Font Size:
Theme:

Chapter 270:Another industry is being ruined

Wang Seng said this, a little pause.

The reporters below are embarrassed, what is the situation?

Has your company achieved a gratifying success in the field of cybersecurity?When did Magician Technology enter the cybersecurity industry?

Wang Sheng did not wait for these people to ask questions, continued: "Yesterday afternoon, the server that installed our company's Longxing security software has experienced the collective attack of tens of thousands of hackers around the world, and has always ensured the good and stable operation of our company's official website."I am sure that some of my friends who were there can confirm this.”

The reporters below began to buzz, which was extremely explosive news.

When the magic technology burst out the normal temperature superconducting materials and other technical data placed on the official website server, people are guessing what is the purpose of phantom technology?

But no one guessed the subject.

It is also because you can't guess, so most people think that the brain of the high-level of Magic Fairy Technology is caught in the door.

Now that the king has said so, they will suddenly understand.

At this moment, they are deeply shocked by the big hand of fantasy technology, in order to test a security software, even take the value of the city's technical data as a bet, who can do it all over the world?

Their self-confidence from the heart, giving me the domineering power of whom, so that all the domestic journalists present can not help but point a praise.

It is a company led by young people, which is really not an ordinary road.

“Your company claims to have been collectively attacked by tens of thousands of hackers around the world, so what evidence?”This is a reporter from a good country, and he never wanted to admit that Huaxia has become strong.As long as it is a powerful part of Huaxia, it must be stolen from the stick country.

Wang Sheng seemed to have no mind and smiled, “Of course there is evidence!”Staff, please open the slides!”

His voice dropped, and a picture appeared on the curtain on his side, showing a row of data and pictures.

“This is the content of our Longscaid security software records, some are screenshots, some are data.This not only has the IP address to launch the attack, but also the time of attack and the means of attack.Yes, this reporter friend is a good country, right?This cyber attack on your stick countries is also involved in the attack, you see these addresses, all from your country.You don't have to say hijacking or something, our Long Scale security software can trace the root cause and directly find the attacker's IP.But this group of people in your country has just entered, and they have been defeated in the dogfight.Of course, our company will still make stern representations to your country, and such criminals who destroy the online environment must be severely punished.Similarly, we have such people in China, and our company will also respond to the relevant state departments and ask for relevant investigations.”

The stick reporter obviously did not know much about the network, in the face of Wang Sheng put out the data, on the spot, did not dare to continue to ask, afraid of making low-level mistakes when opening.

Wang Sheng continued: "The scale of the attack on our company and the high level of personnel involved in the attack are unprecedented in the world.You can see this through the methods of operation we have shown.Of course, many of you may not understand the field of cyber attack and defense, and we are prepared to copy this data back and ask professionals to study it.I think a lot of these methods are of learning value to most people.”

A British reporter stood up: "Mr. Wang, is this dragon scale security software developed by your company?"

Wang Sheng smiled slightly, the avalan scene was full, and said, “Of course!This is the product that our chairman worked with the relevant R&D personnel of the company, and I believe that we can't find similar products in the whole world."

Wang Sheng now bragging not blushing the ability is getting more and more bright, ghostly know how long the chairman developed this thing took?However, in order to make this thing look more valuable, it is natural to say a longer time for research and development.

But the establishment of the company is still more than half a year, even if it can not blow much, so it can only be compiled into three months.

However, this has caused great shock in the hearts of media friends below.

Three months of security software, hanging hackers around the world, why can't you go to heaven?You are still saying this in front of media reporters around the world, will not you offend the world's network security companies?

It’s almost like saying: I’m not talking about which cybersecurity company you’re spicy, but that the whole world is doing cybersecurity.

Not only that, how many hackers are hidden in the world?You are now rubbing each other on the ground, I am afraid that no one will be comfortable in their hearts, and then the magic fairy technology will not want to be quiet.

However, in addition to some mainland Chinese journalists at the scene, no one else has shown the slightest concern for the magic fairy technology.

These words of Wang Sheng undoubtedly cater to their hearts, such reports are sent out, it is more sensational, and they can get more rewards.

