Chapter 173: Release of the Personal Firewall
Tang Dynasty Software was very low-key at the beginning, and did not want to attract the attention of the media. Because many employees in the company are members of the hacker alliance. For the safety of the company's members, Chen Jia issued a confidentiality order and did not publicize that Tang Dynasty Software was a subsidiary of Tang Dynasty Information. It's just the power of the media, but Chen Jiayi underestimated it.
Within a few days, there was news that Tang Dynasty Software was a subsidiary of Tang Dynasty Information. Although there is no absolute evidence for this news, only a photo of "Zhang Zixian" talking cordially with "Zhuo Hang", the head of Tang Dynasty software, was taken out. When many media saw this, they seemed to smell fishy and sent countless reporters to investigate.
There is no impermeable wall in the world, even if the Tang Dynasty information and Tang Dynasty software are good, there are times when there are negligence, and many clues are revealed one by one. Seeing that it could no longer be hidden, Tang Dynasty information and Tang Dynasty software were announced on the same day. Tang Dynasty Software is a subsidiary of Tang Dynasty Information and is currently developing an enterprise firewall.
"Firewall."
When Tang Dynasty Software publicly announced that it was developing an enterprise firewall, countless people in the industry were staring at each other and could hardly believe it. Software such as firewalls, which are a little more advanced than antivirus software, has not been transmitted to China by many Western information technologies. Because of this, the computer Internet has developed for many years, but there has never been a decent firewall company in China. Most software companies with a bit of technology have also turned to antivirus software.
It is precisely because there is no firewall technology in China that Tang Dynasty Software said that it was developing enterprise firewalls, which aroused the suspicion of countless people.
"Tang Dynasty Firewall, can you trust it?"
After learning about the Tang Dynasty software development firewall, most people in the industry were still very worried about him.
Although they have absolute trust in Tang Dynasty's game technology, online games and security software are definitely not the same concept. The former is called Internet technology, not software technology, and the latter is called software technology. And Internet technology, in jargon, is technology without a technical surname. But software technology, his technical surname is more than the Internet.
Many people who graduate from software generally choose a software company first, and then an Internet company.
And that's not all, the author has analyzed the future of Tang Dynasty software with great expertise.
The article not only points out the current situation of firewall technology in China, but also exemplifies the direction that Tang Dynasty has recently pursued. It's okay to do network application technology, but to do firewall. Even if the Tang Dynasty software is made into China's No1, it will not be ranked in the world. Funds are wasted, and in the end, domestic companies have to use foreign firewalls.
Seeing these comments, Chen Jiayi also understood.
Although these media are too rhetorical, they are also telling the truth. Take the Skynet Firewall of later generations, which is very famous in China. However, in 2010, the company actually went out of business. Why did it go out of business, just think about it. It's nothing more than bad efficiency and can't continue to operate.
For the media's comments, Tang Dynasty Software did not respond too much, Chen Jiayi instructed that as long as the firewall was made carefully. Moreover, the personal version of the firewall of the Tang Dynasty has almost been produced, and as long as the time comes, it can be launched on the market at any time.
You have to ask, why is the speed of software development in the Tang Dynasty so fast?
In fact, this is also simple, and the reason for this is that Chen Jiayi has been constantly researching firewall technology in the hacker alliance and alliance members before. Moreover, during this period of research, the hacker alliance finally created a powerful personal firewall. Take it out now, and with a little change, you can launch it on the market.
It's just that the personal firewall is actually a chicken rib for ordinary people. It's the same whether players use it or not. Using it doesn't necessarily increase the sense of security, no, and it doesn't see anything missing.
Keep in mind that a firewall is not the same as an antivirus.
Antivirus software is needed on every personal computer, but it doesn't matter if you need a firewall or not. Moreover, Microsoft's operating system also comes with a Windows firewall. It is still somewhat effective in dealing with general non-malicious attacks. But if you deal with hackers, even if you have a firewall installed, you will still be hacked.
"Mr. Chen, I'm afraid we ...... on our side for promotion."
The software is done well, but how to promote it becomes a problem. It's not that this firewall isn't strong, it's just that it's useless. Everyone doesn't know what a firewall is, and it's more popular than antivirus software. As a result, even if the personal version of the firewall is introduced to the market, it will not necessarily achieve much success.
Zhuo Hang, the head of Tang Dynasty Software, that is, the "Ziyun" of the Hacker Alliance, said to Chen Jiayi.
"It's fine, we weren't going to launch a personal version of the firewall either. It's just that there is already a personal version of the firewall in the alliance. It's a pity to keep it and make good use of it. Now that it's launched, if the hype is good, it can also be promoted for the enterprise version. ”
The personal version of the firewall is a chicken rib, Chen Jia has been clear again and again.
