Chapter 270: Another industry has been blamed
-
Fairy Technology
- Sleeping on Pillows
- 1854 characters
- 2021-03-01 03:13:38
Wang Sheng stopped here a moment.
The reporter friends below are aggressive, what's the situation?
Has your company made gratifying achievements in the field of network security? When did Magic Fairy enter the cyber security industry?
Wang Sheng did not wait for these people to ask questions and continued: "Yesterday afternoon, the server that installed our company's Dragonscale security software has withstood the collective attacks of tens of thousands of hackers around the world, and has always ensured that our company's official website is operating well and stable. I believe that some friends present can confirm this. "
The reporters below were buzzing, which was extremely hot news.
When the magic fairy technology revealed that normal temperature superconducting materials and other technical information were placed on the official website server, people were guessing what the purpose of the magic fairy technology was?
But no one guessed the subject.
It is also because they can't guess, so most people think that the brains of senior executives of Huanxian Technology are caught by the door.
Now, as Wang Sheng said, they just realized.
At this moment, they are deeply shocked by the magic of the magic fairy technology. In order to test a security software, they even bet on valuable technical information. Who can do it all over the world?
Their self-confidence and their domineering enthusiasm made all domestic journalists present to praise.
It is worthy of being an enterprise led by young people, and it really is not unusual.
"Your company claims to have been attacked collectively by tens of thousands of hackers all over the world. What evidence is there?" This is a reporter from a bangzi country. He never wanted to admit that Huaxia has become strong. Er, as long as it is the strong part of Huaxia, it must be stolen from the country of sticks.
Wang Sheng seemed to carelessly smiled and said, "Of course the evidence is there! Staff, please open the slide!"
His voice dropped, and a picture appeared on the curtain on its side, showing rows of data and pictures.
"This is what our Dragonscale security software records. Some are screenshots and some are data. This not only contains the IP address that launched the attack, but also the time of the attack and the means of attack. By the way, this reporter friend is The country of Bangzi? This network attack also involved some people in your country. You can see that these addresses are all from your country. You do n’t need to talk about hijacking broiler chickens. Our Dragonscale security software can trace the source directly. Find out the IP of the attacker. It ’s just that this group of people in your country has been defeated in the melee just after entering. Of course, our company will still make solemn representations to your country. Such criminals who damage the network environment must get Strict punishment. Similarly, we also have such people in our country, and our company will respond to relevant state departments and request relevant investigations. "
The reporter from Bangziguo didn't know much about the Internet. In the face of the data set out by Wang Sheng, he was aggressive on the spot and did not dare to continue to ask questions, for fear of making low-level mistakes as soon as he spoke.
Wang Sheng continued: "The scale of the attack on our company this time and the level of people involved in the attack are unprecedented in the world. You can see this through the operations we have shown. Clue. Of course, many of you may not understand the field of network offense and defense, for which we are also prepared. You can copy this data back and ask professionals to study it. I think many of them are useful to most people. It has learning value. "
A British journalist stood up: "Excuse me, President Wang, is this Dragonscale security software independently developed by your company?"
Wang Sheng smiled slightly, full of aura, saying: "Of course! This is a product developed by our chairman and the company's relevant R & D personnel over three months. I believe that no similar product can be found in the world."
Wang Sheng's ability to brag and blush is becoming more and more sophisticated now. The ghost knows how long it took the chairman to develop this thing? However, in order to make this thing more valuable, it is natural to say that the development time is longer.
However, the creation of Magic Fairy Technology Co., Ltd. has been more than half a year. Even if it is not blown, it will not last long, so it can only be compiled for three months.
But this remark caused a great shock in the media friends below.
The security software compiled in three months has hacked the hackers all over the world. Can't you go to heaven? You have also spoken out in front of media reporters around the world. Haven't you offended companies in the field of cyber security all over the world?
This is almost like saying: I'm not saying which network security company is your hot chicken, but I'm saying that all the world's network security is hot chicken ...
Not only that, how many hackers are hidden in the world? You are now holding the other person on the ground and rubbing it. I am afraid that no one will feel comfortable in the heart. In the future, Huanxian Technology will not be quiet.
However, with the exception of some reporters from the mainland of China, none of them showed any worries about Huaxian Technology.
These words of Wang Sheng undoubtedly cater to their hearts. Such reports are more sensational and they can get more rewards.
