Ressurring Network Controversy

Chapter 974, release the cloud anti-virus

"Chen Yu, I get a secret message, Microsoft may have to do it again."

"Is Microsoft not always doing us?"

"I refer to the same viral attack last time."

360 heads Zhou Hongyi came to Chen Yu to do.

Microsoft is so big, it is impossible to reveal half-point out.

However, it is a message, and Zhou Hong is still very tight.

It seems that this time is obviously more dangerous than the last time.

"Come again?"

Chen Yu frowned.

Microsoft's suppression of Huanyu Technology is really a timeless.

Seeing that the three games manufacturers have brought a lot of great advantages to Huanyu Technology, and some hardware and software companies have also joined the Huanyu camp. Unexpectedly, so fast, Microsoft's next wave of attack came again.

"Yes, it is said that Microsoft has contacted several top anti-virus software companies in the world."

"Anti-Virus Software Company?"

Chen Yuyi, the manner said: "Do you not antirely, will they poison?"

"They will not only poison, but also the masters in the poisoning."

Zhou Hong smiled helplessly.

In fact, their 360 has a lot of masters, but they have been very low.

And in order to better serve users, 360 has always absorbed all kinds of excellent hackers worldwide.

If you don't even know the number of hackers attack, how can you prevent this hacker?

Li Jun, who had made a panda burning incense, Zhou Hongyi, I absorbed 360.

"Uh……"

Chen Yuyi took the head: "I have never turned it."

"Do you live?"

"It's enough."

Zhou Hong shook his head: "I have attacked us with Microsoft's strength. We are hard to deal with it. Moreover, they don't have to say so many top security giants. I believe this time, some giants are certainly working together to study us. Huanyu system. Maybe when, give us a hit. "

"Is there a chat with Li Jun, see if he can't get a super panda burning incense."

"I can't figure it out."

Zhou Hong shook his head.

The last virus attack is a panda burning incense from the darkness of Huanyu, which is temporarily interrupting Microsoft's attack.

But this time it is absolutely impossible.

Microsoft has picked the vulnerabilities for Panda burning incense. In addition, all major top anti-virus software companies have been studying panda burning incense, and even launched a series of pandas burning incense to kill, they have the operation mechanism of panda burning incense , Infection routes ... etc, it is already very familiar. "

"That is a little bit."

"We also think, but this can not be met."

Chen Yu is not particularly known for technology this block, but Zhou Hong, which is very research, is very understanding, the degree of difficulties in this.

Absorbing the experience of panda burning incense, even if you can make a series of viruses, it is absolutely impossible to spread so fast to the world. They have blocked this road, and if there is no other discovery, it is basically impossible.

"Inversely, we need to worry about this top system security company to give us a virus like panda burning."

Although Microsoft has suffered from the attack of Panda, the reputation did not know how much stinky.

But Microsoft is called again, you have to use Microsoft's Windows.

This is not everyone who doesn't want to change the operating system. It is really not to change.

Don't say it is other country, even if it is a domestic, it is not so easy to completely get rid of Windows.

It can be such a new operating system.

They are unable to get rid of Windows, but they absolutely can replace the Huanyu system in the first time.

After all, when they replace the Huanyu system, they are actually trying.

It is good to use it, it will continue to use it.

It is not good to use it, the probability of Windows is very large.

"Cannon, what do you think now?"

"Can you think about it, I can only buy a horse around the world, dig all kinds of system security masters. However, I don't expect it to go. After all, Microsoft's strength is not blowing, and they are jointly a series of global top Security company. This time, they just want to launch our strongest offensive. If we can't hold it, it is estimated that the road behind it is really not good. "

Chen Yu nodded.

He is clear about the current situation.

In fact, Microsoft and the PK of Huanyu Technology, playing now Microsoft has not too many ways to deal with Huanyu Technology.

Online games, Huanyu Technology can also support it by Internet cafes.

Also, they can also launch a more cat-made game against Microsoft Windows markets.

In particular, the three major game companies are high-profile announced to join the Huanyu camp, which also stops Microsoft's blocking.

But if this is no longer acting, then the Huanyu system will have a day, one step will grab the Windows market.

