#1095 without theft system
"What do you think should be done?"
Rayleigh Benson is a senior programmer. At this time, he felt like he was not able to start with an operating system.
Before this, they tried many methods, such as restarting the computer, pressing the del key, unplugging the network cable and being in a stand-alone state, or even dismantling the chassis and changing to a hard drive. However, none of this helped. When they turned on the computer, the desktop would always be dark blue.
"Damn the program, he's so unscientific!"
It was weekend tonight, and now it was over. There were not many people in the office. At this time, a beautiful woman in the administrative office walked out of the city. She looked at the two of them in a daze and shouted from afar: "Hey, Rayley, don't you two need to get off work?"
Two senior engineers broke the computer, how can they tell others about this? The two of them said in unison: "We are testing a software and we will get off work later."
The woman didn't care about them. When she was about to leave, she suddenly turned around and walked towards them. While walking, she took out a CD from her bag and said with a smile: "Raily, I bought a birthday date for my daughter. I want to add some birthday wishes to it. But you know, I don't know anything about computers."
"Haha, you can put it here, I'll get it done tomorrow to give it to you."
"Okay, thank you~"
After the woman who was dressed up in time left, the two senior engineers looked at the computer again and were stunned. Suddenly, Rayleigh's eyes lit up and exclaimed: "Does it need the genuine software source code?"
Kozmo thought about it, but it wasn't it. The software they installed on the computer several times were all applications they developed themselves, and there was no so-called public source code at all. If this program could not detect it, it was naturally judged that their software was an unknown source, so they were not allowed to install it.
What an incredible thing would it be if this conjecture was correct?
The two looked at each other. When they saw the D on the computer desk, they stretched out their hands at the same time, but they still sat close to Kozmo and took it to his hands. His trembling arms were stuffed into the optical drive of the chassis, and the sound of turning quickly began to sound.
There was no "unknown source" warning sound in the speaker, nor did the video driver pop up, which was about five seconds. When the system optical drive recognized D, a brand new player appeared on the desktop.
This player with the same color as the desktop appears out of thin air, and then there is no reaction.
Kozmo trembled and clicked on the video, which was very smooth. When the mouse double-clicked, the video immediately expanded without any lag, and his reaction was unusually quick.
ight
ut private de
perorests...
A song "anaesthe" by German all-round music creator Max Milan Heck slowly flowed out of the speaker.
Music is soothing and touching, but the two senior engineers are shocked. A hint of enlightenment arose in their hearts at the same time, and they may have witnessed the release of an epoch-making product.
This semi-intelligent computer system, made by the world's first biological computer, entered the United States silently. There was no earth-shaking press conference, and no one worshiped it. Only two engineers were looking at each other.
However, at this time, it was very lively in several famous software forums in China, and many night owl software engineers were discussing fiercely. And unlike Kozmo and the others who worked behind closed doors, many people had developed how to use this system in less than half an hour.
"It's really a hell. I don't know who designed the system. It's really a distorted state."
"Yes, he's so speechless. I want to compile its background program, but I just uninstalled my software."
"What are you? I'm just miserable. I have to deliver a software in two days and I haven't recovered until now. If the boss knows during the day, he will have to peel me off."
"Hey, have you found that this system is really smooth. I opened more than 20 large programs at the same time, but there was no problem, just that the temperature of the PU increased by 20%.
"But the problem now is that all the software required to be installed in this system is genuine, and many of the tools they make themselves cannot run on it."
Among the people in the forum, there are senior engineers in the laboratory, programmers in large companies, and many experts in security companies have not spoken at all. They silently looked at the chat texts and thought about the deep-seated problems.
When Fang Yuanshan uploaded this system software to several famous software download bases in China, many industry experts received news in less than two hours.
They first noticed two things. First, the entire system file package is only 10mb in size, and second, the system can run very smoothly.
When everyone learned these two news, they suspected that they had heard it wrong.
A system software or application software must be composed of thousands or even hundreds of millions of instructions. A computer can only directly recognize and execute machine language. Therefore, to run a high-level language program on a computer, it must be equipped with a program language translation program. The translation program itself is a group of programs, and different high-level languages have corresponding translation programs.
