Chapter 7 Sharpening the gun before battle
Chapter 7: Grinding the gun at the last minute
"Teacher Wang, what about the good news?"
Facing Pan Junyu's inquiry, Wang Qiang licked his lower lip enviously and said in a long story: "Hey, although you are young, it is undeniable that your opportunity is so good! Pan Junyu, have you heard of the name Hongliang?"
"Hongliang?" I silently recited it several times, but unfortunately I had no impression in my mind and shook my head indifferently.
Wang Qiang sighed and explained: "Hong Liang, assistant to the president of Kingsoft Company, is also one of the judges in the Jiangsu Division of this National Middle School Student Software Design Competition. After using your firewall, he was very interested in your design. But I did not agree to copy your firewall, and he took it to Beijing Corporation for review two weeks ago. Fortunately, I received a reply from the other party two days ago. Hong Liang, on behalf of Kingsoft, invited you to Beijing to negotiate cooperation matters in the name of the company. On the phone, he did not deny that Kingsoft Company hopes to cooperate with you in the development of this firewall! You said, is this a huge good news? Professional software companies are interested in a firewall made by high school students, which is unique in our country!"
Han Rouyu couldn't expect Pan Junyu to be so capable, and after listening to Wang Qiang's narration, he seemed very surprised.
This news was also a real surprise to me. A modified firewall was actually attracted by a famous software company. So I smiled faintly and asked Wang Qiang: "So, I have to go to Beijing to know if my software can be used for commercial purposes?"
"Well, that's of course! By the way, wait a moment, I'll find Hong Liang's contact number, and he asks you to contact him in person!" Wang Qiang slapped his forehead suddenly, and after speaking, he eagerly flipped through the drawer.
After searching in the messy drawer, Wang Qiang excitedly took out a small piece of paper, handed it carefully to Pan Junyu, and reminded: "I found it, I will save it properly!"
Seeing Wang Qiang being so enthusiastic, I said gratefully: "Well, thank you teacher. If things are done, I will definitely treat you to a meal!"
Wang Qiang waved his hand and said modestly: "It's okay, this is what I should do! If you have a promising student like you, the teacher will be glorious if you say it out!"
"No matter what, I have to thank the teacher! By the way, how is Luo Yun's grades? Are you qualified to participate in the finals in Beijing?"
Speaking of Luo Yun, although his grades are not as good as Pan Junyu, he can at least enter the finals. Therefore, Wang Qiang replied with relief: "He, although he can't compare with you, he is a good student for middle school students in the city. He got the last ticket for the exit, which can be regarded as winning glory for the city! As for whether he can make a difference in the finals, this is not something we can expect. However, as his instructor, I will benefit from him at the beginning of next month and go to Beijing to participate in the finals for public expenses. Even if he fails to succeed, it will be considered an eye-opener and see the world!"
When Wang Qiang talked about this, he was a little lacking in confidence! Because he was the last place in the Jiangsu Division's selection competition and participated in a national competition, he would probably be eliminated in the first and second rounds, but Luo Yun was also a student he personally trained, so Wang Qiang's final tone seemed very tactful.
I nodded, recalled the conversation with Luo Yun a month ago, and said sincerely: "Well, I have to ask the teacher to tell Luo Yun that I wish him all the best in Beijing!"
The thin Wang Qiang paid attention to the time, got up and gave up his seat, then patted Pan Junyu, and said with emotion: "Okay, it's not too late, I have to go for lunch! Pan Junyu, please sit down!"
Perhaps after leaving school and having some contact with society, I actually reached out to shake hands with Wang Qiang and said goodbye, which made the latter's expression a little awkward, "Okay, goodbye teacher! I will notify you as soon as there is news!"
Wang Qiang usually comes into contact with ordinary students, and it is rare for people like Pan Junyu to shake hands. After a passive handshake, he finally left the office with great strides.
Han Rouyu witnessed the whole process of Wang Qiang and Pan Junyu's conversation. After seeing that the office was empty, she couldn't help but clapped her hands and exclaimed: "Awesome, awesome, our classmate Pan is amazing! It seems that Xiaoxue really has vision!"
I took my seat again, smiled, and replied in a look: "Haha, that's it! Otherwise Xiaoxue wouldn't like me!"
