Chapter 173: Release of the Personal Firewall

Tang Dynasty Software was very low-key at the beginning, and did not want to attract the attention of the media. Because many employees in the company are members of the Black Guest Alliance. For the safety of the members of the Public Treasure Division, Chen Jia issued a confidentiality order and did not publicize that the Tang Dynasty Software was a sub-public division of Tang Dynasty information. It's just the power of the media, but Chen Jiayi underestimated it.

Within a few days, there was news that the Tang Dynasty software was the Tang Dynasty Information Division. Although there is no absolute evidence for this news, only a photo of "Zhang Zixian" talking cordially with "Zhuo Hang", the head of Tang Dynasty software, was taken out. When many media saw this, they seemed to smell fishy and sent countless reporters to investigate.

There is no impermeable wall in the world, no matter how good the Tang Dynasty information and Tang Dynasty software are, there are times when there are negligence, and many clues are revealed one by one. Seeing that it could no longer be hidden, Tang Dynasty information and Tang Dynasty software were announced on the same day. Tang Dynasty Software is a sub-division of Tang Dynasty information. An enterprise firewall is currently being developed.

"Firewall."

When Tang Dynasty Software publicly announced that it was developing an enterprise firewall, countless people in the industry were staring at each other and could hardly believe it. Software such as firewalls, which are a little more advanced than antivirus software, has not been transmitted to China by many Western information technologies. Because of this, the computer Internet network has been developed for many years, but there has never been a decent firewall company in China. Most of the software companies with a little technology have also turned to antivirus software.

It is precisely because there is no firewall technology in China that Tang Dynasty Software said that it was developing enterprise firewalls, which aroused the suspicion of countless people.

"Tang Dynasty Firewall, can you trust it?"

After learning about the software development firewall of the Tang Dynasty, most people in the industry were still very worried about him.

Although they have a desperate trust in the game technology of the Tang Dynasty Gongyuan. However, online games and security software are definitely not the same concept. The former is called Internet technology, not software technology, and the latter is called software technology. And the interconnected network technology, in the jargon, is that there is no technical technology. But the software technology, his technical is much better than the Internet.

Many people who graduate from software generally choose the software company first, and then choose the Internet company.

And that's not all, the author is extremely professional in analyzing the prospects of Tang Dynasty software.

The article not only points out the current situation of China's firewall technology, but also exemplifies the direction of the Tang Dynasty Public Security Division's recent work. It's okay to do network application technology, but to do firewall. Even if Tang Dynasty software became China's NO1, it would not rank in the world. Funds are wasted, and in the end, domestic companies have to use foreign firewalls.

Seeing these comments, Chen Jiayi also understood.

Although these media are too rhetorical, they are also telling the truth. Take the Skynet Firewall of later generations, which is very famous in China. However, in 2010, the company went out of business. Why did it go out of business, just think about it. It's nothing more than a bad performance and can't continue to operate.

Tang Dynasty Software did not respond too much to the media's comments, and Chen Jiayi instructed that as long as the firewall was carefully controlled. Moreover, the personal version of the firewall of the Tang Dynasty has almost been completed, and as long as the time comes, it can be launched on the market at any time

You're going to ask. Tang Dynasty software to get software, why is it so fast?

In fact, this is also simple, and the reason for this is that Chen Jiayi has been constantly researching firewall technology with members of the alliance in the Black Guest Alliance. Moreover, the Black Hunter Alliance is in the process of studying during this period of time. Finally, a powerful personal firewall has been created. Take it out now, and with a little change, you can launch it on the market.

It's just that the personal firewall is actually a chicken rib for ordinary people. It's the same whether players use it or not. Using it does not necessarily increase the sense of security, but no, and it does not see that there is anything missing.

Keep in mind that a firewall is not the same as an antivirus.

Antivirus software is needed on every personal computer, but it doesn't matter if you need a firewall or not. Moreover, Microsoft's operating system also comes with a... WINDOWS FIREWALL. It's still a bit effective to deal with general non-malicious attacks, but if you deal with black criminals, even if you install some firewalls, you will still be hacked.

"Mr. Chen, for the promotion of these three pieces, we are afraid"

The software is done well, but how to promote it becomes a problem. It's not that this firewall isn't strong, it's just that it's useless. Everyone doesn't know what a firewall is, and it's more popular than antivirus software. As a result, even if the personal version of the firewall is introduced to the market, it will not necessarily achieve much success. ,

Zhuo Hang, the person in charge of Tang Dynasty Software, that is, the "Ziyun" of the Black Guest Alliance, said to Chen Jiayi.

"It's fine, we weren't going to launch a personal version of the firewall either. It's just that there is already a personal version of the firewall in the alliance. It's a pity to keep it for good use. Now that it's launched, if the hype is good, it can also be used for the enterprise version to do publicity. ”

The personal version of the firewall is a chicken rib, and Chen Jia has repeatedly failed to do it.

