Technological power starts with upgrading lenses

Chapter 293 It’s hopeless. Reinstall the system.

Yanjing, Xuanyuan Technology Headquarters Building.

In the control room outside the computer room, several engineers are paying attention to the background of the system.

As major companies have begun to ship goods to users, the number of users in the backend of their systems has finally begun to rise.

In just two days, it has accumulated 50,000 mobile users and more than 10,000 PC users.

"The overall situation is good. As long as we can continue to accumulate and the number of users reaches more than 10 million, we will no longer have to ask others to release products in our app store."

"Yes, maybe they will have to ask us to review it quickly!"

And this is actually the most profitable part of the system.

Although it is said to be free, there are many places to make money in a huge system ecosystem.

Just an official app store can generate countless profits.

Just like opening a store in Dibao Mall, if the application provider does not spend money to operate it, how can the ranking of the application be improved?

If you don’t get an advertising spot and climb the rankings, how will users know about you?

This is relatively good food.

The Pingguo tax in the Pingguo system is an exaggeration.

After the user downloads the app, Pingguo will take a commission for every purchase made in the app.

And the proportion is as high as 30%!

In 2022, Apple will earn US$85 billion (approximately 600 billion yuan) from the App Store alone.

The ability to harvest leeks is simply terrifying!

In fact, most Android mobile app malls will also take a commission from users’ recharge consumption.

But because there are no restrictions on Android application installation, application providers can choose not to list them in the application mall.

For example, if you set up your own app store,

Or directly promote the official website and let users download it themselves, bypassing the mall's commission.

But if Apple wants to release apps, there is one and only one way: the App Store. As long as you want to make money from Apple users, you can only obediently pay the protection fee.

Of course, Pingguo has the confidence to collect this protection fee because he has accumulated a large number of users around the world with the reputation of his system and hardware.

In order to ensure system and application security, Xuanyuan System also combats online fraud, pornography, gambling and other applications. Although it has chosen the same method as Apple, it can only download and install software through the official app store, but it promises never to levy user spending. become.

It means that Xuanyuan Technology saves a lot of administrative expenses and can make money indirectly by taking over some functions of the Publishing Bureau, the Industrial and Commercial Bureau, the Cyber ​​Security Bureau and other departments.

"Huh……"

Just when everyone was focusing on the increase in the number of users, an engineer suddenly discovered something.

"What's wrong?"

"Someone is scanning our server ports!"

"!!!"

This discovery immediately put the engineers on site at risk.

However, this situation was foreseeable before the Xuanyuan system was officially launched, and they had prepared several plans for this.

Therefore, after a brief panic, they quickly calmed down and began to calmly start the first round of confrontation with each other.

Feng Mingsheng, the chairman of Xuanyuan Technology, quickly received the news and rushed to the computer room to organize manpower to respond...

Country M, Bridgeport.

Gnaji and Jeremy, who had just conducted a preliminary test of the Xuanyuan Technology server, were a little confused at this time.

It's not that the opponent's system defense is too strong, but that they didn't encounter interception or harassment at all during the exploratory scan...

"They...are they all off work?"

"Impossible." Jeremy shook his head firmly, "How can there be no one at this time?"

After another round of testing by his assistant, he found that the other party still had no response.

So Gnagy immediately proposed a direct onslaught, but was opposed by Jeremy.

"I suspect that the other party is cheating, so let's implement plan B."

The so-called Plan B is not to attack Xuanyuan Technology's enterprise servers first, but to break them into parts and attack Xuanyuan System's individual user terminals to obtain vulnerabilities in Xuanyuan System.

At the same time, it can also distract the opponent's attention through online guerrilla warfare.

Once the specific vulnerabilities are found, it will be much easier to attack their corporate servers.

However, Gegina believed that based on the current situation, there was no need to do anything extra. Just when the two sides were arguing, Detlef sent by Pingguo proposed to simply divide the troops into two groups.

