Chapter 288: I can only huddle together to keep warm

Before the launch of the Dragon Scale Security software, there was already a lot of news about this software on the Internet.

After all, the day before yesterday, only Phantom Immortal Technology did an earth-shattering thing, gorgeously slapped hackers all over the world in the face, and it is said that the prop used is this dragon scale security software.

Especially in various forums about cybersecurity, dragon scale security software has always been the hottest topic.

Most people are looking forward to this software, and even think that it will be a turning point in the era of information networks. After that, hackers will become history, and viruses will become spicy chicken......

These are all applauding voices.

However, there are also voices of decline on the Internet, thinking that what Phantom Immortal Technology said about relying on dragon scale security software to resist hacker attacks around the world is completely grandstanding, and it is impossible for a software to achieve such an effect.

The reason for such a result may be that Phantom Immortal Technology has adopted some unknown means.

However, now that this software comes out, the voice of decay disappears in an instant.

The first thing that countless professionals do after downloading the software is to test whether the software is as powerful as they imagined. As for whether the image of this software is cute, it is not within the scope of attention of these program apes.

In their opinion, no matter how cute something is, it can't compare to that perfect line of code.

The results of the experiment made them excited and confused!

The computer with the dragon scale security software installed is in front of you, and the vulnerabilities on it are still those vulnerabilities, and the viruses sent in the past are also those viruses, but the special thing is that you can't get in, so you can't do it.

So far, none of the heroes on these forums have dared to claim that they have broken through the software's defenses.

Even on the forum of the website with the largest concentration of top hackers, the Hand of Satan, all the guys who thought they were masters also collectively lost their voices.

Many of them have also participated in the previous action against Phantom Immortal Technology, and there are also many people who are very unwilling to their own failure, thinking that Phantom Immortal Technology has made a ghost.

Now that Phantom Immortal Technology has released the software, and it is open for download, how can they not act as soon as possible to slap Phantom Immortal Technology in the face by breaking this software?

However, the fact that there was no sound for several hours is telling.

This is definitely the most powerful security software in the world today, if it is not for its relatively single function in terms of security protection, I am afraid it can completely replace a series of network security devices such as hardware firewalls and intrusion gateways.

However, at present, although the dragon scale security software does not have this function, who dares to say that Phantom Immortal Technology will not add these functions in the future?

When the time comes, there will be a large number of network security service providers crying and fainting in the toilet.

If dragon scale security software makes most people feel that they are not disappointed, then the outstanding performance of this software in terms of intelligence makes everyone's heart pound.

The first thing people understand when they come into contact with this software is not its security, but its intelligence.

At present, there is no real indicator to measure the intelligence of a software, but people have unanimously given Dragon Scale Security Software an evaluation: it is not inferior to others at all.

Whether it is the logic of "he" in the dialogue, or the adaptability he shows when dealing with problems, it is amazing.

An hour after the launch of the dragon scale security software, the major online media took the lead, and news was quickly put on the portal.

"Pandora's box has been opened! β€”β€”Xinlang News.

"With the emergence of strong artificial intelligence, where is the way out for mankind. - Tencent News.

"Phantom Fairy Technology is stirring up the scene again, and the biggest dark horse has appeared in the field of artificial intelligence!" - Phoenix News Network.

At this moment, few people pay attention to the functions of dragon scale software in terms of network security, and more focus on the intelligence that this software has.

The mainstream media is still very strong in the guidance of public opinion, and the hot topic of people's discussion has been shifted to artificial intelligence almost immediately.

Anyone has a scale in their hearts, and no matter how powerful the network attack and defense methods are, they are not as important as real artificial intelligence.

At the same time, many people are also vomiting in their hearts, since Phantom Immortal Technology can make such a powerful artificial intelligence, why do you only get a network security software?

Even if you make a robot that can't even walk, you just need to have this super intelligence, and it can sell for a sky-high price.

How much can you sell for such a security software now? Even if there will be a fee later, how much is the right amount to charge?

However, there are many fewer people who vomit bad this time than before, and everyone is used to it.

These violent things have been done a lot by Phantom Immortal Technology before, and this one is not bad.

......

In Kyoto, China, at the headquarters of Qihu Company, a group of people sat around the conference table, with sad faces.

Sitting in the most central position is Zhou Hong, chairman of Qihu Company.

