Chapter 270: Another Industry Has Been Plagued
Wang Sheng paused slightly when he said this.
The reporters below looked confused, what is the situation?
Your company has made gratifying achievements in the field of network security, and when did Phantom Technology enter the network security industry?
Wang Sheng didn't wait for these people to ask questions, and continued: "Yesterday afternoon, the server that installed our company's dragon scale security software has endured a collective attack by tens of thousands of hackers around the world, and has always ensured the good and stable operation of our company's official website. I believe that some friends present can confirm this. ”
The reporters below began to buzz about it, and this was extremely exciting news.
When Phantom Technology revealed that it would place technical data such as room temperature superconducting materials on the official website server, people were speculating about what the purpose of Phantom Fairy Technology was?
But no one guessed the point.
It is precisely because they can't guess that most people think that the brains of the high-level of Phantom Immortal Technology are caught by the door.
Now after Wang Sheng said this, they suddenly realized.
At this moment, they were deeply shocked by the generosity of Phantom Fairy Technology, in order to test a security software, they actually took priceless technical data as a bet, who in the whole world can do it?
Their self-confidence from the bottom of their hearts and their domineering spirit made all the domestic reporters present can't help but praise in their hearts.
It is worthy of being a young people-led enterprise, and it is indeed an unusual path.
"Your company claims to have been attacked by tens of thousands of hackers around the world, what evidence do you have?" This is a reporter from the country of sticks, and he never wants to admit that Huaxia has become powerful. Uh-as long as it is the powerful part of Huaxia, it must have been stolen from the Stick Country.
Wang Sheng smiled as if he didn't mind, and said, "Of course there is evidence!
As his voice fell, a picture appeared on the screen on his side, showing rows of data and pictures.
"This is what our dragon scale security software records, some are screenshots, some are data. This includes not only the IP address of the attack, but also the time of the attack and the attack method. By the way, this journalist friend is from the country of sticks, right? There are also people from your country involved in this cyber attack, and you can see that these addresses are all from your country. You don't need to say hijacking broilers or anything, our dragon scale security software can trace back to the source and directly find out the IP of the attacker. It's just that not long after this group of people in your country entered, they were defeated in the melee. Of course, our company will still make solemn representations to your country, and such criminals who destroy the cyber environment must be severely punished. Similarly, we also have such people in our country, and our company will also respond to the relevant state departments and request relevant investigations. ”
The reporter from Bangziguo obviously didn't know much about the Internet, and in the face of the data put forward by Wang Sheng, he was stunned on the spot, and he didn't dare to continue asking, for fear that he would make a low-level mistake as soon as he opened his mouth.
Wang Sheng continued: "The scale of the attack on our company and the level of personnel involved in the attack are unprecedented in the world. You can see this in the tricks we've shown. Of course, many of you may not know much about cyber attack and defense, so we are prepared to copy this data back and have a professional study it. I think a lot of these techniques are valuable for most people. ”
A British reporter stood up: "May I ask Mr. Wang, is this dragon scale security software independently developed by your company?"
Wang Sheng smiled slightly, full of aura, and said: "Of course! This is a product developed by our chairman and the company's relevant R&D personnel for a long time, uh, three months, and I believe that there is no similar product in the world." ”
Wang Sheng's ability to brag about not blushing is getting better and better, and the ghost knows how long it took the chairman to develop this thing? But in order to make this thing more valuable, it is natural to say that the research and development time is longer.
However, it has been more than half a year since the establishment of Phantom Immortal Technology Company, and even if it is blown again, it will not be long enough, so it can only be made up for three months.
But these words caused a great shock in the hearts of the media friends below.
Why don't you go to heaven when you make up security software that has beaten hackers all over the world in three months? If you say this in front of media reporters all over the world, won't you offend companies in the field of network security all over the world?
It's like saying: I'm not saying which cybersecurity company is your spicy chicken, but saying that the whole world is engaged in cybersecurity......
Not only that, how many hackers are hidden in the secret in the world? If you press each other to the ground and rub them now, I'm afraid that no one will feel comfortable, and Phantom Immortal Technology will also want to be quiet in the future.
However, except for some mainland reporters in China, no one else at the scene showed the slightest worry about Phantom Fairy Technology.
Wang Sheng's words undoubtedly cater to their hearts, and only when such a report is sent out will it be more sensational, and they will be rewarded more.
