Rebirth of Cyber ​​Hegemony

Chapter 431: This Is the Change of an Era

Zhou Hongyi is developing the latest program.

On the other hand, the three major antivirus software vendors participated in the Internet Security Conference together.

This is not a private gathering.

This is an industry conference organized by the National Internet Security Alliance.

All major system security software manufacturers have received invitations from the conference.

However, 360 Security Guard does not.

Actually it's not normal.

This conference was initiated by the three major anti-virus software companies, and it is strange that they can invite 360.

"President Qiu, President Jiang, isn't that 360 that Zhou Hongyi did too much to break the rules of the industry?"

"That's right, please, you Jinshan should take action."

"That Zhou Hongyi was born in rogue software. This time he entered the field of system security, and he will definitely attack major antivirus software companies in the future."

The conference was very lively, but even more lively was the small meeting during the private dinner.

As for the reason, everyone turned their attention to 360 Security Guard.

undoubtedly.

The emergence of 360 directly challenged them.

It can be said that this is simply ruining their jobs.

No company can stand this kind of job loss.

"Everyone, don't worry, 360 is not so scary."

Qiu Bojun comforted everyone and said: "360 Security Guard does not have any technical difficulties. We have launched Jinshan Assistant, and it will soon occupy a certain market. As long as we continue to promote it, I believe that 360 will soon be driven away. President Jiang, what do you think about it?"

President Jiang naturally said Jiang Min.

Jiangmin is also the founder of Jiangmin antivirus software.

"360 really doesn't have any skills, but I'm worried that this guy is doing something crooked."

Jiang Min thought for a while and said.

"It is."

Qiu Bojun nodded: "Zhou Hongyi really has a knack for doing crooked things, and even dares to do 3721. However, system security is not what they can do with 360. In the end, 360 is only engaged in system cleanup and other businesses, and they have no technical access at all. Security field. What you said, Mr. Jiang, is also reasonable, but according to the original, Zhou Hongyi dares to do something crooked, so please don't be polite and follow."

Qiu Bojun was originally an honest man.

It's just that an honest man doesn't like Zhou Hongyi's crooked ways.

"The president is right, and if you are polite to them, then we will all be finished."

"Alright, let's boycott 360 together."

"Looking back, we will cooperate with TV stations for a few episodes and talk about system security."

A group of bigwigs in the field of antivirus in the industry clinked glasses and formulated a strategy to jointly boycott 360.

It should be said that it is still very effective for a group of big brothers to boycott 360 together.

Not to mention from the perspective of market performance, 360 has been suppressed from the perspective of momentum.

However, although 360's momentum was suppressed, various small ideas of 360 were implemented as scheduled.

The first is the boot time rankings.

In addition to recording the boot time of users, this leaderboard will also make a ranking of your boot time and the boot time of all users in the country.

Although this seems like a small setup.

But it is such a small setting. Once it was launched, it quickly attracted a lot of users.

"I'm going, why is my startup time so slow, and it ranks last in the country."

"Hahaha,

My boot time is ranked more than 99% in the country, everyone, it's awesome. "

"666, upstairs, why is your boot time so short, only 7 seconds."

"Hey, simple, I'll teach you."

This boot time screenshot competition has become a key point of user interaction.

Not only do they take screenshots of each other and compare who's boot time is faster, they also share how to reduce boot time.

Undoubtedly, how to reduce the time, then you have to use 360 ​​for more in-depth optimization.

The first step is to clean up the trash.

The second step is to clean up the plugin.

The third step is to clean up the startup items.

The third step is system optimization.

The average user is using 360 just to clean up the garbage and clean up the plug-ins.

However, with such a boot time ranking, they even understood the cleanup of the startup items.

And, some users have gone a step further, suspending a slew of unwanted services.

For example, many services that do not need to be started can be turned off directly.

Startup not only affects the speed of the computer, but also wastes resources.

After going back and forth, the original computer novice turned into a computer expert.

Even if you haven't become a computer expert, under the introduction of such a small setting, many users will not naturally recommend everyone to use 360.

