Chapter 90: Understanding People's Hearts Better

Thanks to the rapid growth of the video game industry in the United States, other software industries have also learned how to advertise.

Tom's free security software follows the strategy of video game promotion. In several steps, it was advertised in a shopping mall, a newspaper advertisement, and a TV advertisement.

Among them, shopping mall advertisements are mainly posters. The content on the poster does not advertise how advanced and invincible his technology is.

Instead, it focuses on the "Computer Insurance for All" program and the "Million Dollar Challenge" program.

These two contents, although they do not directly say that their security software is very strong, but they both set off Tom's strong confidence in security from the side.

Although there is no physical CD-ROM storage medium in Tom Security, its posters are pasted next to Symantec and Kaspersky Internet Security, and the provocation is overflowing.

The newspaper advertisement doesn't say that this free antivirus software is good, it's good.

It's also from a different perspective.

This angle is in the form of an interview with a reporter who interviews a "security officer of a large factory", and then this "security officer of a large factory" seems to be praising paid security software and belittling free security software, but in fact the meaning expressed is exactly the opposite.

Such a form of anti-pretending loyalty is also a form that the audience likes to see.

After all, the price of TV advertising is the most expensive, the shortest time, and there is not so much room to play, so it can only be slightly different.

Of course, unlike video games, Tom Security also buys search engine keyword optimization services.

Speaking human words is to manually put the search entry at the top, so that whether you see it in the mall, or see it in the newspaper, or see it on TV, under this all-round three-dimensional propaganda offensive, as long as you search, you can search immediately.

Symantec was also the first to discover the menacing Tom Safety.

Their approach is the same as Tom Security's, which is to download the security software as soon as possible, and then throw it into a virtual machine to disassemble and test.

The tester manipulated the computer, and said in a cold sweat on his head, "At present, it seems that the full performance of this security software can reach an excellent level." And...... There is no significant lag behind our security software......"

"Break down what kind of technology they're using. The leader urged.

The testers continued to work on the shelling, but Tom Security used a completely new encryption algorithm. This kind of encryption is difficult to crack with traditional brute force cracking.

And, after more than 10 attempts, the security software itself activates the stress mechanism. Directly find this attempt to crack their own process, and carry out a merciless killing.

The leader looked at the operation of the technician with a gloomy face.

The completion of this software is far higher than they imagined.

Not only does it have excellent performance, but it also does it all.

In this way......

It's harder to break down this software.

Of course, they didn't know that in order to achieve profitability as soon as possible, Tom originally planned to go public with a strategy of going online first and perfecting later.

According to the terminology of the future Internet, it is to engage in iterative development.

Refine the functionality with small updates all the time.

However, Symantec got things up and Tom Klecy had to be cautious.

Speaking of which, I have to say that creation makes people.

Symantec thought that his strategy was to solve the enemy once and for all, but he didn't expect that although he solved a group of small shrimps, he raised a bigger boss.

If they had been more patient at the time, and not so flustered, and waited for Tom Klethy's security software to be produced, along with Tom Kleisy's iterative development software, they might have really been at ease in a few years, rather than a big BOOS in a few months.

However, as long as things are done, there are no ifs. Every choice is like two sides of the coin, both good and bad.

Symantec was tied up by shareholders and had no way to make any changes in its business model, and the pioneers who once solved the millennium bug crisis have now degenerated into anti-(meow) activists who interfere with the progress of the industry.

Of course, their behavior is not to use their mantis arms as a car, they are much stronger than praying mantises, but it does not mean that they must wait to block the progress of the car.

When it comes to those weak challengers, they can easily win. But what about when you encounter a strong enemy?

Tom Kleisy is a tough opponent.

Although people have lost faith in free security software, this series of advertisements for Tom Security has really worked, and some people are willing to try it.

These people may be a little more low-end than those who would have opted for free security software a few months ago.

Because a month ago, there would be a group of people who felt that buying security software was painful to choose security software, but now only those who can't afford it will choose.

After all, they are already going crazy by the toss for a while. In order to reduce losses, it is necessary to spend money instead of using bad free software.

However, when they started downloading, it felt different.

What's the difference?

The first is that I don't know how much faster the download speed.

They don't spend as much on servers as Mentek and Kaspersky, but why are they fast?

The meaning of the P2P download protocol is very simple, that is, each user will upload a part in the process of downloading, and other users will download this part and upload it again.

In this way, the pressure on the official servers is greatly reduced, and the download speed is naturally greatly accelerated.

If there is any impact on the average user, it is that their upload speed will also be taken up when downloading.

However, there is basically no one who uploads something at the same time as they download it.

So, it's not a big deal.

Ordinary users who don't know the principle think that Tom is safer and more wealthy.

After downloading and installing, the experience is different again.

Because Tom's secure interface is better than similar free and even paid ones, I don't know how much.

The actual performance may not be intuitively felt, but whether the interface is good or not can be seen at a glance.

The decisive suggestion for whether the interface should look good or not came from Tom Security, the female marketing manager.

Compared to the security companies that are all men, it is clear that Tom Security understands people's hearts better.