Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 34

Because he was thinking about the machine ant, when he went back to sleep, even if Xixi, the little girl, was wearing a cover, hugged Huo Xiangkong, and Huo Xiangkong was relatively calm, which made a friend feel secretly proud: It seems that we still have the potential to be Liu Xiahui.

During the day, Huo Xiangkong and Xu Fei went to work in Huo Network Technology. In fact, according to Huo Xiangkong's idea, he didn't want to come, but Dong Jie urged him to get the security guard out as soon as possible because she and her father Dong Minxin had already started contacting their connections.

When contacting the military, Huo Xiangkong was still a little pounding, so in terms of design, Huo Xiangkong did not leave any secret doors to avoid being discovered by experts.

According to Huo Xiangkong's design, the security guard currently developed has functions such as network interception, computer monitoring and network speed optimization. Among them, network interception is to automatically call other computers or servers that are not attacked for support when the hacker's firepower is too strong. Of course, this call is written into the user agreement. If the user does not agree, Huo's security guard will not be able to install. Of course, Huo's security guard also emphasized: it will never infringe on user privacy and will definitely not affect the user's network speed.

Considering that network interception may cause everyone's concern, Huo Xiangkong also sets fool-style programs and code control in computer monitoring, and users can set permissions of system programs and common software. In addition, any code program will be intercepted when it runs. In Huo Xiangkong's words, it is: let users be the real owner of the computer.

These functions are supported by the Fairy House system, so Huo Xiankong was not worried about technology leaks. He had to write the core program well and handed them over to the former military computer elites who had already expanded to the 30-person technical department.

In fact, what they are responsible for is appearance design, extension functions, etc., and their role is similar to the relationship between whimsical official program developers and whimsical plug-in template author developers. Huo Xiangkong and whimsical official program developers provide core programs, and then reserve embedding points for extended function development and template development.

Zhou Shengjun is currently the head of the technical department. The reason why he can become the head of the technical department is not because Huo Xiangkong is keen on a hero, but because Zhou Shengjun was the head of the Jiangnan Military Region Cyber ​​Security Force before.

Zhou Shengjun was actually a little reluctant about the old leader who arranged them to work here. After all, the gap between the head of the company's technical department and the head of the military's cybersecurity force is still very large. Therefore, although Zhou Shengjun didn't say anything on the surface, he was very dissatisfied with Huo Xiangkong. This kid seemed to be around 20 years old at most, probably without any extraordinary skills.

However, when Huo Xiangkong took out the security guard and explained their tasks, Zhou Shengjun was shocked and could not be attached. Zhou Shengjun's first reaction was that this kid must be bragging. How could he develop such a powerful security software alone?

Zhou Shengjun, who was dissatisfied, agreed on the surface, but thought in his heart that he must find out the fatal shortcomings of this software and teach this innocent boy a lesson so that he would not think he was as NB and as powerful as he was.

Under Zhou Shengjun's mobilization, all programmers were trying to improve the appearance design and function expansion development of security software. At the same time, they were also carrying out various viral attacks. However, after three days of busyness, they only succeeded once. This time, the network defense function was removed. Once the security guard has a network protection capability, it will be greatly enhanced. After testing, this network interception has no influence on other security guards. On the contrary, during the network startup, the system also accelerated the network, and the corresponding speed of the user's website was also strengthened. After various detections of computer monitoring, the security guard did not spy on any of the user's privacy.

Huo Xiangkong didn't know that Zhou Shengjun was competing with him, but he felt that these people were really serious and hardworking in their work. Therefore, three days later, Huo Xiangkong broke the story of the backdoor of the Microsoft system to them, and after giving technical support for the core program, he handed over the specific implementation and other work to them, which was a real test for them.

Originally, Huo Xiangkong planned to name this security guard Raozhou Guardian 2.0 enterprise version, but both the technical department and the Raozhou community operation team led by Wang Juan strongly opposed it. In their words: This name is too rustic and not enough to show the domineeringness of this software.

The ultimate name of the security guard was named: Yanhuang Guard. Yanhuang is the abbreviation of the Yanhuang Republic and is also the national name. It is named Yanhuang Guard, which means protecting the network security of Yanhuang Kingdom. It also uses this to express the ambitions of Huo's Network Technology Company to the world.

