my return 2002
Chapter 134 Security Guard
Chapter 134 Security Guard
2003 was a year when the Internet pattern in the mainland quietly changed. Just as the fierce battle between 17173 and Duowan was in full swing, Baidu’s mainland users had quietly surpassed Google and became the number one search engine in the mainland. It was also at this time that 360 search relied on 360 browser got 5% market share.
It was also in this year that Taobao was born, Penguin launched the membership value-added service QQ Show, and Lianzhong cooperated to launch the QQ game.
The three major portals are still struggling to find a profit model, but unfortunately, except for NetEase, they are all caught in a vicious circle of continuous development of new businesses and shrinking users.
For Shen Lang, 2003 was also an extremely fulfilling year. During this year, Inspur Technology's browser business grew rapidly, with the number of users exceeding 200 million, and the number of users of 360 Smart Pinyin Input Method exceeded 1 million. Becoming the well-deserved NO360 in the market also provides a user base for the entire [-] system.
NetDragon's Internet cafe management system has covered 10 Internet cafes across the country by the end of October, not far from Lu Bin's goal of [-].
Duowan Games has firmly established itself as the second place in the game community field, and is launching a sprint towards 17173.
A small ecological chain has quietly formed, but if this ecological circle wants to continue to grow, it must be filled with enough core products with higher user stickiness.
On November 11st, when Shen Lang just came to the company, Lin Yong found him excitedly. Seeing his expression, Shen Lang's heart beat wildly several times.
"Have 360 security guards been made?"
"Yeah." Lin Yong nodded fiercely.
Without saying a word, Shen Lang dragged Lin Yong to the office area next door. Different from the past, these aloof hackers looked at Shen Lang with eager eyes. They had been in Inspur Technology for more than half a year. The products of other project teams have been launched one by one, and they have received rave reviews. They are actually quite envious.
It's just that these guys usually hide it very well, and for these paranoids, they haven't made a product that satisfies them, and they don't even bother to make a test version.
In Lin Yong's words, these guys are Mensao.
If it was a different boss, it would have been a blast, but Shen Lang gave them enough patience, hardly asked about the development progress of the project for more than half a year, and gave Lin Yong's team sufficient development time and a sufficiently flexible working atmosphere.
In the beginning, Inspur Technology originally had a clock-in machine, but after this gang of hackers came, the clock-in machine became a decoration completely, because not many of these gangsters had the same work and rest time as normal people, and night owls accounted for most of them. Most, gradually, other project teams also got used to not checking in.
Under the eyes of everyone, Shen Lang came to Lin Yong's desk, and there was a solitary shield icon in the center of the computer screen.
Shen Lang grabbed the mouse and double-clicked with the left button.
Soon, a homepage of this program appeared on the screen. The interface was very simple. There was a shield icon in the middle, and four smaller icons below: real-time protection, powerful antivirus, Trojan killing, and security tools.
Shen Lang glanced at the crowd, and then under their earnest gazes, he clicked on the real-time protection button.
The screen flashed, and the program started to work, analyzing the "health status" of the computer, but Shen Lang frowned when he saw this.
When everyone looked at Shen Lang's face, they couldn't help but feel a little puzzled. This function was already quite perfect in their opinion. Not only could they check out the computer's loopholes and repair them, but it was also very fast, taking only one minute in total. Others on the market Antivirus software can't do it.
Shen Lang spread his hands and said to everyone: "I know this function is very powerful, but you have overlooked one thing. The entire process of finding and repairing vulnerabilities is completed within the program. How do users know what problems their computers have? ?It’s like a question, only the question and the final answer, who can know the effort we put in to understand this question?”
Lin Yong and the others were stunned when they heard the words, they really hadn't thought about this question.
"Virus and anti-virus software are complementary. To put it bluntly, if there is no virus, there is no need for anti-virus software. If we want users to use our products for a long time, we must let users see that our software is How does it work, let them know that there are so many bugs in their computers that need to be fixed, and so many viruses that need to be killed."
Programmers have a deep affection for their products, which is the result of countless days and nights when they type codes one by one. This is why programmers and product managers often have a bad relationship.
However, what Shen Lang said was very thorough, and Lin Yong and the others didn't feel offended, but thought what he said was very reasonable.
"In the later stage, we will directly feed back the entire search and repair process on the interface." Lin Yongdao.
Shen Lang nodded, and continued to click on the virus detection and killing function. Like real-time protection, the virus detection and killing is also "quietly" and the whole process is quite long. What makes Shen Lang frown even more is that during the virus detection and killing, the computer's running The speed is obviously slower than usual.
