looked at the computer again. Suddenly, Rayleigh's eyes lit up and he exclaimed, "Does it need to be genuine software source code?"

Kozlone thought for a while, the software that was installed on the computer several times was all their own developed applications, and there was no so-called open source code at all, and when this program could not detect it, it naturally judged that their software was from an unknown source, and they were not allowed to install it.

If this conjecture is correct, what would it be incredible?

The two men glanced at each other, and when they saw the CD on the computer desk, they both held out their hands, but they sat so close that Kozloon got them. With a trembling arm, he stuffed it into the optical drive of the chassis, and soon the sound of rotation rang out.

There was no "unknown source" warning sound coming out of the speakers, and the video drive was not ejected, that is, about five seconds, when the system optical drive recognized the CD, a brand new player appeared on the desktop.

This player, which is the same color as the desktop, appears out of thin air, and then nothing happens.

Kozlone clicked on the video with a trembling arm, very smooth, when the mouse double-clicked, the video immediately expanded, without the slightest lag, and the reaction was unusually agile.

shewokemeupatnight

tocarrymeoutside

wehidindeeperforests。。。。

German all-round music composer Mesmilan Heicker's "anaesthesia" slowly flowed out of the speakers.

The music is soothing and moving, but the hearts of the two senior engineers are shocking. At the same time, a glimmer of realization rose in their hearts that they were likely witnessing the launch of an epoch-making product.

This semi-intelligent computer system, the world's first biocomputer, entered the United States silently, without any earth-shattering press conference, and no one worshiped it, only two engineers looked at each other.

However, at this time, it is very lively in several well-known software forums in China, and many night owl software engineers are discussing fiercely. And unlike the two of Kozlone, many people worked out how to use this system in less than half an hour.

"Hell, I don't know who designed that system, it's really perverted. ”

"yes, I'm so speechless, I wanted to program its background, and I just uninstalled my software. ”

"What are you guys, I'm miserable, a piece of software to be delivered in two days is gone, and I haven't been able to recover it yet. If the boss knew about it during the day today, he would have to pick me up. ”

"Hey, did you find it, this system is really smooth, I opened more than 20 large programs at the same time, and the result was that there was no problem, that is, the CPU temperature increased by 20%. ”

"But now the problem is that all the software installed on this system is genuine, and many of the tools you make yourself can't run on it at all. ”

Some of the people in the forum are senior engineers in the laboratory, some are programmers in large companies, and many experts from security companies do not speak at all, silently looking at the text of these chats, thinking about the deep-seated problems.

When Fang Yuanshan transmitted this system software to several well-known software download bases in China, in less than two hours, many industry leaders received the news.

The first thing they noticed was two things, first, the system-wide package was only 10MB in size, and second, the system could run very smoothly.

When they heard these two news, everyone's first reaction was to suspect that they had heard it wrong.

A system software or application software is composed of thousands or even hundreds of millions of instructions. Computers can only directly recognize and execute machine language, so to run a high-level language program on a computer, it is necessary to have a program language translation program, which itself is a set of programs, and different high-level languages have corresponding translation programs.

To put it simply, the computer is like a shell, it has no role, it is the brain that controls it, and the brain is connected to thousands of nerves, and the nerves control the hands and feet, and the hands and feet transmit the things they touch to the brain through neurons, and then the brain commands the hands and feet to execute.

In the same way, there are so many things involved in such a large and complex project, how can it be possible to fully control a computer with 10MB?

But whether they believed it or not, it just happened.

Although the backend of the package has not yet been compiled, this does not prevent software experts from studying it.

In order to see if the system was fake or if it was really working, the programmer uninstalled the pre-installed system on the computer, then connected to the network and let the system package start running on the computer.

The biological computer is also just a computer, and St. Athena does not need to download the same port twice, because it can be automatically scanned, but those programmers have a way to download the program on a CD, a USB drive, or even a mobile phone.

But there's also the trouble that these people need to change their IP address every time they get a package. When it came time to determine that the system would work perfectly in a variety of environments, the senior programmers and software technicians were all shocked.

Technology is no small matter, and many times a seemingly inconspicuous piece of software is likely to cause change in the technology world. Among these programmers there are many sharp-eyed people who immediately notice that this system software is extraordinary.

In the "Gwangju" high-tech zone and science and technology industrial park, there are big names from the national software industry. Many companies have already held emergency meetings when the sun is just rising in the sky, and the topics are all about the system, without exception.

"Do you think this system is impossible with today's technology?"

The conference room was set up in the form of a lecture, and most of the staff below were very casual and did not have that sense of seriousness. Just as the chubby man on the stage finished speaking, a man in a cashmere shirt below spoke: "Boss, whether it can be achieved or not, the problem now is that this system has clearly appeared, so we can't believe it." ”

"yes, we tested this system for two hours, and it was perfect!"

"The same cannot be said. I don't know what the developer is based on, but it's amazing that it excludes any software that is not properly licensed. ”

"It doesn't accept non-registered software, which is a double-edged sword... ”

The man in the orthodox suit on the stage frowned, raised his hand to interrupt the discussion of the people below, and said in a solemn tone: "Have you ever put yourself in your shoes, I mean, if the world's PCs, handheld computers, including personal communication mobile terminals, are all equipped with this non-theft system, what do you think it will be?"

"Hiss... After listening to his words, everyone gasped after a moment's thought.

This dignified man is Lu Yeyu, chairman of the famous software development company "Tianxia Software" in China. Lu Yeyu, who is less than 40 years old this year, has founded a website for people to download small software since he was in college in the nineties.

The software download site didn't make him any money, but it did make him famous. After graduating from university, he quickly made a name for himself in the domestic software industry by relying on his outstanding technical ability and keen vision.

Lu Yeyu, who came from a technical background, not only saw the terrifying technical strength of this software, but also saw the amazing commercial profitability, once this system is promoted, when people really use this non-theft system, the first thing to sell pirated copies will be extinct.

However, compared to the small plate, the impact of this software on reality is huge.

"David, you can share what you have tested with you. ”

"Good head~"

As he spoke, a young man of twenty-five or sixteen years old stood up, picked up the information in his hand and glanced at it, saying: "I have mainly tested three aspects before, the first is the problem of perfect operation, the second is the installation software, and the third is operability. ”

"The first thing that any system thinks about is stable operation, and then it thinks about operation, and obviously you already know the answer to the first question. The system software uploaded to Dort, Viva and our company website at 5:35 a.m. has been running stably without any problems. ”

"The second question is that our technicians tested more than 500 genuine and illegal software at home and abroad within two hours, of which 220 genuine software all worked perfectly, and none of the remaining pirated software could pass on this system. ”

"Hiss~~~"

The twenty or thirty programmers in the room gasped again, what a rebellious thing? Like Kozmo in Silicon Valley, they all wondered if it was April Fool's Day, and when did a set of system programs develop the ability to distinguish between authenticity and falsehood?

The last question, which is also the "operability" that everyone is most concerned about, while they listened with their ears up, the man who stood up took a deep breath and said slowly...

(To be continued.) )