This proposal was immediately adopted by Gorgina and Jeremy.

So they immediately called on the server's computing power and began to borrow countless Win, Android and Pingguo system devices as springboards and broilers, frantically distributed port mappers, and launched synchronous scans of Xuanyuan system terminals and servers.

This has made many users of Windows, Android and Pingguo systems in China clearly feel that their devices have suddenly become slightly lagging. However, this happens occasionally. If closing the software does not work, you can only restart the device. .

At the same time, facing the official attack of the mysterious opponent, Xuanyuan Technology's engineers finally began to fight back, constantly trying to find ways to shut down the opponent's mapper to prevent them from scanning the system.

However, in this contest, they are actually at a very obvious disadvantage.

Because there are too many terminals for Windows, Android and Pingguo.

Relying on their familiarity with their own system, Gegina and others can jump to terminals at will, switching to another terminal when one is killed, and they are so elusive that it is difficult to detect their real springboard.

This means that they can always be in the role of attackers, making the people of Xuanyuan Technology exhausted and eventually exposed.

However, the battle they originally thought could be resolved quickly ended up lasting for more than half an hour without progress.

"What's going on? Why are their system ports so dense?"

"Is their system logic completely different from ours?"

"Impossible, I don't believe their system doesn't have loopholes!"

"..."

As time goes by, more and more Windows, Android and Pingguo terminals become their soldiers in the attack. Some users find that restarting their devices does not seem to work, so they can't help but wonder if they have been infected by a virus. .

But when they used anti-virus software to scan and kill them, they found that this actually made the device more stuck.

"Damn it, you must be infected with a virus!"

When Cheng Jiang asked his roommate Mai Liyang for help, Mai Liyang immediately shook his head and sighed, "I told you to stop browsing those messy websites. You may have been tricked now..."

"You're so pretentious, you've got more bets than me!"

"..."

"What should we do now? Brother Yang, you are a computer expert. Please help me find a solution."

At Cheng Jiang's request, Mai Liyang immediately sat down at Cheng Jiang's desk and wanted to operate the computer, but found that the mouse could not move at all.

After pressing the restart button to no avail, he unplugged the power and restarted. As a result, the mouse stopped moving as soon as he entered the desktop.

"It's hopeless, let's reinstall the system..."

"Damn it, my paper seems to be on the desktop, won't it be gone after reinstalling the system?!"

Mai Liyang immediately looked at him with sympathetic eyes: "Who asked you to put such an important thing on the table? You can only accept the change with condolences."

"..."

Looking at Cheng Jiang who looked hopeless, Mai Liyang suddenly thought of another possibility, so he immediately unplugged the computer power supply, unplugged the network cable at the same time, and then tried to restart it.

The computer quickly entered the desktop. After Mai Liyang operated the mouse, he unexpectedly found that it could move!

"It's done!"

"Damn it, Brother Yang is awesome!"

"That's necessary... hurry up and save the data and then kill the virus."

"Um!"

Cheng Jiang quickly sat back in his seat and began to copy the dense documents on the desktop.

"What happened just now? Will my computer not be able to connect to the Internet in the future?"

"I don't know... someone is probably using your computer as a miner. If you wait and know how to kill viruses, it doesn't work, and if the same situation persists even after plugging in the Internet cable, you may have to reinstall the system."

"OK……"

"Fuck!"

As soon as the two of them finished speaking, another roommate, Sun Shanxiang, who was playing a game, suddenly stood up and exclaimed,

"My computer crashed too!"

"..."

Seeing Sun Shanxiang being defeated one after another, both of them were a little confused.

After Mai Liyang stepped forward to check, he found that the condition of his computer was exactly the same as Cheng Jiang's.

He quickly checked his computer again.

completely fine.

Mai Liyang still didn't know that the reason why his roommate suffered such a disaster was entirely because he was using a Xuanyuan system computer.

The target of attack on his roommate's computer at this time was his 'Han Shiguan' host...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like