Simply put, a computer is like a shell, which has no effect. It is the brain that controls it, and the brain is connected to thousands of nerves. The nerves control hands and feet. The hands and feet transmit the things they touch to the brain through neurons, and then the brain commands the hands and feet to execute.
Similarly, such a huge and complex project requires too many things. How can you fully control the computer in 10mb?
But whether they believed it or not, this happened.
Although the background of that file package has not been compiled yet, this does not hinder the research of software experts on it.
In order to see if this system is a pseudo-system or it can be fully run, the programmer uninstalled the pre-installed system in the computer, then connected to the network, and let the system file package start running on the computer.
The biological computer is just a computer. St. Athena sets up the same port and does not need to be downloaded twice because it can be automatically scanned, but programmers have some ways to download the program on CD, USB flash drive, or even on their mobile phones.
But there is also a problem. These people need to change the IP address for each next file package. When they confirmed that the system can really run perfectly in various environments, all senior programmers and software technicians were shocked.
Technology is nothing small, and often an inconspicuous software may cause changes in the technical world. Among these programmers, there are many people with keen eyes, and they discovered that this system software is extraordinary at the first time.
"Guangzhou" High-tech Zone, the Science and Technology Industrial Park, gathered here major figures from the software industry across the country. Many companies had already held emergency meetings when the sun just rose in the sky. The topics were all about that system, regardless of the exception.
"Do you think this system is impossible to achieve with current technology?"
This conference room is placed in the form of a lecture, and most of the staff below are very casual and do not have that kind of seriousness. When the slightly fat man on the stage just finished speaking, a man wearing a cashmere shirt below said, "Boss, no matter whether it can be realized or not, the problem is that this system has appeared clearly, and we can't help but believe it."
"Yes, we tested this system for two hours and it was perfect!"
"You can't say that. I don't know what the developers are based on. It actually rejects any software without formal authorization. This is really incredible."
"It does not accept the entry of non-registered software, which can be regarded as a double-edged sword from the side..."
The man in an orthodox suit on the stage frowned, raised his hand to interrupt the discussion below, and said solemnly: "Have you thought about it from the perspective of others? I mean, if the global P-end, handheld computer, and personal communication mobile terminal are all equipped with this theft-free system, what do you think it would be?"
"Hiss..." After hearing his words, everyone gasped after thinking for a moment.
This solemn man is Lu Yeyu, chairman of the famous software development company in China. Lu Yeyu, who is less than 40 years old this year, founded a website for people to download small software when he was in college in 1990s.
Although the software download website did not help him make any money, it helped him gain a reputation. After graduating from college, he relied on his extraordinary technical skills and keen eyes and quickly became famous in the domestic software industry.
Lu Yeyu, a technical background, not only saw the terrifying technical strength of this software, but also saw the amazing commercial profitability. Once this system is promoted, when people really use this theft-free system, they will be extinct first when they sell pirated copies.
However, compared to that kind of small plate, this software has a huge impact on reality.
"Dawei, share with you the things you tested."
"Okay head~"
As he spoke, a young man of twenty-five or six years old stood up, picked up the information in his hand and looked at it: "I have mainly tested three aspects before. The first is the problem of perfect operation, the second is the installation software, and the third is the operability."
"Any system must first be considered to be stable, and then it will be considered. Obviously, you already know the answer to the first question. This time, it was uploaded to Dot at 5:35 am, Feifan and the system software of our company's website have been running steadily so far, and there are no problems."
"The second question is that our technicians have tested more than 500 genuine and illegal software at home and abroad in two hours. All 220 genuine software have run perfectly, and none of the remaining pirated software can be passed on this system."
"Hiss~"
The twenty or thirty programmers here took a breath again. What a terrible thing? Like Kozmo in Silicon Valley, they all suspected that today is April Fool's Day. When will a system program develop the ability to identify the authenticity?
The last question, which is also the "operability" that everyone is most concerned about, was as they listened at the same time, the man who stood up took a deep breath and started to speak slowly...
Chapter completed!