Chapter 261: No Lack of Security

Soon after the disc was inserted, an installation interface of the software appeared, and with a few clicks, the software was successfully installed on the computer provided by Google. 【】

After running the software, an interface will appear showing that the software is detecting the VP on the current computer. After the setup, a prompt window pops up, asking "Do you configure it according to the settings on the computer in front of you?" ”。

The boss clicked "OK" and the software interface disappeared and returned to the desktop of the computer.

The boss cleaned up all the files on the desktop and said, "I'll configure a computer on the staff now, first, I'll install programming software on this computer!" "The boss started the same old routine again, quickly installing a programming software on the computer" I create a new document on the desktop, and assume that this document is a weekly report that the employee has just prepared and is ready to submit to the company! The boss was talking, and he created a document and wrote a few words in the document, "Google Dongyang Office" Li Mingyang watched the boss's every move through the big screen, so far, he still doesn't know where the new technology of Figo security is embodied.

The boss saved the document, glanced at Li Mingyang sullenly, and said, "I won't get more, let's assume that this employee usually only uses these two things, and now I will back up this employee's computer!" ”

After speaking, the boss pressed a button, and the software interface that had disappeared just now reappeared, asking "whether to make a backup"

After clicking "OK", the software displays a progress bar that moves forward evenly, and in less than a minute, the progress bar comes to an end and a new prompt pops up: "Backup completed!" ”

The Boss cleared his throat and pointed to an extra icon on the desktop, "This is the file generated by the backup!" Now, I'll show you what this file can do! The Boss pulled another one out of his bag. disk, said: "I'll move this backup file to." disk, and then let the computer quit. Flashover! ”。

Do this, and the boss will pull it out. disk, came to the second computer provided by Google, "Lee, now please look clearly, and make a note of all the files you see on the desktop of this computer!" ”

Li Mingyang took a look, there were seven or eight files on desktop 1, all of which were common documents, so he nodded and said, "I wrote it down!" ”

"Then I'll order it. Plugged into this computer! After the boss finished speaking, he raised it. The disc shook before it was plugged in...... As soon as the disk was plugged in, the desktop of that computer disappeared and was replaced by one. The connection box of Flashover asks for the employee account number and password. The boss quickly typed in the employee account and password, and the screen flashed, and the screen became a new desktop, and the magic was that it was exactly the same as the desktop that had just been backed up, with a shortcut to programming software and a document file.

The boss clicked on the document and saw a few words written in it: "Google Dongyang Office!" ”

Li Mingyang showed some surprised expressions, and he asked, "Can that programming software run?"

The boss clicked twice, and the programming software was running, and then the editing interface of the program was displayed.

Li Mingyang stood up at that time, walked up to the boss, he decided to operate it himself, strange, this computer obviously did not install this programming software!

When the boss saw Li Mingyang's anxious roar, the anger in his heart disappeared a little, and said, "Li Shang can try to write a program, or modify that document!" ”

Li Mingyang felt that it was a little unreal, so he created a new project in the programming software, and then wrote the most classic code: "Legs, mountains and concaves!" ”

The boss saw that Li Mingyang didn't make any moves, so he pulled it out. disk, the moment it was unplugged, everything on the screen disappeared, and then it was back under the desktop that this computer should have, and the original seven or eight files were still displayed on the screen.

"Let's switch to the first computer!"

The Boss picks it up. disk, slowly pacing to the first computer before, put. As soon as the disk was plugged in, I saw that one appeared on the screen again. After typing in the account password, the familiar desktop appeared again.

Li Mingyang's eyes straightened, it was incredible, and the picture displayed on the screen was unexpectedly pulled out just now. The disk time is not bad at all, and even the cursor of the code edited by yourself is still in the original position, how is this possible!

The boss felt that the narration he had prepared could come in handy again, and said, "Li Shang, this is the first feature of our new technology: anytime, anywhere, mobile office!" Employees' office desktops can be placed in: In the dish, you can also put it on your phone. On the mobile hard disk, as long as it is connected to the computer, it can run automatically, and after passing the authentication, you can enter the enterprise intranet, obtain resources, and carry out the office! ”

Li Mingyang hadn't come back to his senses at this time, and in his mind, he was still thinking about how Figo Security realized this function, whether it was a virtual system, or backing up hard disk data, or some other technology!