Lin Yong explained: "This is a normal phenomenon. The process of killing viruses is actually the process of scanning the entire computer code. In the middle, we need to perform signature code method, checksum method, behavior monitoring method, software simulation method, heuristic scanning, etc. method to verify these codes, which requires a lot of calculations, so it will take up part of the virtual memory and CPU computing power."
"Our newly developed antivirus engine technology has optimized this part, and the virus database also includes all the viruses that have appeared before, which has affected the operation of the computer as little as possible."
Shen Lang nodded. In fact, he was mainly worried about whether the computer configuration of ordinary users is generally low, and whether the anti-virus software will cause the computer to freeze seriously, or even crash directly.
Lin Yongwen explained: "Don't worry about this, we have set up an intelligent control program inside the software, which will only take up 20% of the computer's virtual memory and CPU computing power. A computer with a lower configuration will only take longer to scan and kill. .”
"Well, this function is good." Shen Lang praised.
Shen Lang clicked on the Trojan horse detection and killing function again, just like powerful antivirus, he couldn't see the process.
"What is the difference between this Trojan horse killing and powerful antivirus?"
Lin Yong replied: "Trojan horses are actually a kind of virus, but Trojan horse viruses hide deeper than ordinary viruses. Some Trojan horse viruses even specifically target the flaws of certain anti-virus software to avoid detection and killing, so this Trojan horse virus The killing function is mainly aimed at some blind spots of powerful antivirus, and the second round of investigation is carried out."
Shen Lang clicked on the last security tool and found that it was the download link of the 360 browser. He nodded in satisfaction, but made another request.
"This software is very good and has greatly exceeded my expectations, but there is one more feature that needs to be added before it can be released."
"Oh? What function."
(End of this chapter)
2003 was a year when the Internet pattern in the mainland quietly changed. Just as the fierce battle between 17173 and Duowan was in full swing, Baidu’s mainland users had quietly surpassed Google and became the number one search engine in the mainland. It was also at this time that 360 search relied on 360 browser got 5% market share.
It was also in this year that Taobao was born, Penguin launched the membership value-added service QQ Show, and Lianzhong cooperated to launch the QQ game.
The three major portals are still struggling to find a profit model, but unfortunately, except for NetEase, they are all caught in a vicious circle of continuous development of new businesses and shrinking users.
For Shen Lang, 2003 was also an extremely fulfilling year. During this year, Inspur Technology's browser business grew rapidly, with the number of users exceeding 200 million, and the number of users of 360 Smart Pinyin Input Method exceeded 1 million. Becoming the well-deserved NO360 in the market also provides a user base for the entire [-] system.
NetDragon's Internet cafe management system has covered 10 Internet cafes across the country by the end of October, not far from Lu Bin's goal of [-].
Duowan Games has firmly established itself as the second place in the game community field, and is launching a sprint towards 17173.
A small ecological chain has quietly formed, but if this ecological circle wants to continue to grow, it must be filled with enough core products with higher user stickiness.
On November 11st, when Shen Lang just came to the company, Lin Yong found him excitedly. Seeing his expression, Shen Lang's heart beat wildly several times.
"Have 360 security guards been made?"
"Yeah." Lin Yong nodded fiercely.
Without saying a word, Shen Lang dragged Lin Yong to the office area next door. Different from the past, these aloof hackers looked at Shen Lang with eager eyes. They had been in Inspur Technology for more than half a year. The products of other project teams have been launched one by one, and they have received rave reviews. They are actually quite envious.
It's just that these guys usually hide it very well, and for these paranoids, they haven't made a product that satisfies them, and they don't even bother to make a test version.
In Lin Yong's words, these guys are Mensao.
If it was a different boss, it would have been a blast, but Shen Lang gave them enough patience, hardly asked about the development progress of the project for more than half a year, and gave Lin Yong's team sufficient development time and a sufficiently flexible working atmosphere.
In the beginning, Inspur Technology originally had a clock-in machine, but after this gang of hackers came, the clock-in machine became a decoration completely, because not many of these gangsters had the same work and rest time as normal people, and night owls accounted for most of them. Most, gradually, other project teams also got used to not checking in.
Under the eyes of everyone, Shen Lang came to Lin Yong's desk, and there was a solitary shield icon in the center of the computer screen.
Shen Lang grabbed the mouse and double-clicked with the left button.