Pan Junyu's natural expression made Han Rouyu laugh and cry, so he had to snort coldly, reassign the remaining homework books, and smiled: "Hmph, I'm so thick-skinned, hurry up and help me correct my homework!"
"I understand!" At this time, the beautiful teacher finally recovered as before, and I felt relieved. After smiling with her, I picked up my pen and focused on correcting my homework.
※ ※
At twelve o'clock, after most of the classmates finished their meals, the beautiful teacher and I walked out of the office slowly and walked towards the rice noodle restaurant we visited for the first time.
On the way, I tried my best to find topics to talk to the beautiful teacher to make her happy. My efforts were not in vain. The teacher's silver bell-like laughter kept ringing in my ears, attracting passers-by to look back and pay attention.
Although I was seated by the window a few months later and enjoyed the same food, the mood of the beautiful teacher and I had changed. What's more, I experienced too many unexpected things and were no longer a simple high school student. Therefore, halfway through lunch, I looked at the beautiful and mature face of the beautiful teacher and said with emotion: "Teacher Han, can I change the name of you in the future with my relationship with Han Xue?"
Han Rouyu had no objection to this and agreed happily: "Okay! You can call me sister like Xiaoxue!"
"Sister Han?" I shouted immediately.
Han Rouyu blinked her beautiful eyes and asked curiously: "Well, are you a little uncomfortable?"
I shook my head and denied it, and continued to keep talking to her, which invisibly elevated us from an ordinary teacher-student relationship to another level.
After lunch, I wandered back to school with the beautiful teacher. When I passed the sales outlet of Federal Software, my eyes were suddenly attracted by billboards with bright red letters: "On December 24, the third-generation antivirus engine--Kingsoft Antivirus 2001 was grandly launched, priced at 98 yuan!"
When Han Rouyu saw Pan Junyu slow down, he said strangely, "Junyu, what are you looking at?"
"Teacher, accompany me in and have a walk around!" Kingsoft Antivirus, as the main product of Kingsoft Company, must have its own special features. So before Han Rouyu could reply, I took the lead and took a quick walk in the store for a while. Finally, at the cashier, I took out a hundred-dollar bill to buy a set of Kingsoft Antivirus 2001 antivirus software.
...
At the school gate, a cold wind blew, and Han Rouyu's soft hair fluttered with the wind. She stretched out her slender jade fingers, gently covered her hair, turned to face Pan Junyu, and instructed: "Junyu, thank you for taking the time to accompany me, go back! If you have time to contact Kingsoft Company, don't miss any opportunities!"
I understood her kindness and agreed, "Well, I will, then Sister Han will go! If nothing unexpected happens, I will wait for you at the school gate at twelve o'clock tomorrow!"
Han Rouyu hurriedly shook her hand and refused, with a serious expression and said, "No need, you should be busy with your own affairs! I can take care of myself alone!"
I hesitated for a while and said helplessly: "Well... OK then! But Sister Han wants to find me, make a call, and I promise to be there as soon as I shout!"
Han Rouyu pursed her lips, nodded understandingly, and waved goodbye to Pan Junyu: "Okay, then I'll go in, bye!"
"Goodbye!" After Sister Han disappeared, I took the anti-virus software and took a taxi and left with peace of mind.
I returned home successfully and rested for a while. After doing nothing, I sat at my computer desk, turned on my desktop computer, and entered the central system of the Pentagon again to search for the latest news about the US mad cow disease. Unfortunately, the US Department of Agriculture has taken quite good precautions. The outside world is not aware of this matter. Moreover, the dairy cow samples have not been delivered to the British laboratory, and the government still has no news!
In desperation, I had to unpack the exquisitely packaged Kingsoft Antivirus 2001 and prepare to install this antivirus software in the window system of my desktop computer. Because in my opinion, if Kingsoft is indeed sincere in cooperating with me, my firewall must be in contact with its main products.
Running Kingsoft Antivirus 2001, I feel that this software is worthy of being the flagship product of Kingsoft and based on the field of network information security. The page looks quite comfortable, but I don’t know what the function is. So I tried to plant a few viruses for myself, but I didn’t expect it to handle Internet viruses very quickly.
As a result, I became very interested in it. After debugging and careful analysis throughout the afternoon, it turned out that Kingsoft Anti-Japanese 2001 relies on the third generation of embedded anti-virus technology. Its best selling point lies in the use of embedded technology in Kingsoft Anti-Japanese email monitoring, which makes Kingsoft Anti-Japanese email monitoring have a good protective effect on virus-ridden emails.
