Chapter 261 No lack of safety
Chapter 261 No shortage of safety
After the CD was put in, a software installation interface soon appeared. The boss clicked a few times and the software was successfully installed on this computer provided by Google.
After running the software, an interface appears, showing that the software is detecting the current vpn settings on the computer. After the detection is completed, a prompt window pops up asking "Do you configure it according to the settings on the computer in front of you?"
The boss clicked "OK", and the software interface disappeared and returned to the desktop of the computer. The boss cleaned up all the files on the desktop and said, "I will configure an employee's computer now. First, I will install programming software on this computer!" The boss started the old trick again and quickly installed a programming software on the computer. "I will create a new document on the desktop, and assume that this document is a weekly report that the employee has just completed and is ready to submit to the company!" As the boss was talking, he created a document and wrote a few words in the document, "Google Dongyang Office."
Li Mingyang watched the boss's every move through the big screen. So far, he still didn't know where Figo's new safety technology was reflected.
The boss saved the document and glanced at Li Mingyang in a depressed manner, saying, "I won't do it anymore. I'll assume that this employee usually only uses these two things. Now I will back up the employee's computer!"
After saying that, the boss pressed a button, and the software interface that had just disappeared appeared again, asking "Will you do a backup?"
After clicking "OK", the software displays a progress bar that is moving forward at a constant speed. In less than a minute, the progress bar reaches the end and a new prompt pops up: "Backup is completed!"
The boss cleared his throat and pointed to an icon on the desktop, "This is the file generated by backup! Now, I will demonstrate the use of this file to you!" The boss took out another U disk from the package and said, "I moved this backup file to the U disk, and then let the computer exit the VPN network!"
After doing all this, the boss unplugged the USB drive and came to the front of the second computer provided by Google. "Mr. Li, please read it clearly now and write down all the files you see on this computer desktop!"
Li Mingyang looked at it and found that there were seven or eight files on the desktop, all of which were common files. He nodded and said, "I've recorded it!"
"Then I'll plug the U disk into this computer!" After the boss said that, he raised the U disk and shook it, and then inserted it in.
As soon as the USB flash drive was plugged in, the desktop of the computer disappeared. Instead, it was a VPN network connection box, requiring the employee account and password to be entered. The boss quickly typed the employee account and password. The screen flashed and the screen turned into a new desktop. The magical thing was that it was exactly the same as the desktop backed up just now, with a shortcut to programming software and a document file on it.
The boss clicked on the document and saw a few words written on it: "Google Dongyang Office!"
Li Mingyang showed some unexpected expressions and asked, "Can that programming software run?"
The boss clicked twice, and the programming software ran, and then the program editing interface was displayed.
Li Mingyang stood up at that time and walked to the boss. He decided to operate it himself. Strangely, this programming software is obviously not installed on this computer!
When the boss saw Li Mingyang's anxious look, his anger subsided and said, "Mr. Li can try to write a program or modify that document!"
Li Mingyang felt that it was a little unreal, so he built a new project in the programming software and wrote down the most classic code: "hello, world!"
Seeing that Li Mingyang had no movement, the boss unplugged the U disk. The moment he unplugged it, everything on the screen disappeared, and then he returned to the desktop that the computer should have. The original seven or eight files were still displayed on the screen.
"Let's move on to the first computer and take a look!"
The boss picked up the U disk and walked slowly to the first computer before. After plugging in the U disk, he saw that the VPN network connection box appeared on the screen. After typing the account password, the familiar desktop appeared again.
Li Mingyang's eyes were straight, which was incredible. The screen displayed on the screen was exactly the same as when he unplugged the USB flash drive just now. Even the cursor for editing the code himself was still stuck in the original position. How could this be possible!
The boss felt that the commentary he prepared could come in handy again, and said, "Mr. Li, this is the first feature of our new technology: mobile office anytime, anywhere! The employee's office desktop can be placed in a USB flash drive, or on a mobile phone, mp3, or mobile hard drive. As long as you connect to the computer, it can run automatically. After passing the identity verification, you can enter the enterprise intranet, obtain resources, and work!"
Li Mingyang had not come back to his senses at this time, and he was still thinking about how Figo Security realized this function, whether it was a virtual system, backup hard disk data, or other technology!