"May I ask Mr. Wang, you mentioned this dragon scale safety product today, are you preparing to bring this product to the market?"
Wang Sheng replied with a smile: "Of course, this is the first step for our Phantom Immortal Technology Company to enter the information network industry. In fact, at the beginning of the establishment of the company, our chairman planned to enter the information network industry, but due to various factors, the boss decided to take the industrial route first. ”
Well, another bite of dog food.
"Is your product reliable?" said a CNN reporter.
Wang Sheng said: "Regarding the reliability of the dragon scale security software, I think this has been verified. Not to mention the internal tests conducted by our company, just this attack launched by tens of thousands of top hackers and hacker groups in the world, kneeling so thoroughly in front of our security products, you can get a glimpse of the power of dragon scales. In the words of our chairman, our dragon scale security software is indestructible! To be responsible, if your traffic management system in Washington, D.C., adopts our products, there will definitely be no cyber security incident. As far as we know, your accident this time is completely due to those people who failed to please our company's official website, and turned around and found a punching bag. ”
The bottom was suddenly dumbfounded, and this special thing sounded like a slap in the face.
It feels like two big men fighting, one person loses miserably, but he is angry, and he beats the little fat man on the side of the road with his hand.
The CNN reporter was speechless, this time the matter in Washington, D.C. is indeed too big, and the whole world knows it.
Please two things happened on the same day, there is no on the side of Phantom Fairy Technology, but Washington's traffic management system collapsed instantly, how can this be refuted?
A Chinese reporter then asked: "According to what you just said, Mr. Wang, is your company's security product just an enterprise-level security product?"
Wang Sheng said: "No! This is a universal product for all platforms, whether it is a server, a personal computer, or even a mobile phone, we can use our products, and they are all the same installation package." In addition, preventing network intrusions is just one of the most basic functions of our product. Its most powerful app, and one that our R&D team spends the most energy on, is its application on mobile phones. ”
"I'm afraid that everyone here hates Internet fraud, right? Scam calls, text messages, phishing website links, who has not been victimized? And our software can completely eliminate this situation. Wang Sheng said confidently.
The reporters present were stunned, Mr. Wang, are you sure you didn't say anything?
Not to mention that online fraud is a worldwide problem, just the aforementioned universal use of all platforms makes people feel untrustworthy.
As we all know, the software installation package of mobile phones and computers is completely different, and even mobile phones are divided into Android and ISO systems, and you say that you can install a software package on all platforms, which is completely contrary to common sense.
This question was raised for the first time.
Wang Sheng said: "This is actually very easy to verify, we can test it on the spot." ”
The process of testing is very simple, just install the same software package on your phone and computer.
Outcome...... Nimei, it's really good.
These reporters have nothing to say, and everyone is now in a state of unconsciousness.
I don't know why, but it's amazing.
Then Wang Sheng asked everyone to personally test the function of preventing Internet fraud, and I have to say that these reporters are all jokers, making up all kinds of deceptive jokes to fool this security software, and the results are all identified without exception.
Although all the reporters were puzzled, Phantom Fairy Technology had no obligation to explain the principle.
......
In the following day, Phantom Fairy Technology ushered in a large wave of free advertising, and the world's major media reported on the press conference of Phantom Fairy Technology, and focused on the dragon scale security software.
Ordinary people may not be aware of this situation, but those who participated in this cyber attack, or know something about it, can only feel shock.
Deeply shocked!
What security software in the world can completely eliminate hacker inreach?
If there really is such a thing, then everyone doesn't have to be a hacker, and they don't do it at all.
But Phantom Fairy Technology also said that its official website will always be protected by dragon scale security software, and the technical information will always be placed on the website server. If you have the ability, you can continue to come to the door to find trouble.
Some people will say that the data will not be safe on the server, no matter how powerful the dragon scale security software is, it can only prevent external intrusion, if there is an internal ghost, then it is not easy to copy the data away?
Wang Sheng also explained that this information is specially set up through the dragon scale security software, and it cannot be copied unless the core of the dragon scale security software is cracked.
And its highest authority is only in the hands of Shen Bing, chairman of Phantom Immortal Technology.
It's all about that security software!
Now network security companies all over the world have a sense of being on their backs, and if they don't crack the dragon scales of Phantom Fairy Technology, they will find it difficult to survive in this industry.
I have to say that Phantom Immortal Technology has once again acted as a-stirring stick, and another industry has been plagued by it.