051 press conference

Who will solve our cybersecurity problems? Obviously, the questions raised by Wang Zhengyu's opening remarks are a bit big, and the big ones make the emotions of the people on the scene become polarized, either scoffing at them, or looking forward to the next content.

However, Wang Zhengyu ignored these, and did not give an answer directly, but began to operate on the notebook.

"This is a normal Lenovo laptop with the in7 operating system pre-installed on it, and it is an in7 system that has not been installed with any Microsoft patches." Wang Zhengyu operated the computer and showed the situation of the entire system to the big screen behind the whole system in front of everyone in the audience.

"Now this computer is connected to the public ife provided by Qiandu without any security measures, let's see, the Ip of the route allocation is, 192.168.1.187, I think in the eyes of hackers who know a little bit of intrusion technology, this is a perfect broiler. I didn't set a password, I didn't have any security software, I hadn't even patched the patch provided by Microsoft for half a year, and I even announced the IP address! So is this really the case? ā€

Wang Zhengyu once again threw out a question, but this time he did not leave time for everyone in the audience to think, but said loudly: "Now I invite Mr. Qian Xiaohua, vice president of the Huaxia Software Association and chief engineer of the Second Research Office of the Ministry of Electronic Information Industry of Huaxia who is sitting in the audience, to give you a live demonstration!" ā€

After speaking, Wang Zhengyu took the lead in applauding.

This is the link that has already been discussed in this conference, and Qian Xiaohua will naturally not refuse. Directly walked to the rostrum amid applause.

"All of you here today are people in our IT industry, and when I came here just now, I took a casual look, and eighty percent of them were familiar faces, so I won't say much nonsense. I'll just get started! Qian Xiaohua smiled and said a few words to the audience, and then walked directly to the other projector on the stage, a computer that had been prepared was placed there, and the large screen behind it was immediately divided into two, showing the display screens of the two computers.

"As you can see, this computer has two of the most commonly used scanning and intrusion software for Chinese hackers, as well as a hacking software specially opened by our research team to test the security of the system. Now, I'm starting to hack into the computer across the street in the usual way! ā€

Then Qian Xiaohua began to cumbersome operations. While operating, Qian Xiaohua is still explaining the idea of invasion, including the use of system vulnerabilities, software vulnerabilities, router vulnerabilities, etc...... This is just a repetition of Liu Hongwei's failed operation in his real room, so there is no doubt that these attempts have all failed.

In fact, when Qian Xiaohua was unable to successfully invade in two ways, the knowledgeable people in the audience began to talk about it, and even many people with computer equipment had already started the invasion operation by themselves in the audience, and the result was of course conceivable.

Half an hour later, after trying all the methods and failing to invade successfully, Qian Xiaohua stopped what he was doing. said: "Everyone has seen that it stands to reason that such a computer, an experienced hacker only needs a few minutes to fully control it, but I have used all methods, but I have never been able to hack into this host." In fact, as you can see from my operand, when I tried to hack this host, many colleagues in the audience were also trying, and you can see what the result is! ā€

After saying this, Qian Xiaohua paused before continuing: "Actually, what I did today has been proven in our real yĆ n room, and even what we have done in our real yĆ n room is even more excessive than now, we have even implanted a Trojan horse on in7, but we still can't successfully hack into this computer." As for why this is so, Mr. Wang Zhengyu will continue to explain it to you. ā€

Qian Xiaohua's words fell, and the audience was in an uproar.

As Qian Xiaohua said, most of the people on the scene today are successful people in the industry. They naturally knew Qian Xiaohua's weight in the industry, and they were even more puzzled by the results of this on-site invasion demonstration. Why did a new system come up with an IN7 system without any security measures first? But this system full of vulnerabilities can prevent the intrusion of a top programmer? At this time, everyone's eyes were focused on Wang Zhengyu.

"Thank you, Qiangong!" Wang Zhengyu thanked Qian Xiaohua, and then pressed twice on his notebook to switch to the operation interface of the dragon shield system.