"Mr. Wang, did you mention this dragon scale safety product today, are you ready to bring this product to market?"

Wang Sheng replied with a smile: "Of course, this is the first step for us to enter the information network industry."In fact, at the beginning of the establishment of the company, our chairman is intended to enter the information network industry, but due to various factors, the boss decided to take the industrial route first."

Again, another dog food.

“Is the safety of your product reliable?”This is N’s reporter.

Wang Sheng said: "On whether the safety software is reliable, I think this has been verified.Not to mention the tests conducted within our company, the fact that the tens of thousands of leading hackers and hacker organizations around the world alone has been so well kneeled in front of our security products that you can see the power of the dragon scale.In the words of our chairman, our long scale security software is indestructible!To be responsible, if your Washington, D.C. traffic control system adopts our products, there will be no network security incident.As far as we have information, your accident is completely that those people on our company's official website failed to get a good, back to find a ventilator."

Down below, it sounds like a face.

It felt like two big men fighting, a person failed miserably, but angry, handy to the roadside of the little fat man to beat.

The N reporter was speechless, and this time things were really too big for the whole world to know.

Two things happen on the same day, there is no such thing as magic technology, and Washington's traffic control system is instantaneous collapse, how can this be refuted?

A Huaxia reporter then asked: "According to Wang you just said, is your company's security product just an enterprise-level security product?"

The king said, “No!We are a platform-wide product, whether it is a server, a personal computer, or even a mobile phone, we can use our products, and they are all the same installation package.In addition, preventing network intrusion is only one of the most basic functions of our product.It's the most powerful and our R&D team spends the most effort, or its app on mobile phones."

“I’m afraid everyone here is disgusted by online fraud, right?”Fraudulent phone calls, SMS, phishing website links, who has not been victimized?And our software will completely eliminate this.”Wang said confidently.

The reporter was shocked, Mr. Wang, you are sure you did not say big words?

Not to mention that online fraud is a worldwide problem, but only the previous comprehensive platform, which makes people feel untrustworthy.

As we all know, the software installation package of mobile phones and computers is completely different, and even mobile phones are divided into Android and ISO systems, you say that you can install a package on all platforms, which is completely contrary to common sense.

This question was raised the first time.

Wang Sheng said, "This is actually very good verification, we can test on the spot."

The process of testing is very simple, the same package, installed on the phone and on the computer.

As a result, naughty, it’s okay.

These reporters have nothing to say, and everyone is in a state of uncertainty.

I don’t know why, but it’s really great.

Then Wang Sheng let everyone personally test the function of preventing online fraud, and had to say that these reporters are all a part of the hand, with a variety of deceptive paragraphs to fool this security software, the results are without exception, all were found out.

Although all journalists are puzzled, Magician Technology does not have the obligation to explain the principle.

...

In the following day, Fantastic Technology ushered in a wave of free advertising, and the world's major media have reported the press conference of Magic Fairy Technology, and highlighted the safety software of Longxian.

Ordinary people may not be aware of this situation, but those who participated in the cyber attack or have knowledge of this cyber attack have the only feeling that is shocking.

A deep shock!

What security software in the world can completely eliminate he-i customers into q-in?

If there is such a thing, then everyone will not have to be a hacker, it is not done at all.

But Magic Technology also said that its official website will always use Longscale security software for protection, and the website server will always have that technical data.You can continue to come to the door to get into trouble.

Some people will say that the data on the server will be not secure, even if the dragon scale security software is how powerful, it can only be protected against external intrusion, if there is an inside ghost, then it is not easy to copy the data away?

Wang Sheng also explained that this data is specially set up through the Longxian security software, unless the core of the Longxian security software is cracked, it cannot be copied.

And its highest authority is only in the hands of Shen Bing, chairman of phantom technology.

The root of everything is the security software!

Now the world's network security companies have a sense of the back, do not crack the magic fairy technology of the dragon scale, in this industry they will be difficult to survive.

It must be said that the magic fairy technology once again acted as a stirring stick, and another industry was cursed by it.

Comments

No comments yet. Be the first to comment on this chapter!