People who bought the antivirus program frantically asked about it in the comment section of the software application market. Unfortunately, the software developer was in class all morning, and he had to use the break time to teach Cheng Yuan what he had left behind. He didn't look at his phone at all. .

Practitioners of network security have also begun to worry about this issue.

At the invitation of the media, some network security experts came out and gave a 10-minute interview. Experts showed a set of statistical data to media reporters.

"We have been collecting statistics on network security failures, and the situation is indeed not optimistic. As of 10 minutes ago, we had obtained a relatively representative set of data and analyzed some situations. We cannot draw certain conclusions, but It is reliable to guess with [-]% to [-]% confidence, and we can still draw some."

"First of all, there is indeed a serious Internet crisis in the Fraud Island area. From their network traffic statistics, we can see that 90.00% of seven devices no longer contribute to the Internet traffic. This is a very serious situation."

"Secondly, we need to be clear that this virus is aimed at computers, not computers in a certain place. The vast majority of computers in the world are using the same set of operating rules, and the data exchange is also highly similar. Only firewalls, etc. It’s a little bit different. We’ve had sporadic instances of network outages domestically, and we’ve seen that in the international community as well.”

"However, our research team does not think that this will cause us more serious Internet access problems. There are two main reasons. First, according to our observations, this variant of the ghost virus is mainly through a program called 'Feixun'. 'The spread of social software, this software is only used in fraudulent islands, and we use mainstream social software such as WeChat and Tim."

"The social software we use analyzed the anti-virus software given by the network security technical expert code-named 'zc' in the first time, and obtained the key identification code of the 'ghost virus' from it, with 30.00% seven As the baseline for similarity judgment, once there are overt active programs and hidden latent programs with a similarity of more than 30.00%, they will be intercepted as soon as possible, so the possibility of this mutant virus breaking out on our side is not very high."

"Secondly, we know from statistics that none of the attacked devices has installed the newly launched anti-virus software."

"There is an interesting phenomenon. In an Internet cafe on the SAR side, because their users are quite mixed, software like 'Feixun' is installed on all the software, so that Internet cafe was captured immediately. gone."

"A student from the University of Science and Technology of the Special Economic Zone happened to be writing a thesis on a computer. He installed anti-virus software for that computer at his own expense. Not only did he successfully save his thesis, but the second wave of ghost virus variants came later. During the infection, that computer was not infected, and the rest of the computers were all infected."

"So, before the results of our research appear, I hope 'zc' himself can come out and give everyone a reassurance."

As soon as this report came out, many people who hadn't been infected with their computers downloaded the anti-virus software released by Zhou Cheng.

-------------------------------------

This morning, all the students in the Peiyou class would turn their heads to look at Zhou Cheng from time to time, as if looking at the seven fairies who descended from the earth. The teachers of the Peiyou class also paid special attention to Zhou Cheng, and even teachers and students from other classes borrowed Zhou Cheng When I passed by, I came to check in at the gate of Peiyou Class.

During the exercise between classes alone, Zhou Cheng helped Cheng Yuan go to the bathroom. When he returned to his seat, there were more than a dozen love letters stuffed into the hole in the table.

Zhou Cheng had no interest in those love letters, but Cheng Yuan showed great interest, so Zhou Cheng stuffed those love letters for Cheng Yuan to read.

Cheng Yuan pointed Jiang Shan while watching, "Wow, this person actually drew such a big heart for you with a red pen! Zhou Cheng, are you moved?"

Zhou Cheng: "..."

Cheng Yuan continued: "Student Zhou Cheng, are you willing to be my boyfriend? Xiao Yu who loves you forever. Zhou Cheng, who is Xiao Yu?"

Zhou Cheng rolled his eyes, put those love letters into the paper shredder in front of the classroom, shredded them into paper scraps, and dumped them all into the trash can.

Cheng Yuan was sitting on the table of the classmates in the back row, laughing and criticizing Zhou Cheng in Qiongyao accent, "Zhou Cheng, do you know what you did just now? It wasn't paper you shredded, it wasn't paper." Love letters, but the ignorant hearts of many girls! The ones you dumped into the trash can are loves that died young!"

Zhou Cheng got goosebumps from Cheng Yuan's words. He gave Cheng Yuan the review materials for a round of physics, and said, "There are 26 chapters in total. Excluding the seven chapters that have already been read, there are still nineteen chapters left. Within four days After reading it, ask me if there is anything you can’t do. If you still can’t do it after four days,” he smiled.

Cheng Yuan was terrified by the evil smile on Zhou Cheng's face, and felt uncomfortable all over, "If I still can't do it after four days, what will you do?"

Zhou Cheng gave Cheng Yuan a look of "you understand", and then didn't say another word, leaving enough space for Cheng Yuan to imagine.