Two days later, Huo Xiangkong and Dong Jie, Dong Minxin and his daughter went to the Jiangnan Military Region headquarters together. According to Dong Jie, after learning that this incident was protected by former Jiangnan Military Region Commander Dong Minxin, the Jiangnan Military Region attached great importance to it. In addition to promoting Yan Huang Guards, this time, he went to the military region headquarters to explain the Microsoft backdoor incident in detail.

For this reason, Huo Xiangkong specially brought Zhou Shengjun over. This guy's previous persuasion in the Jiangnan Military Region was better than that of himself, the boss of Huo's network technology company. It is most appropriate for him to demonstrate the functions of Yan Huang Guardian and events such as Microsoft's backdoor.

Since Dong Minxin had repeatedly asked Huo Xiangkong to participate in this meeting for security reasons, the military only brought the security person in charge of the internal military network in addition to the commander and political commissar.

After some politeness, Zhou Shengjun began to demonstrate that in order to increase authenticity, the security person in charge of the military's internal network was responsible for the attack, while Zhou Shengjun installed Yanhuang Guard on an ordinary website server designated by the military on the spot.

Since this website was designated by the military, the cybersecurity manager naturally understood the loopholes. He first carried out a regular attack. If this attack scale was usually enough to break the website, it would not work today.

The follow-up incident made the person in charge sweat gradually. He was busy for more than an hour and even used the virus tools he had prepared before, but he still did not break through the website.

Although he was not convinced, the person in charge was also open-minded. When the commander asked about it with the political committee, he honestly replied: "Report to the leader, Yanhuang Guards are better than Yanhuang Kingdom and then a known website protection software."

"What if it is compared with the protection system within our military?" the commander asked in a deep voice.

"It's not on the same level at all..." Hearing this, the commander nodded with satisfaction, but the person in charge said: "If they initiate the network interception, then the protection system within our military is simply a slag and has no comparison."

The commander [member] who was ready to comfort the old leader almost choked to death after hearing this. Despite this, his face turned red. The look of trying to say but forcibly holding it back was indescribable. The others were probably saying that they did not laugh because of his identity, but Dong Jie laughed ignorantly, which made the commander embarrassed. However, he was the daughter of the old leader, so he could only glar at the person in charge.

Even though he was angry, the commander still believed the words of the person in charge. This person has been in the army for more than ten years and has always been known for his serious work. He is still very reliable in terms of major issues. Since he said that, the Yanhuang Guard must have such strength. Even if there is a difference, this guy will only say that it is low and not overestimate.

"What about Microsoft's backdoor?"

"We can only intercept the information sent out by the backdoor in terms of information." Zhou Shengjun said with some shame. This function was found when Huo Xiangkong first reported the Microsoft backdoor incident to them.

"This backdoor almost penetrates into the bottom layer of Microsoft's operating system. All we can do is to treat the symptoms at present. If we want to solve the root cause, it needs to be repaired from the bottom layer. With our current capabilities, we cannot do this." Huo Xiangkong said.

As the saying goes, the gun strikes the first bird. The words of the military's internal cybersecurity officer have made the commander and the political committee a little unhappy. At this time, timely revealing one's shortcomings and external threats can play a role in diverting attention.

"Mr. M is just unreliable. It would be great if our country had its own operating system." After saying that, Dong Minxin patted Huo Xiangkong on the shoulder and said, "Xiangkong, how many years would you take if you were asked to develop an operating system?"

"Puff!" Huo Xiangkong was almost choked to death by Mr. Huo's words. He was still suppressing himself. Why did you throw such a big hat at me? Thinking of this, Huo Xiangkong smiled bitterly: "Unless you break the existing computer operation mode and carry out the computer revolution, as long as you stay on the graphics computer operation interface, you will not be able to escape the shadow of Microsoft. Even if we develop software and hardware compatibility, it is a big problem. People are not compatible with us and the market does not recognize us. No matter how good our products are, it will be useless."

"The difficulty is great, but the more difficult it is, the more we have to work hard to overcome it. The future world is a world where technology determines the outcome. People are increasingly inseparable from the Internet. If we cannot create our own network [nuclear] weapons, then the network security of the entire country will never be safe." Dong Minxin said in a deep voice.
Chapter completed!
Prev Index    Favorite Next