"Excuse me, President Wang, you mentioned this Dragonscale safety product today. Are you planning to bring this product to the market?"
Wang Sheng replied with a smile: "Of course, this is the first step for our fantasy technology company to enter the information network industry. In fact, at the beginning of the company's establishment, our chairman was planning to enter the information network industry, but due to various constraints Then the boss decided to take the industrial route first. "
Okay, another bite of dog food.
"Is your product secure?" This is a reporter from CNN.
Wang Sheng said, "I think this has been verified as to whether Dragonscale security software is reliable. Let ’s not talk about the internal testing conducted by our company, only this time the attack launched by tens of thousands of top hackers and hacking organizations around the world, in our Kneeling in front of all the security products, you can see the power of Dragon Scale. In a word of our chairman, our Dragon Scale security software is indestructible! To be responsible, if you are in Washington, DC, USA Our traffic management system uses our products, and this network security accident will definitely not occur. As far as we know, your accident is completely those people who failed to find a favor on our company's official website. Just a punching bag. "
Suddenly, below, it sounded like a face.
It felt like a fight between two big guys. One man was defeated, but he was so angry that he gave the little fat man on the side of the road violently.
The CNN reporter was speechless. The incident in Washington, D.C., was really too loud this time, and the world knows it.
Please do both things on the same day. There is no fart on the side of the magic fairy technology, but the traffic management system in Washington collapses instantly. How can anyone refute this?
A Huaxia reporter then asked, "According to what you said just now, is your company's security product just an enterprise-level security product?"
Wang Sheng said: "No! We are a universal platform product, whether it is a server, a personal computer, or even a mobile phone, we can use our products, and all are the same installation package. In addition, preventing network intrusion is just our It ’s just one of the most basic features of this product. Its most powerful and also the most energy spent by our R & D team is its application on mobile phones. "
"I'm afraid everyone here hates Internet fraud. Who scams phone calls, text messages, and phishing websites? Who hasn't been harmed? Our software can completely prevent this situation," Wang Sheng said confidently.
The reporters present were stunned and shocked. President Wang, are you sure you didn't say a lot?
Not to mention that network fraud is a worldwide problem, just because the aforementioned platform is universal, it makes people feel untrustworthy.
As we all know, the software installation packages of mobile phones and computers are completely different. Even mobile phones are also divided into Android and ISO systems. You say that you can install a software package on all platforms, which is completely contrary to common sense.
This question was raised immediately.
Wang Sheng said: "This is actually very well verified, we can test on the spot."
The testing process is very simple, the same software package can be installed on the mobile phone and the computer.
As a result ... Nimei, it really works.
These reporters have nothing to say, and everyone is now in a state of uncertainty.
I can't figure out why, but it's really amazing.
Then Wang Sheng asked everyone to personally test the function of preventing online fraud. I have to say that these reporters are all swindlers. They have compiled various deceptive scammers to flicker this security software. All without exception, all have been Penetrated.
Although all journalists are puzzled, Huaxian Technology has no obligation to explain the principle.
...
In the following day, Magic Fairy Technology ushered in a large wave of free advertisements. The major media around the world reported this news conference of Magic Fairy Technology and highlighted the Dragonscale security software.
Ordinary people may not be able to understand this situation, but the only feeling for those who participated in this network attack, or knew about this network attack, was shock.
Deeply shocked!
What security software in the world can completely prevent hacking?
If there is such a thing ~ EbookFREE.me ~, then everyone will not need to be a hacker, and it's not done at all.
Kexianxian Technology also said that its official website will always use Dragonscale security software for protection, and the website server will always have that technical information. If you have the ability, you can continue to come to find trouble.
Some people will say that the data will be insecure on the server. No matter how powerful Dragonscale security software is, it can only prevent external intrusion. If there is an internal ghost, then it is not easy to copy the data?
Wang Sheng also explained this. This information is specially set by Dragonscale security software. Unless the core of Dragonscale security software is cracked, it cannot be copied.
And its highest authority is only in the hands of Shen Bing, chairman of Magic Fairy Technology.
The root of everything lies in that security software!
Now the network security companies all over the world have a feeling of being in the back, and they will not survive in this industry without cracking the dragon scales of Magic Fairy Technology.
I have to say that Magic Fairy Technology has once again acted as a crap, and another industry has been blamed by it.