Soon, a homepage of this program appeared on the screen. The interface was very simple. There was a shield icon in the middle, and four smaller icons below: real-time protection, powerful antivirus, Trojan killing, and security tools.
Shen Lang glanced at the crowd, and then under their earnest gazes, he clicked on the real-time protection button.
The screen flashed, and the program started to work, analyzing the "health status" of the computer, but Shen Lang frowned when he saw this.
When everyone looked at Shen Lang's face, they couldn't help but feel a little puzzled. This function was already quite perfect in their opinion. Not only could they check out the computer's loopholes and repair them, but it was also very fast, taking only one minute in total. Others on the market Antivirus software can't do it.
Shen Lang spread his hands and said to everyone: "I know this function is very powerful, but you have overlooked one thing. The entire process of finding and repairing vulnerabilities is completed within the program. How do users know what problems their computers have? ?It’s like a question, only the question and the final answer, who can know the effort we put in to understand this question?”
Lin Yong and the others were stunned when they heard the words, they really hadn't thought about this question.
"Virus and anti-virus software are complementary. To put it bluntly, if there is no virus, there is no need for anti-virus software. If we want users to use our products for a long time, we must let users see that our software is How does it work, let them know that there are so many bugs in their computers that need to be fixed, and so many viruses that need to be killed."
Programmers have a deep affection for their products, which is the result of countless days and nights when they type codes one by one. This is why programmers and product managers often have a bad relationship.
However, what Shen Lang said was very thorough, and Lin Yong and the others didn't feel offended, but thought what he said was very reasonable.
"In the later stage, we will directly feed back the entire search and repair process on the interface." Lin Yongdao.
Shen Lang nodded, and continued to click on the virus detection and killing function. Like real-time protection, the virus detection and killing is also "quietly" and the whole process is quite long. What makes Shen Lang frown even more is that during the virus detection and killing, the computer's running The speed is obviously slower than usual.
Lin Yong explained: "This is a normal phenomenon. The process of killing viruses is actually the process of scanning the entire computer code. In the middle, we need to perform signature code method, checksum method, behavior monitoring method, software simulation method, heuristic scanning, etc. method to verify these codes, which requires a lot of calculations, so it will take up part of the virtual memory and CPU computing power."
"Our newly developed antivirus engine technology has optimized this part, and the virus database also includes all the viruses that have appeared before, which has affected the operation of the computer as little as possible."
Shen Lang nodded. In fact, he was mainly worried about whether the computer configuration of ordinary users is generally low, and whether the anti-virus software will cause the computer to freeze seriously, or even crash directly.
Lin Yongwen explained: "Don't worry about this, we have set up an intelligent control program inside the software, which will only take up 20% of the computer's virtual memory and CPU computing power. A computer with a lower configuration will only take longer to scan and kill. .”
"Well, this function is good." Shen Lang praised.
Shen Lang clicked on the Trojan horse detection and killing function again, just like powerful antivirus, he couldn't see the process.
"What is the difference between this Trojan horse killing and powerful antivirus?"
Lin Yong replied: "Trojan horses are actually a kind of virus, but Trojan horse viruses hide deeper than ordinary viruses. Some Trojan horse viruses even specifically target the flaws of certain anti-virus software to avoid detection and killing, so this Trojan horse virus The killing function is mainly aimed at some blind spots of powerful antivirus, and the second round of investigation is carried out."
Shen Lang clicked on the last security tool and found that it was the download link of the 360 browser. He nodded in satisfaction, but made another request.
"This software is very good and has greatly exceeded my expectations, but there is one more feature that needs to be added before it can be released."
"Oh? What function."
(End of this chapter)
You'll Also Like
-
Kamen Rider: Missed the College Entrance Examination at the Beginning and Became a Kabuto
Chapter 140 1 days ago -
Daqin: After eighteen years of forbearance, the useless prince went crazy with killing
Chapter 92 1 days ago -
Unlimited enhancement at the beginning, all heroes are god-level
Chapter 138 1 days ago -
Zhutian: Gain a supernatural enlightenment at the beginning
Chapter 234 1 days ago -
Top torture! The sickly actress has a crush on me
Chapter 291 1 days ago -
I can identify everything, but the level is increased by one
Chapter 185 3 days ago -
From Flower Vase to Film Emperor in Hollywood
Chapter 1447 3 days ago -
I have a Taoist temple that connects me to other worlds
Chapter 554 3 days ago -
Qi Refining Level 3000, Accepting The Empress As A Disciple At The Beginning
Chapter 1359 3 days ago -
Douluo: The True Eye
Chapter 248 3 days ago