So, it is better to concentrate all resources, giving Huanyu Technology.

"And Microsoft is also smart, and they also start hanging tips in all major websites, and our Huanyu system has many users."

Zhou Hong has a sentence.

However, although it is, but I have to say that this strikes him.

Even this trick is coming from Huanyu Technology, I have no way to crack.

Microsoft Windows users will download small movies, and Huanyu system users will also download small movies.

"Oh, Microsoft is to use it."

"You still laughed, this trick is yours, now you can't think of a solution."

"Who said I can't think of it."

Chen Yu said: "The trick is what I think, I have a solution."

"Can you solve?"

Zhou Hong has some people can't believe: "This educational film is the user's take-initiative to download. This is actively running Trojan and virus. Our anti-virus software is not used."

"It is actually to solve this problem."

I thought about it, Chen Yu called Xie Zhang.

Xie Zhang is responsible for the 5173 network, and also acts on some games, and is also responsible for Internet cafes management software business.

"Xie Zhang, I think our Internet cafe management software has to add a function."

Chen Yu said to Xie Zhang prone.

"Master, do you think that there is not perfect in our Internet cafe management system?"

"Correct."

Chen Yu is a head: "Zhou always said to me, there are many users in the Internet cafes that don't like to download small movie small educators. You have a solution."

"This one……"

Xie Zhang is somewhat embarrassed.

This is the spontaneous action of Internet cafes, where he can have a solution.

This phenomenon is very common, not only the ordinary users have done this, but the Xie Zhang of the year did this.

Everyone is a young man.

Young people naturally have a lot of energy unable to vent.

So, in addition to venting in the game, naturally download some small movie small educational film.

So where to download it?

Where all users first contact, that is, Internet cafes.

Don't think that the Internet cafes are there, how is it, how to download, how is it?

Too little look at all netizens' psychological suffers.

Don't say it is a big bunch of people in the Internet cafe, even if there are several sister paper on the side, and users can see the heart.

"You see, Xie Zhang has no way."

Zhou Hong is a booth.

This strike is not so yin. The original blizzard cannot be killed by Huanyu Technology.

Of course, not just Blizzard, now Chen Yu, this trick is also threatened by various Trojans and viruses from time to time.

But now, this trick has also been round to Huanyu Technology.

Just Chen Yu is calm: "You, how can there be no solution in this world?"

"The way the way is more than difficult."

"All netizens like to download small movies in the Internet cafe, then do we give me a one-button restore function to Internet cafe management software?"

Chen Yu suddenly proposed a way.

"one click recovery?"

Zhou Hongyi stunned.

"Yes, as long as the Internet cafes are dropped after the machine, then all the small movie small educators he downloaded, all give one button, restore to the original Internet cafe."

This trick is naturally a new function above the future network bar management software.

This feature is actually in order to solve Internet cafe security issues.

Because there are too many cases of hacking, poisoning and Trojans at the Internet cafe.

Internet cafes are not possible to constrain each user.

So what do you do?

Some programmers think of a good idea, that is, engage a one-button restore function in the Internet cafe management software.

This feature is out, you can download a small movie game before you do it, or you are all emptied.

This does not interfere with the Internet bar users, but also guarantees the system security of the Internet cafes, two in one game.

"I am going, Chen, you will be a bull."

Xie Zhang was confused, after a while, but it fully understood.

"Nima, Chen Yu, you are really talent, I have to take you."

Zhou Hongyi said to Chen Yupei at this time.

So so that the global crazy tricks are turned into the broken net by Chen Yu Xiaoxiao.

"Xie Zhang, when is this function to develop?"

"One day."

"Well, do it."

One-click restore function is not a fresh function.

Not just the Huanyu system can have, in fact, there is a key restore function as soon as the Windows system.

This feature is actually the same as the idea used by Internet cafes.

Also for system security.

If there is any virus in the system, there is a Trojan, or the system is rushing, more or slow.

Directly come to a one-button restore, restore the time point you think safely.

At the same time, a one-button restore is more simple than the heavy-installation system, more convenient.

Just this feature is good, but there are some troubles in the previous user.

For example, after a one-button restore, there are many more important information that is also clear.

