Chapter 87: Crisis and Opportunity (Part II)

Although Sun Cheng has the habit of installing a USB disk, it is impossible to carry all the software he has written in it. Pen ~ fun ~ pavilion www.biquge.info

I had to take a taxi back and use a USB drive to copy a copy of the PC version of the 'Super Guard' and bring it over.

Back and forth, when he returned to the laboratory again, it was already past six o'clock in the afternoon, and the laboratory was normally off work.

However, today's Future Tech Lab closes a bit later.

It's not that Fu Dong wants to squeeze labor, in order to get the operating system out in the shortest possible time, the laboratory needs indicators almost every day.

In the morning, I experienced another computer horse incident, and I didn't start work for half of the whole working day, so I could only work two hours longer than usual, and I could make up for a little bit.

As the only three managers in the current laboratory who start with the M sequence, when Sun Cheng returned to the laboratory again, both Fu Dong and Ida Wang were still waiting there.

"The PC version is here, and it is enough to protect the computers of various working groups in the laboratory!"

handed the USB disk to Fu Dong, Fu Dong complained, "There have been several foreign network disk and cloud disk companies, but there has not been any network/cloud disk technology provider in China so far, otherwise Sun Dong, you don't have to make this trip!" ”

Although it was just a casual complaint, it made Sun Cheng's eyes light up.

"yes, why didn't I think of the cloud disk!"

If you want to talk about network disks and cloud disks, he is no stranger to wandering around some Internet technology forums abroad, which is really a good thing.

The so-called network/cloud disk, is the Internet storage tool, it provides online information storage, reading, downloading and other services for enterprises and individuals through the Internet, only one account is needed, you can download at will in different regions, different computers, very convenient, and as long as the network/cloud disk company does not fall, there is no need to worry about the loss of files.

Network disks and cloud disks are basically the same, but the slight difference is that the latter is the product of Internet 'cloud technology'.

For example, if someone has already uploaded a funny video in the cloud drive, and the later person happens to upload an identical work, then as long as the internal detection mechanism of the cloud disk finds something similar, it will also build a video in the latter's personal cloud disk through the internal 'relocation' method. As for the storage side, the two funny videos actually occupy only one video space, but they are only "allocated" for the owner to access.

However, although the technical requirements of the network/cloud disk are not as high as imagined, in fact, most of the large and medium-sized Internet companies in China have the ability to get started, but this thing is really a standard giant toy.

Because the requirements for the server are too high, whether you buy or lease it, to maintain a user base of more than 10 million, the monthly maintenance fee is an astonishing amount.

If this scale is increased by an order of magnitude of hundreds of millions, it is not an exaggeration to say that it will cost human lives, and if you can't win enterprise-level cloud service orders, it is normal for annual losses to exceed 100 million.

However, the network/cloud disk is not a very profitable project, and venture capital funds are still needed to escort it through the early stage of entrepreneurship in foreign countries where paid services are popular.

In recent years, the slogan of free Internet has become louder and louder in China, and it is difficult to say that the model of 'personal free, paid expansion + enterprise cloud service charge' launched by foreign cloud disk giant Dropbox will not work in Daming.

Of course, although these worries keep jumping in his head, they can't dispel Sun Cheng's idea of getting involved in the cloud disk market in the future.

He immediately said: "If you want to get a cloud disk, it's not difficult to get it, technically I can provide it, but this thing is too server-hungry." In this way, when the time is over, I will get a rough client out for internal use in the laboratory, and let's try the water ourselves! ”

"I don't need to let you do everything, if you just want to get a client for our internal use in the laboratory, it's better to let the technicians below do it, it's all about practice!"

Fu Dong shook his head: "The workload of the voice-activated voice development team has not been large, and recently it has been seconded to other groups to help. As Sun Dong said, if you just develop a network disk for internal use in our laboratory, it is not technically difficult, so leave it to the voice-activated voice development team, we use more than 100 people, and the server can be temporarily hung on a Dawning-4C. ”

"That's fine!"

He would be happy to save himself a little trouble.

After the gossip, he naturally got to the point, Fu Dong was about to open the computer on his desk to test the performance of the PC version of the 'Super Guard' he provided, when he saw Ida Wang take the initiative to extend his hand to him, "Let me try it, my computer performance is not bad, and the source file of the mutant Trojan horse that I captured before is still in it, so I can use it to test the software!" ”

"Okay, come on!"

With the noon open-handed technique, Fu Dong no longer doubted that the glamorous stunner in front of him was just a vase invited by Sun Cheng, so as soon as he heard her finish speaking, he handed her the USB drive without hesitation.

Ida Wang picked up the computer, took the USB drive without hesitation, directly plugged it into the USB port in a corner, and quickly operated it.

"Three-core killing? I guess it's a bit of hardware......"