Sometimes no answer is the scariest answer.

Cheng Yuan developed a rich imagination. First, he wondered whether Zhou Cheng secretly took pictures of something he shouldn't have taken while he was asleep. Then he thought that since Zhou Cheng was so good at programming, the little secrets he hid in his mobile phone and computer He must not be able to hide from Zhou Cheng's eyes... The more he thought about it, the more frightening he became. Cheng Yuan felt as if Zhou Cheng had pinched his handles to death. In the next few classes, he kept his own place and didn't dare to be a monster.

When the bell rang for the end of class at noon, Zhou Cheng rushed to the school gate, took the two lunch boxes from He Hua, sent them back to the classroom, and gave Cheng Yuan the thermos cup he brought, and told Cheng Yuan to remember to be on time. After taking the medicine, I finally ran back to the school gate with the blue lunch box, found the car sent by the Huafen Group, and went to the Huafen Group, which is a big business.

On the way, Zhou Cheng finished his lunch quite quickly and even burped. Tian Li, who was in charge of picking Zhou Cheng up, thought that Zhou Cheng was a fake!

This person looked like an out-and-out high school student everywhere, how could he be the hidden 'zc' master?

But after arriving at the technical department of Pollen Group, the head of the technical department intended to test Zhou Cheng's true level, so he took out the variant of the 'ghost virus' they had just obtained by fishing nesting dolls to test Zhou Cheng.

This virus came from Zhou Cheng. Would Zhou Cheng not know how to deal with this virus?He pretended that he was not very familiar with this variant of the ghost virus, pretended to study it for 3 minutes, and then quickly typed on the keyboard.

I have to say that the Huafen Group has a big business and a lot of money. The keyboards provided to programmers have an excellent feel and long key travel. After pressing down, they are soft and there will be no obvious resistance. It is very suitable for programmers who spend a lot of time on the keyboard. Work on tapping.

In just 10 minutes, Zhou Cheng dismembered the virus. He said to the head of the technical department with a relaxed expression, "Don't worry too much. If it is a computer that is not infected by this virus, use the computer that I uploaded in the early morning. After the software turns on all the scanning and killing functions, it automatically adjusts the parameters of the computer's firewall, which can completely block this mutant virus from outside the firewall."

"If it is a computer that has already been infected with this virus, you don't need to worry too much. This virus mainly locks key files to blackmail. I will modify some parameters in the anti-virus software later, and then the virus will be infected. The device is unlocked, and it can also unlock the files that are locked into garbled characters. Do you have a computer? I will deal with it now, or more people may be tricked.”

The head of the technical department opened a device at random. Zhou Cheng logged into the application market management background, downloaded the previously uploaded program installation package, unpacked it, corrected some parameters in the program, added some instructions, and kept secret A key for multiple unlocking is added to the key section.

After doing all this, Zhou Cheng repackaged the program and ran it for a trial run. No obvious bugs were found, so he uploaded the 2.0 version of the software and updated the software introduction along the way.

This is probably the software with the shortest interval from 1.0 to 2.0.

Within a few minutes, someone from the software application market came to ask Zhou Cheng, "Mr. Zhou, when you set the scope of software authorization, you only selected the authorization for the mainland region. There are already some international users who want to accept it." In terms of price, do you have any requirements?"

Zhou Cheng thought for a while and said, "Wait for me a moment, I'll set it up in the background myself."

He implanted an IP deep recognition program in the software, set the charge in the Fraud Island area to ten times the original price, and made the pricing in other places inconvenient, and then directly replaced the newly updated version 2.0.

The people in the software application market were almost suffocated watching Zhou Cheng's coquettish operation.

Is it really okay to have such a double standard in life?

However, the pricing power is in the hands of Zhou Cheng, and the software application market has no right to interfere. The man just complained in his heart, and then checked the program symbolically, and released it directly without finding any obvious bugs.

When passing the review, that person was still thinking, there are so many ladders now, and anyone can change the IP by simply building a ladder, how can anyone spend an extra 450 yuan?

But this auditor underestimated Zhou Cheng's technology. Zhou Cheng's deep IP identification program embedded in the software was designed to prevent this trick. When installed on the computer, you will get a prompt:

"After verification, your software license does not match the location of the device. Please make up the price difference in time, unlock the anti-virus software applicable to this IP, and maintain Internet security in time."

Definitely let those who want to take advantage fall into the pit!

The author has something to say: Cheng Yuan: Zhou Cheng, would you like to be my boyfriend?

Zhou Cheng: No, I only treat you as my son!

PS: I saw some friends say more, huh... In fact, there are many, many saved manuscripts. There are screenshots of saved manuscripts in Zhalang, but the list is very important. I am waiting for the list, otherwise it will affect this book I hope everyone understands the final score of the book, and I will definitely update it after entering V.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like