"At the moment this is only the first version,. The backup of the staff desktop under the Bis system can only run under the Beagle system, and the same is true for other praise systems, but we will also launch a second version of the cross-platform in the future, so that the backup desktop of employees can run under all operating systems and even run on smartphones, at that time, it is a complete mobile office!. The boss hasn't finished introducing the first version yet, so he can't wait to throw out the second version.

Li Mingyang reacted at this time, what about the second characteristic? ”

"Easy to deploy!" The boss straightened his waist, and the company only needed to be there. As long as one employee can successfully connect to the virtual intranet, the other employees can be successfully connected, no need to install any clients and certificates, and no need to modify any configuration, as long as everyone has a backup, you can easily complete the deployment of the entire enterprise intranet! Enterprises, on the other hand, can focus their efforts on the allocation and management of employee permissions. ”

"How to ensure the security of the intranet?" Li Mingyang asked.

"The biggest feature of our new technology is safety!" The boss emphasized, "I'll show you that!" With that, the boss went back to his notebook, made a shared folder on it, and put an empty text in the folder, and said: "This text, you can think of it as any kind of file, it is an ordinary document, and it is also a conspiracy program, and it is also a virus!" ”

Li Mingyang didn't understand what the boss meant, this is obviously an empty text, how can it be a virus and a spyprogram, but Li Mingyang held back and didn't ask, waiting for the boss to give an answer, and the second boss walked to the first computer provided by Google, typed commands, searched for shared resources on the company's internal flash, and soon, he arrived. Just the shared folder on the server, the boss opened the folder and said, "Now, let's run this virus!" ”

After saying "pop", I saw a prompt box pop up on the screen: "Non-authorized chastity, can't run!" ”; When it was over, the boss tried to copy the text to his desktop, and the prompt box popped up again: "Non-authorized file, can't be backed up!" ”

The boss spread his hands, "See?" Even if viruses and Trojans can enter the enterprise intranet, it is still a decoration, it cannot be run at all, nor can it enter the employee's desktop, only the authorized file can be run! ”

Li Mingyang now understands that the employee desktop that Dong Ge has made safely can only run some kind of certified file, "So how to authorize it?" ”

"We have specialized tools!" The boss took out another disc from his bag and put it in his notebook, that is. On the server, after running, the boss selects the empty text in the ** enjoy folder, and then clicks "Authenticate" and then the empty text becomes an icon, which is the same as the icon generated by his previous backup of the employee's desktop.

The boss left that head and went back to Google's first computer, "Let's take a look now!" With that, he ran the icon in the shared folder, and it opened smoothly, just empty text.

The boss turns off the text, copies it, and when the icon arrives on the desktop, it's... It's become an empty text document instead of an icon.

Li Mingyang was dumbfounded, it was amazing, he couldn't figure out what kind of backup technology this was, and he merged the two backup files in an instant.

"The backup tool on the employee's desktop and the authorization tool on the server are the same, and if they don't match, they still can't run!" "And the tools are unique for each company, and there is no duplication, which ensures that the information is unique to each company." ”

"Is this how the employee's desktop is updated?" Li Mingyang asked.

"Yes!" The boss's eyes lit up, and he said that he hadn't wasted his saliva for half a day, and Li Mingyang finally got the hang of it, "Using authorization tools, and then cooperating with the permissions of employee accounts, you can achieve accurate separation between office software and enterprise information." Employees can add the necessary tools and materials to their desktops through the company's server, and upload their progress to the company's server. At the same time, no external tools and information can enter the enterprise flash, which ensures the high purity of the company's flash! ”

"Moreover, the standard desktop backup file, once the data is written by an employee, then the next time you open it, you have to match the employee's account, if it does not match, it still can't run, the probability that the hacker can get an employee's desktop and account at the same time, is almost zero, if you use other ways to form a composite verification, such as SMS verification, then the hacker wants to enter the enterprise from the employee, it becomes an impossible thing; As for the authorization tool, there is only one upper order, but we are opening multiple encryption technology, and in the future, the authorization authentication of any data and tool will go through at least three links, so as to avoid hackers from coming from within the enterprise to the greatest extent. ”

The boss was a little anxious, so he had to listen and take a breath, "Also, the data communication on the intranet is all encrypted and cannot be monitored!" Therefore, the most important thing for our new technology is safety! ”