Firewalls can only make money on the Enterprise Edition. Only enterprise companies, they will pay a lot of money for your firewall. Because they have a lot of company information, which is all trade secrets. If it is tricked by an adversary, many times, a company will go out of business. So, in many cases. Enterprise users need firewalls more urgently than antivirus software.
Chen Jiayi saw this piece, and also in order to improve the hardware level of domestic computers. Firewall, Tang Dynasty software must be done. Not to mention that the hacker alliance has been studying firewalls before and has accumulated a lot of experience, and Chen Jiayi has also taught them a series of firewall technologies in later generations. Just develop the Firewall Enterprise Edition. It can definitely occupy an important position in the world Internet security market.
Of course, even if he has no experience, Chen Jiayi has to find a way to create a firewall. Because there are so many things that are at stake, wouldn't it be ridiculous for a big country to have a decent firewall.
Hearing Zhuo Hang's somewhat worried look, Chen Jiayi smiled comfortingly. Then, I suddenly had an idea and thought of a good way to promote, "Since you don't know what the firewall is for, let's demonstrate it to users." ”
"Demo."
The R&D members didn't understand for a while and didn't know what the demonstration meant?
"Yes, it's a demo."
As soon as Chen Jia finished speaking, he came to the front of the two computers, and then showed them to everyone. "There's a normal computer with Microsoft's own firewall, and we're sending him a bunch of junk data. ”
…… After flipping through the demonstration, everyone finally understood.
A few days later, Tang Dynasty Software released the personal version of the Tang Dynasty Firewall despite the doubts of the media and the support of some netizens. And, at the time of the press conference. Zhuo Hang, the head of Tang Dynasty Software, claimed that the personal version of the Tang Dynasty Firewall adopts the world's top isolation technology, with a strict monitoring system, flexible security rules, detailed access records, and a perfect alarm system...... Having said all this, probably, everyone is not very clear.
So, let's show what makes this firewall unique.
At this point, a video appears on the big screen.
The video was shot by a real person, and only a man in a black suit was seen alone in front of a computer, with nothing around but him. Some cold, some mysterious. However, after a while. I saw the man in black, but in the computer keyboard, there was a sound of patting. A barrage of commands flew out.
It turned out that he was a hacker.
Countless instructions, spam began to be sent to a certain computer, it only took a minute, a large amount of spam information made the other party work system could not deal with it, and then not long after, the man in black successfully obtained the highest control of the other party's computer.
A word document, copied from this, appears on the computer desktop of the man in black.
"Wow......"
The entire invasion process didn't take five minutes, and the man in black obtained the information in the other party's computer. At this time, Zhuo Hang began to explain, "I believe you have understood that the other party's computer is a computer without a firewall installed. So, the man in black conveniently used a little hacking technology to successfully obtain the other party's information.
If you have a lot of important information in your computer. However, if you don't have a good firewall installed on your computer, your data may be stolen by someone else. Or, your TT software password, game account, bank card number, etc., may be stolen.
"So what to do?"
A netizen asked worriedly.
"This friend asked very well."
"Only by using a super security firewall can effectively defend against such hacker incursions, let's watch the next video......"
This video is still the man in black, who is still hacking into someone else's computer. But just when he was sending a large number of spam messages to a certain computer, suddenly, the icon in the lower right corner of the other party immediately reacted. Expand the alarm and start the defense automatically. All the spam messages sent by the other party were isolated. In addition, the IP address of the other party was recorded.
"You see, this computer is the Tang Dynasty firewall developed by the Tang Dynasty software, and the computer owner doesn't need to do anything at all, so he can easily cut off the hacker intrusion and ensure the security of the computer."
"In this way, it is necessary for us to install this firewall, and it is free anyway, so we don't need to use it in vain."
Many netizens have made such remarks.
In fact, this small strategy is clever, but it is not necessarily clever. Chen Jiayi also knows that relying on such a publicity strategy, at most some netizens can download and use it, and it is still difficult to promote it to the public. At this time, Chen Jiayi thought of Shi Yuzhu's brain platinum advertising method in the future.
The so-called brain platinum advertising is to promote a certain type of product on the Internet on a large scale.
Today, without the Great Firewall, any of your accounts could be stolen.
Tomorrow, I will say that without the Great Firewall of the Tang Dynasty, your computer is equivalent to being naked for people to peek at.
The day after tomorrow is more cloudy, and only the Tang Dynasty Firewall can protect your computer from hackers.
This is just a positive advertisement, behind the scenes, it is Chen Jiayi's most powerful means.
The so-called means is invasion.
This operation was a large-scale hacking plan issued by Tang Dynasty Software Company.
The targets of the invasion were domestic and foreign personal computers, but after the invasion, they did not steal anything. Only made some marks on it, so that netizens found out that their computers were hacked. In this way, some netizens who were invaded instantly panicked in their hearts.
(To be continued)