Moreover, Kingsoft Antivirus has a core technology - dual-engine technology, which is also the traditional advantage of Kingsoft Antivirus. Through the combination of Kingsoft Antivirus's independent engine and the core antivirus capabilities of Russian Dr.web engine, Kingsoft Antivirus is superior in terms of drug detection range and accuracy. It is understood that the global virus detection network jointly built by Kingsoft and the Russian National Academy of Computer Science has made the dual-engine technology more powerful.
In short, Kingsoft Antivirus's virus firewall, which detects viruses with compression formats and unlimited layer compression packages, has built-in CIH lifelong immunity, perfect hard disk repair technology, local area network virus detection, unknown viruses, virus isolation technology and other means, are generally good, and I also found the connection with my firewall from it.
...
When it comes to firewalls, the majority of computer users cannot accurately understand their concepts. The "firewall" in the concept of half of computer users refers to a virus firewall that references the concept of network firewall technology.
In fact, in the development history of anti-virus, there is an important mileage node that introduces a network firewall to monitor network attacks. Specifically, it is to add an anti-virus cover to the local system, and any operations that may cause virus intrusion to the system will be monitored, which forms a personal virus firewall.
The technical ideas of personal virus firewalls and network security firewalls are the same, but their essence is completely different and their functions are completely different. Network firewalls are used to anti-black, while virus firewalls are used to combat drug control. Therefore, the firewall I designed is accurately defined as personal network firewalls, which are used by stand-alone users to anti-black.
However, after using Kingsoft Antivirus 2001, I was deeply inspired and found that my previous works were not perfect. I deeply felt that there were many things that could be improved. I should combine Kingsoft Antivirus's anti-drug advantages, integrate anti-virus technology, and integrate the firewall network firewall technology to directly and effectively block hacker attacks, Trojan programs and Internet viruses.
After I knew the general direction, I had a whim. In order to make the firewall suitable for all individual network users who access the Internet through dial-up or LAN, in order to expand the applicability and operability of the firewall, I spent a total of 60 hours in the next three days, thinking hard, combined with the many advantages of foreign software, finally took the firewall.
The improved firewall can preset high, medium and low security rules for filtering network packets according to the characteristics of the user group, and correspond to three different IP packet filter rules. Among them, the high security level only allows commonly used network access (such as browsing web pages, downloading files, sending and receiving emails, etc.), and prohibits others from accessing the shared resources of the machine, but it is relatively troublesome to operate and use in daily life.
In order to make this firewall more competitive, I also copied the program access control used by top foreign firewalls in the firewall. When an application of the operating system accesses the network, it will be intercepted by the firewall. At this time, the firewall will set the network operation of the application based on the user's network permissions to the application. The general default processing method is to give the user a query when the application occurs. The user decides whether to give the application the right to access the network. The user can also change the previous settings in the application network permission list after this.
Finally, as a super hacker, I spent a lot of effort on the firewall to address the shortcomings of ordinary computer users’ security prevention, and finally developed the most important and most advantageous technology of the firewall - intelligent black prevention technology.
As we all know, because general professional network firewalls are designed for network administrators, they only report on ports and packet flow directions. Under this information prompt, ordinary users have no way to judge whether it is a harmful data flow or a normal data flow. However, my firewalls are designed for stand-alone users.
Intelligent anti-black technology will be very prominent here. It can directly tell users which data packet is a hacker attack attribute, which data packet is a Trojan remote control attribute, etc. From the connection port filtering to the intercepting of hackers and Trojan programs with known virus definitions, it can ensure the safe use of the computer and of course it can prevent personal information from being stolen.
Although the firewall has many highlights, it is just a prototype. Among them, the database required by intelligent black-proof technology is not something I can do alone and take three days to complete. Moreover, there are still many problems with the compatibility of the firewall, which requires a long time of debugging to reduce system occupation.
Finally, there is another very important point. If this firewall will be used for commercial purposes, the interface must be re-edited. Since I am not an interface designer, the things I make are only practical and do not have any aesthetics. Therefore, the entire interface looks terrible at first glance.
But although I wanted to make changes, I couldn't get any interest due to overwork and immediately fell asleep.
Chapter completed!