Soon after installing the 'Super Guard', Ida Wang was not in a hurry to use it, first clicked on it and looked at it for a while, then looked up at Sun Cheng, and seemed a little surprised.

"Tri-core?" Fu Dong was also taken aback when he heard this, and walked closer to look at the computer, and his face was quickly filled with joy: "Sun Dong, you really have three anti-virus engines......

The antivirus engine is a program responsible for detecting and discovering viruses, and it is not an exaggeration to say that it is the absolute core of the antivirus.

In the concept of antivirus software, the more engines the more powerful the power is just a false proposition.

After all, there are a lot of antivirus software that have squeezed into the forefront of the global security protection market by constantly cultivating and upgrading an engine, such as Intel's McAfee, Europe's Panda Guard, the Soviet Union's Dr.Web (Big Spider), the Czech Republic's AVG, and Kaixing Technology's Kaixing Killing Soft, etc.

However, it is not easy to upgrade and strengthen a single antivirus engine to the top of the competition.

Not only are the technical requirements for the company and the development team very high, but the difficulty is not directly proportional to the rate of return.

Therefore, when it is difficult to develop a super antivirus engine in the same amount of time, most companies do not have quality and quantity.

So in recent years, more and more multi-nuclear killing soft piles have appeared, this situation is very common in computer security technology, and want to sharpen their heads to squeeze into the first camp of the Ming Dynasty, India, Europe and other countries and regions.

Most of the multi-core anti-core software on the market is basically equipped with two dual-core anti-virus engines, which can generally be used for more than three cores, which not only has extremely high technical requirements, but also is not easy to solve with compatibility and software and hardware optimization.

Of course, Trustport is an exception, and this killer was born to disgust people.

Seeing that both of them looked at him, Sun Cheng was a little proud, "It's a three-core, although the engine has some references to AVG, Kaspersky and Little Red Umbrella, but it's only in terms of frame design, and I've made a big update inside." Try it first, and you won't be disappointed......"

Ida Wang quickly clicked on this killing soft, and a warning box of trustport immediately popped up on the screen, this monster-level killing software does not have a Chinese version, but Sun Cheng's English is good, and the content on it is clear at a glance.

"Warning, another program is trying to access the operating system, do you want to allow it to run?"

Sun Cheng smiled slightly, the 'Super Guard' he designed was very domineering.

Sure enough, before Ada Wang could click on the warning box, he saw that the 'Super Guard' had forcibly bypassed the protection of Trustport and entered a state of deep killing!

"What is this?"

Ida Wang looked up and looked at him in astonishment.

Sun Cheng just smiled at her but didn't answer, motioning for her to look down.

Before by catching vulnerabilities to earn the first pot of gold, since then Sun Cheng has been a little addicted to catching leaks, his home at the dawn-4c server has been running a variety of detection software, repeatedly looking for Microsoft Windows series, Kirin series, Linox and UNIX and other more than a dozen common operating systems on the market may have vulnerabilities.

Not to mention, after a period of hard work recently, he has really mastered another batch of loopholes.

Ada Wang's computer is powered by Win7, which has a hidden vulnerability that allows the finder to directly access the self-test mode.

'Super Guard' took advantage of this vulnerability that Microsoft had not yet discovered, and temporarily obtained the highest privilege as if it had flashed the computer, which greatly accelerated its detection efficiency.

It is conservatively estimated that in this case, it only takes about two or three hundred seconds for the 'Super Guard' to complete the detection of all the files of the entire computer.

Under normal circumstances, it takes at least ten minutes to use.

Of course, there is a downside.

Finding that Fu Dong was almost in front of the computer staring at the screen, Sun Cheng shrugged his shoulders, "It only takes three or five minutes for the 'Super Guard' to complete the comprehensive inspection of the system, but during this period, it will occupy all the resources of the computer, except for the 'Super Guard', no software is allowed to run!" ”

"That's really domineering, I just don't know how accurate the detection and killing accuracy is?"

The answer came out quickly, and after three to five minutes, the 'Super Guard' finally finished killing her laptop, which soon showed a bunch of questions.

"Yo, the efficiency is pretty good!"

Meimu looked at the computer, the corners of her mouth lifted lightly, "Found four vulnerabilities, found 127m useless garbage in the system, detected a variant nimda Trojan and forcibly deleted it, huh......"

At first, she still read softly as if she didn't care much, but the further she went, the quieter it became, and she couldn't read it at all.

For no other reason, in addition to detecting the 'Nimda Mutant Trojan', which was also detected by Trustport, 'Super Guard' also discovered some problems in her computer system.

If the detection results of the 'Super Guard' are true, then one thing can be proven, not only is the accuracy and efficiency of the 'Super Guard' not weaker than that of Trustport.

And in terms of functionality, it is also a bit more comprehensive than trustport.