"This is the Dragon Shield operating system opened by our Tianshu Technology! As you can see, the system itself doesn't have any apps installed, and it can't support any apps, but it does allow other operating systems to run on this system without any problems. Of course, not only the indos series system is supported, the unIx system can be installed on this system at the same time, and the two systems can be switched at any time. ā€

Wang Zhengyu installed an unIx system that had been prepared on this notebook at the same time, and after the installation was completed, there was suddenly an unIx system icon on the operation interface of the Dragon Shield system. Double-click to enter, and the unIx operation interface is displayed on the large screen behind it.

"Of course, this is not only between indos and unIx, you can also install another indos system, and they can also be switched between them at any time." Wang Zhengyu said, his hands were also moving, and another in7 was installed on this computer. Then Wang Zhengyu began to switch back and forth between the three systems.

After demonstrating this function of the dragon shield system, Wang Zhengyu continued to speak: "This dragon shield system is an operating system specially designed for network security, but its role is definitely not only in its security, but also in the convenience shown now. In fact, after installing our Dragon Shield system, the efficiency of other operating systems can also be greatly improved. Now I want to hire a money worker again to conduct a professional test for us on site! ā€

After Wang Zhengyu finished speaking, he bowed to Qian Xiaohua again.

"Okay, actually, that's what we've already tested in the real room. In order to show it more intuitively in front of everyone, we have specially prepared an identical laptop, also with the in7 operating system, here for you to do a professional test! ā€

Qian Xiaohua's voice fell, and the staff sent a Lenovo laptop that was exactly the same as Wang Zhengyu.

"First, let's take a look at the working status of the CPU after two computers run the same software."

Qian Xiaohua began to run a large test software similar to 3DMax on two laptops at the same time, and even without the test of professional software, he could distinguish the advantages and disadvantages of the operation of the two computers with the naked eye.

A series of tests followed, and Qian Xiaohua announced at the end: "As you can see, according to the results obtained by all the numbers, after installing the Dragon Shield operating system, the operating efficiency of the in7 system has increased by a full 38%, which is not possible with any optimization software at present." ā€

"Finally, I would like to say that this Dragon Shield system is very different from other operating systems we have been exposed to in the past, although it needs other operating systems to support the application, but that does not prevent it from being a great system! At the very least, it's definitely the most secure system out there! ā€

After speaking, Qian Xiaohua nodded at Wang Zhengyu, and walked directly to the stage. left the entire rostrum to Wang Zhengyu alone.

There was already an uproar in the audience.

By this time, everyone had roughly understood what kind of operating system Longdun was, and they were also amazed at the performance of this system.

Whether it's its security or the optimization of other operating systems, it proves that it is excellent. What's more, it is also very convenient to use, after watching Wang Zhengyu's demonstration, only a system backup is needed, and a new operating system can be generated under this system at any time.

How convenient it must be! In the future, a computer, one system for work, another system for entertainment, the two can be switched at any time without barriers, all you need is to press a set of shortcut keys, and click twice with the mouse.

Of course, not being able to support apps is its weakness. But if you don't look at Dragon Shield as an operating system, this is an excellent software. Discerning industry insiders can naturally see the potential market value of this system.

In particular, this system is the same company as the founder of the voice-activated intelligent housekeeper, and the commercial gimmicks contained in it are enough to make countless people reverie.

Those media people who don't know much about the operating system can draw the conclusion that after using Dragon Shield, the system can be faster, more convenient, and the safest after using Dragon Shield.

"Alright, thank you again!" Wang Zhengyu bowed slightly to Qian Xiaohua's position, and then continued: "Today, the dragon shield system opened by Tianshu Technology has been introduced to you. Of course, there may still be people at the scene who doubt that today it will be a double reed that we colluded with Qian Gong to sing, right? ā€

Wang Zhengyu's words caused a burst of good-natured laughter from the audience, as long as you are in the industry, you naturally know that it is impossible for Qian Xiaohua to do such a thing.

"But it doesn't matter, we have prepared a hundred computers with the Dragon Shield system installed, and you are welcome to experience it for yourself! Finally, I have one more thing to announce, this laptop installed with the Dragon Shield system, will be hung on the public network, the public IP of the computer will be announced after the meeting, we welcome anyone to hack into this computer, as long as the invasion is successful, leave evidence on this computer, and screenshot proof, we will come up with a cash reward of 100 million yuan! ā€

Tips: The new domain name "biquge.info" has been launched by Biquge, and the original domain name is about to be discontinued. Please tell each other, thank you!