Therefore, most people do not need this one-button restore.

But this is the Internet cafe, it is different.

Internet cafes can only ensure that their computer is safe, he will not keep the user's information on the computer.

Not only don't want to keep it, if there is no such system, they still have to clean it.

After all, there are many netizens who like to download things on the computer. After downloading, I don't delete it. I have been there for a long time. The whole computer has to be caught by them.

At this time, the Internet cafe management software adds a one-button restore function, almost, after going to the Internet cafe online, it can be fully enabled.

You don't need to worry about poisoning, you don't need to worry about downloading a small movie will make Internet cafes computer poisoning.

"Internet cafe this piece is solved, but our personal PC ring system?"

After a short excitement, Zhou Hong asked again.

Although it is currently, the main business of the Huanyu system is online.

But if you just stare at the Internet, then the Huanyu system is impossible to push.

And in all kinds of games of Huanyu Technology, and with Acer, the three major gamingers are involved, the market in the individual PC computer is gradually gradually. Although it is still unable to compare with Microsoft Windows, it is the most worth cultivation of Huanyu Technology.

"Our personal PC computer does have some troubles."

Personal PC computers are not included.

There is a professional administrator, but also a series of service companies serve him.

In order to be busy, they will pay attention to the computer every day.

A personal PC computer, which is used for individuals.

Personal use of computer levels is high.

High may be good, it is more difficult to poison.

It can really say that the personal PC computer, more than 90% of users are computers.

Some don't say that it will not install the operating system, and even the software is not necessarily.

They will only play YY, watch the movie, play a game what to play ... As for the back of the computer, the card, the virus, there is a virus, they have not recruited, can only take the money to take the money.

Of course, Microsoft Windows users are also the same.

But Windows has formed monopoly, he is not afraid of user loss.

Any PC users who can be Huanyu Technology are extremely valuable, and they are distressed by anyone Chen Yu.

"In fact, there is no way, but this method is slightly more complicated."

"Chen Yu, you said."

"Cannon, have you heard cloud safety?"

"Cloud security?"

Zhou Hong shook his head: "What is cloud security?"

"This ..."

Sure enough, cloud security is indeed a new thing in 2005.

I remember that at the end of 2006, at the end of 2006, at the World Sola Engra, the so-called cloud business also appeared for the first time.

At that time, Google first proposed cloud computing philosophy in the world, and a sensation of the whole world.

Under the help of cloud computing concept, there has been a series of cloud services in China.

For example, like Penguin, Ali Cloud ... and more.

Cloud security is actually one of cloud computing.

Chen Yu is not a computer professional, and he is also difficult to explain this theory. However, although Chen Yu is not a computer professional, there is an eye of the past for so many years, even if it is a professional thing, he can also draw him with ordinary words.

"This is the case, the big cannon, if there is a Trojan or the virus, what do we do?"

"First, our anti-virus software company will analyze this virus and provide viral signage. Step 2, users download the viral signature, that is, download the virus library, then you can check."

"Is this a bit slow? And if the user has not downloaded it."

"It is a little slow, you have mentioned automatic download, but automatic download also has a shortcoming."

"Automatic download too occupational system resources."

"Yes."

"Then let's change your idea, users can not download it."

"Don't download it?"

Zhou Hong did not solve: "Chen Yu, do you say that you don't download a virus library?"

"Correct."

"This is not."

Zhou Hong shook his head: "Do not download the virus database to kill the virus, this is impossible."

Of course, it is not impossible.

For a general virus or Trojan, even if you don't download the virus library, sometimes you can kill.

After all, there are some viruses and Trojans, and the anti-virus software itself can also kill.

It can now be more advanced in viruses and Trojans, and simple anti-virus software has long been eliminated by hard technology.

This time you must download the virus library for killing.

Just, there is a new idea, but he subverts the previous anti-virus software to play.

I have organized a speech, Chen Yu has made himself easy to understand: "If this virus has been killed in the server of anti-virus software, and through the anti-virus software, the virus is not entering the personal PC computer. During the spread of viruses and Trojans, they were eliminated by the background server. Is this not need to download the virus library? "

(