Since the 90s of the last century, a large number of magical Internet companies have been born in China, especially the three most typical of BAT, which have become the business cards of domestic Internet companies, and now they have even become well-deserved international Internet giants.

And Qihu Company, although it is a cut behind these three companies, is also the leader of the second echelon.

Its chairman, Zhou Hong, is only over 40 years old, and he can be described as in his prime. Generally speaking, there are few things that make him so distressed, including the famous 3Q war that year, and Zhou Hong also showed half a bit of cowardice.

But now, Zhou Hong really feels at a loss.

"Can't you really crack it?" Zhou Hong suddenly raised his head and once again looked at Wang Tao, the company's technical director who was sitting in his starting position.

Wang Tao smiled bitterly: "Mr. Zhou, we have done our best. In the past, no matter how complex the software, it may take us a lot of time to crack it, but we can at least find the direction of our efforts when we get it. But for the dragon scale security software of Phantom Fairy Technology, we studied for most of the day, in addition to figuring out the outer code, the core code file inside is like a smelly and hard stone, and there is no way to start. ”

The corners of Zhou Hong's mouth flashed with a trace of bitterness, these words had already been said to him by Wang Tao just now.

But what's the use of the outer code? It's just a setter, and it's meaningless.

"It's really aggrieved, why is it at this juncture?" Zhou Hong, who thought he had a good cultivation, couldn't help but burst into a foul mouth.

This is not to blame him, who let this time be too fucked up? Recently, Qihu Company is preparing for a backdoor listing, and as shareholders of the company, which of them does not want the company's stock price to rise sharply after listing?

Now this incident is definitely a huge blow to the company.

"What about Silver Mountain? Did they finish cracking the software? Zhou Hong asked.

Wang Tao said: "We know the ability of those people in Yinshan Company, the level is about the same as ours, and it is almost impossible to crack this software. ”

Zhou Hong glanced at the people in the office and said: "Ladies and gentlemen, the reason why our company can become a first-class Internet company in China is because we have advantages in the field of network security that other companies cannot match. Whether it is the number of users or the reputation of users, it has completely exploded other companies. At present, we also have in-depth cooperation with major government and enterprise institutions in this field, and even a lot of foreign business has been carried out. Originally, according to our advantages, the stock price would inevitably skyrocket after listing. But now, because of the dark horse of Phantom Fairy Technology, our listing plan may be ruined. Don't you have any good opinions on that?"

"Why don't we find a way to get our hands on each other's source code?" said a middle-aged man with a rather cold face.

Almost everyone looked at him with disdain, and everyone knew what he meant by finding a way. However, what they despise is not that the other party's methods are dirty, but that they are stupid.

The source code of a software is undoubtedly a trade secret, and if the source code can be easily obtained from Phantom Fairy Technology, it is estimated that this company will not be able to develop to this scale.

The secrecy of Phantom Technology in terms of technology is definitely in the forefront of major companies in the world today.

Among the current rumors about the technology of Phantom Immortal Technology, the most convincing thing is that all the core technologies of Phantom Fairy Technology are only in the hands of Shen Bing. If you want to get these techniques, you can only start with Shen Bing.

However, is Shen Bing so active?

Zhou Hong is not an ordinary person, so he naturally knows some things that ordinary people don't know, whether it is Phantom Immortal Technology or Shen Bing, they can't be moved.

A capable woman sitting next to Zhou Hong said, "We don't need to be antagonistic to Phantom Immortal Technology, and cooperation is also a good choice." ”

"How is it possible to cooperate? Security software is no more exclusive than others, and if their market share is high, we will naturally reduce it. Zhou Hong said.

It's a fact that you can't always install two antiviruses on one device, right?

"The cold winter in the world network security field is coming!" Zhou Hong sighed, "I can only huddle together to keep warm." ”

Zhou Hong didn't see far enough, this is not only the cold winter of companies in the field of network security, countless information technology companies in the world are trembling for it, the intelligence shown by the dragon scale security software represents that it has endless potential, no matter which field Phantom Fairy Technology puts it into, it will blow stormy waves.

Even Apple, the world's largest market capitalization, is currently holding a special meeting to study and discuss the launch of this software.

However, the atmosphere of their discussion was different from that of Qihu, and Apple's meeting was generally pleasant.

They have two topics, one is how many users this dragon scale security software will have after it is launched, and the second is how to cooperate with Phantom Fairy Technology.

Apple has a pride of its own because they have the most complete software ecosystem.