"At present, this is only the first version. The employee desktop backed up under the Linux system can only run on the Linux system, and the same is true for other operating systems. However, we will launch a second cross-platform version in the future, allowing the employee's backup desktop to run under all operating systems, or even on smartphones. At that time, it would be a complete mobile office!" Before the boss could introduce the first version, he couldn't wait to throw out the second version.
Li Mingyang then realized, "What about the second characteristic?"
"Easy deployment!" The boss stood up. "The company only needs to set up the VPN virtual gateway. As long as one employee can successfully connect to the virtual intranet, the other employees can be connected successfully without installing any client or deployment of Zhengpiao Astronomy! And the company can focus on the allocation and management of employee permissions."
"How can we ensure the security of the intranet?" Li Mingyang asked.
"The biggest feature of our new technology is safety!" The boss emphasized, "Let me demonstrate it to you!" As he said, the boss returned to his laptop, made a shared folder on it, and put an empty text in the folder, and then said: "You can regard this text as any kind of file. It is an ordinary document, a spy program, and a virus!"
Li Mingyang didn't understand what the boss meant. It was obviously an empty text, so how could it be a virus and a spy program? But Li Mingyang held it in his arms and didn't ask, waiting for the boss to come and give the answer.
The boss walked to the first computer provided by Google, typed a command, and searched for shared resources on the enterprise's intranet. Soon, he searched for the shared folder on the VPN server. The boss opened the folder and said, "Now, let's run this virus!"
After saying that, "Sha" a little, a prompt box popped up on the screen, "Unauthorized file cannot be run!"; after that, the boss tried to copy the text to his desktop, and the prompt box popped up again: "Unauthorized file cannot be backed up!"
The boss spread his hands and said, "Did you see it? Even if viruses and Trojans can enter the intranet of the enterprise, it is a decoration and cannot be run at all, nor can it enter the employee's desktop. Only authorized files can be run!"
Li Mingyang now understood that the employee desktop created by Figo safe can only run some kind of certified documents, "How to authorize it?"
"We have special tools!" The boss took out another disc from the disc package and put it into his laptop, which is the VPN server. After running, the boss chose the empty text in the shared folder and clicked "Certification". Then the empty text became an icon, which was the same as the icon he had previously backed up the employee desktop.
The boss left the other end and returned to Google's first computer, "Let's take a look now!" After saying that, he ran the icon in the shared folder, and it opened smoothly, and it was an empty text. The boss turned off the text and then copied it. When the icon arrived at the desktop, it turned into an empty text document, not an icon.
Li Mingyang was stunned. It was so amazing. He couldn't figure out what kind of backup technology this was, so he instantly merged the two backup files.
"The backup tools for employee desktops and the authorization tools on the server are the same set. If they are not matched, they will still not run!" The boss explained, "And the tools of each company are unique and there will be no duplication, which ensures that the information of each company is unique."
"Did the employee's desktop be updated in this way?" Li Mingyang asked.
"Yes!" The boss's eyes lit up, and he thought that he had not been in vain for the past half day. Li Mingyang finally got enlightened. "Using authorization tools and cooperating with the permissions of the employee's account, you can accurately distribute office software and enterprise information. Employees can add necessary tools and information to their desktops through the enterprise server, and upload their work progress to the enterprise server. At the same time, no external tools and information can be accessed to the enterprise intranet, which ensures the high purity of the enterprise intranet!"
"Also, once a standard desktop backup file is written into the data by an employee, the next time it is opened, it must match the employee's account. If it doesn't match, it will still not run. The probability of a hacker obtaining an employee's desktop and account at the same time is almost zero. If other methods are used to form composite verification, such as SMS verification, it will become impossible for a hacker to enter the intranet of the enterprise from the employee. As for authorization tools, there is only one process at present, but we are developing multiple encryption technology. In the future, the authorization and authentication of any document and tool will go through at least three steps, so as to avoid hackers from the enterprise's internal network to the greatest extent."
The boss was a little anxious and had to breathe after listening, "Also, all the data communications on the intranet are encrypted and cannot be monitored! Therefore, what we have the most in short supply of new technologies is security!"
Chapter completed!