What is the best publicity?

The best publicity is word of mouth.

This way of taking screenshots from time to time and interacting with netizens from time to time, the reputation of 360 Security Guard exploded in minutes.

...

"Zhou Hongyi is really amazing."

Seeing that 360 was under the siege of the three major antivirus software manufacturers, its market share continued to increase, Chen Yu secretly praised it.

Although Chen Yu gave Zhou Hongyi a lot of ideas before, Zhou Hongyi went further on the basis of Chen Yu.

For example, in addition to launching the boot time rankings, Zhou Hongyi secretly came up with a malware poll.

This vote is cast by users themselves.

You can vote for the software you don't like and want to uninstall.

This kind of setting that allows users to participate in person makes 360 more interesting.

Not only that, Zhou Hongyi also developed a skin download function in 360 Security Guard.

The so-called skin download is the computer desktop download.

The general desktop download is only a background image replacement, but the 360 ​​skin download function can not only change the background, but also completely customize the settings of a series of icons on the operating system.

It's kind of like a background download on your phone.

In addition, for 360 Security Guard, Zhou Hongyi also created a daily update function.

This update refers to updating system patches and updating system vulnerabilities.

The three major anti-virus software manufacturers also do such a function. However, their updates are generally updated every seven days, and some are updated once a month.

This is normal in itself.

Where the system is updated every day, how can windows find vulnerabilities every day.

But Zhou Hongyi didn't do this, he was completely opposite to them.

You update it once a month, and Zhou Hongyi updates it once a day.

No, update several times a day.

What, you said not so many updates?

This is not simple. It turns out that hundreds of updates are updated in batches.

Even if there is no update, is it okay to have a fake update?

This update frequency also greatly increases the frequency of users using 360.

Undoubtedly, in such an update, the user's viscosity for 360 is also increasing.

The longer they use it, the more they can't live without the 360.

This is inseparable, but it does not mean that the 360 ​​must be used.

But this kind of daily update and daily operation can form a habit.

Once a habit is formed, without it, they will be miserable.

Even if they reinstalled the operating system, they would download the 360 ​​as soon as possible.

Not for anything else, just because they are used to it.

As soon as such a method was used, Chen Yu had to admire it.

Not to mention, this is for the three major antivirus software manufacturers.

Just a few settings, the security assistants of the three major antivirus software were killed by 360.

It can even be said that the three major antivirus software manufacturers did not even respond, but they found that the system assistants they launched were uninstalled by many users.

As for why uninstall.

Because they are going to use 360.

Of course, there are some users who don't understand computers very well. While using Kingsoft Assistant, they also downloaded 360. So, at this time, you can see such a phenomenon that there are several system security assistants on a computer.

But soon, for such a phenomenon, 360 shot directly.

If you have 360, you can't have Jinshan, let alone Jiangmin, and you can't have Rising.

In this way, the three assistants were killed in an instant.

...

"what's going on?"

"Is 360 Security Guard really so useful?"

"Impossible."

Qiu Bojun did not understand something.

Jiang Min also had some headaches in his head.

The little lion on Rising's side also slept.

They only do traditional antivirus software, and they really can't understand interactive social software.

In fact, it's not just that they can't understand.

Many people who do traditional software can't understand it.

In the eyes of these traditional software development companies, a series of software only needs to implement various functions.

For example, anti-virus, as long as the anti-virus is done to the extreme.

Another example is office software, as long as the functions of various office software are realized.

But they don't know that some of the traditional software's play style can't adapt to this era.

Under the influence of the Internet, many companies with little technology have surpassed the giants in the eyes of the world step by step by relying on this social interaction method.

This is a change of times.

Keep up, and you'll hit new heights.

If you can't keep up, you can only get out.

The big three antivirus software companies probably don't know it yet.

A few years later, because of the appearance of 360, they disappeared from the public's sight.

Chapter 447/1195
37.41%
Rebirth of Cyber ​​HegemonyCh.447/1195 [37.41%]