If the firewall wants to make money, it can only rely on the enterprise version. Only corporate corporations will pay a lot of money to buy your firewall. Because they have a lot of information about the company, this is all business secrets. If it is tricked by an opponent, many times, a public company will go out of business. So, a lot of intimidation. Enterprise users need firewalls more urgently than antivirus software.

Chen Jiayi saw this piece, and also in order to improve the hardware level of domestic computers. Firewall, Tang Dynasty software must be done. Not to mention that the Black Guest Alliance has been researching the poor firewall before. Accumulated a whole lot of experience. And. Chen Jiayi also taught them all the firewall technologies of Wushi. As long as the anti-sharp wall enterprise version is developed. It can definitely occupy an important position in the world's Internet security market.

Of course, even if he has no experience, Chen Jiayi has to find a way to create a firewall. Because there are so many things that are at stake, wouldn't it be ridiculous for a big country to have a decent firewall.

Hearing Zhuo Hang's somewhat worried look, Chen Jiayi smiled comfortingly. Subsequently. Suddenly, I had an idea, and I thought of a good way to promote, "Since you don't know what the firewall is for, let's demonstrate it to the user to watch the mobile machine to see the finishing~ Look." ”

"Acting in a Bottle"

The R&D members didn't understand for a while and didn't know what the demonstration meant?

"Yes, it's a demo."

As soon as Chen Jia finished speaking, he came to the two computers and showed them to everyone. "There's a normal computer with Microsoft's own firewall, and then we're sending him a bunch of garbage. ”

After flipping through the demonstration, everyone finally understood.

A few days later, Tang Dynasty Software released the personal version of the Tang Dynasty Firewall despite the doubts of the media and the support of some netizens. And, at the time of the press conference. Zhuo Hang, the person in charge of Tang Dynasty software, claimed that the personal version of the Tang Dynasty Firewall adopts the world's top isolation technology, has a strict monitoring system, flexible security rules, detailed access records, and a perfect alarm system. Having said all this, probably, everyone is not very clear.

So let's show what makes this firewall unique.

At this time, a video frequency appears in the center of the large screen.

The video was shot in real action, and only a man in a black suit was seen alone in front of a computer, with nothing around but him. Some cold, some mysterious. However, after a while.

I saw that the man in black was on the computer keyboard, and there was a sound of patting. A barrage of commands flew out.

It turned out that he was a black squire.

Countless instructions began to send garbage messages to a certain computer, and it only took a minute for a large number of garbage messages to make the other party's operating system unable to deal with them, and then it didn't take long. The man in black succeeded in gaining supreme control of the opponent's computer.

A WORD DOCUMENT, COPIED FROM THIS, APPEARED ON THE COMPUTER DESKTOP OF THE MAN IN BLACK.

"Wow"

The entire invasion process didn't take five minutes, and the man in black obtained the information in the other party's computer. At this time, Zhuo Hang began to explain, "I believe you have understood that the other party's computer is a computer without a firewall installed. So, the man in black used a little bit of black trick technology and successfully obtained the other party's information.

If you have a lot of important information in your computer. However, if you don't have a good firewall installed on your computer, your data may be stolen by someone else. What's more, your software password, game account, bank card number, etc., may be stolen.

"So what to do?"

A netizen asked worriedly.

"This friend is a very good question."

"Only by using a super high-performance security firewall can effectively defend against such hacker incursions, let's look at the next video clip"

The video is still the man in black, who is still hacking into someone else's computer. But just when he was sending a large number of garbage messages to a certain computer, suddenly, the icon in the lower right corner of the other party immediately reacted. Expand the alarm and start the defense automatically. All the garbage messages sent by the other party were isolated. The sheep also recorded the four neighboring sites of the other party. ,

"You see, this computer is the Tang Dynasty firewall developed by the Tang Dynasty software, and the owner of the computer does not need to operate at all, so he has easily cut off the intrusion of the black thief and ensured the security of the computer."

"In this way, it is necessary for us to install this firewall, anyway, it is free of charge, so we don't have to use it in vain."

Many netizens have successively expressed such remarks.

In fact, this small strategy is clever, but it is not necessarily clever. Chen Jiayi also knows that relying on such a propaganda strategy, at most some netizens can download and use it, and it is still difficult to promote it to the public. At this time, Chen Jiayi thought of Shi Yuzhu's brain platinum advertising method in the future.

The so-called brain platinum advertising is to promote a certain type of product on the Internet to a large extent.

Today, without the Great Firewall, any of your accounts could be stolen.

Tomorrow, I will say that without the Great Firewall of the Tang Dynasty, your computer is equivalent to being naked for people to peek at.

The day after tomorrow is more cloudy, and only the Tang Dynasty Firewall can protect your computer from the invasion of hackers.

This is just a positive advertisement, behind the scenes, it is Chen Jiayi's most powerful means.

The so-called means is invasion.

This operation was a large-scale hacker invasion plan issued by the Tang Dynasty Software Corporation.

The targets of the invasion were domestic and foreign personal computers, but after the invasion, they did not steal anything. Only made some marks on it, so that netizens found out that their computers were hacked. In this way, some netizens who were invaded instantly panicked in their hearts.