Defect another world

Chapter 15 I Don't Believe! ! !

Chapter 15 I Don't Believe! ! !
Although he hates it, Meng Fei actually understands him quite well.

A company is a group of people who join forces to survive in this world.

This is nothing gentle, either live or go home.

There are other companies in this world that are doing everything possible to bring you down and replace you all the time.

The same is true within the company.Each group is a few people bound in a small boat desperately trying to survive.The opponent is another group of the same company.

Only when the group succeeds can it get resources and continue to develop.As development goes on, the group can become several groups, and several groups can become one department, and everyone will rise step by step.

If you fail, the team disbands, the group disappears, everyone packs up and goes their separate ways, each seeking a future.

Do you think that everyone in the company plays their own roles, fulfills their duties, and stays together forever?That was a state-owned enterprise 500 years ago.

What is it now?Embrace change.The organizational structure of a company changes every day.Any branch or leaf that does not grow or bear fruit will only wither and die.

Whether it is Liu Gang from the development team or Ouyang Cong from the vulnerability team, they are actually the same, but their methods and styles are different.

"fart!"

As soon as Liu Gang finished speaking, a fat man with a round face almost exploded on the spot.Fatty Chen is one of the main force of the vulnerability team to write code. He has a simple personality and a hot temper.

"A lot of bugs are obviously brought up by us. You find various reasons but don't change them. In the end, you are complained by customers. Are you embarrassed to beat them here?"

In the darkness, a sneer appeared on Liu Gang's face.This is what he wants.

Although the few words he said were poisonous enough, they would never actually cause the vulnerability group to be revoked and merged into the development group.

But the more someone in the vulnerability group swears in front of the big boss, the more it will leave President Luo with the label that the team is grumpy, difficult to cooperate, and difficult to manage.

What's the use of technology?If there is no communication, cooperation, and management, not only will it not create any value, but it will be a ticking time bomb.

Seeing that the situation was about to explode, Roan said calmly: "Chen Han, what specific bugs have not been corrected, and finally were complained by customers. You can give one or two examples, and we will review them."

At this time, it was Fatty Chen's turn to speak generously, but he suddenly turned off the flame, opened his mouth wide, but couldn't utter a word, as if he was filled with invisible glue.

Although they are the same vulnerability discovery group, their division of labor is still different.Fatty Chen can't die when he writes code, but he is mainly responsible for developing tools related to vulnerability discovery, not debugging bugs.

His conclusion only came from an impression: he saw that their group kept sending out emails reporting bugs, while the security development team kept replying to emails explaining the reasons for no modification, and the two sides often quarreled.

But he doesn't know exactly which bug corresponds to which problem the customer complains about.

Customer complaints tend to be:
"Flashback again!"

"My computer always blue screen!"

"Last night I was stuck opening a file for a long time!"

Such vague complaints, who knows which line of code is the problem?

In principle, the customer's complaint should be followed up by the development team, which has nothing to do with the vulnerability team.

Liu Gang threw all the problems to the vulnerability group, but he was just stealing the concept of bugs and vulnerabilities.

But what it shows is that the people in the vulnerability group are short-tempered, unable to communicate, ignorant of the customer's troubles, and slanderous...

It was the perfect situation he wanted.Therefore, Liu Gang didn't say a word at this time, and sat down and watched the play with satisfaction.

"Mr. Luo, I have an example. Let me review the recording. Let me pick up the projector." After less than half a second of silence, Meng Fei suddenly chuckled, breaking the awkward atmosphere.

"Okay." Roan nodded.

On the big screen, Meng Fei's dark blue tone, cool sci-fi style desktop immediately appeared.

This notebook is the development notebook he used in the company. Although it is not the same as the one at home, the theme style is not much different.

Meng Fei opened Notepad, then switched the input method, and then made a series of keyboard hits to enter a sentence.

But his words were not immediately entered into the notepad.Input method card master.

The input method's window is expanded, and an icon keeps spinning there, but the expanded part is always blank and doesn't show anything.

"I wonder if Mr. Luo ever encountered a situation where he got stuck while typing?"

Roan nodded and said, "I have encountered it."

It was a problem for him, but not a big one.

When a word gets stuck, he presses ESC to exit the input, and then re-enters it, often just fine.Besides, there are not many such cases.

"Has Luo always noticed that this only happens on the company's intranet, never at home?"

Roan thought about it carefully and said, "It seems to be true."

Does it only happen on the company intranet?That is to say, it has something to do with the company's intranet only having a certain system?
Is it...

The intranet security system will actually affect the user's input method?
This is a bit irrelevant.

Liu Gang's relaxed and relaxed gaze became a little dignified.He had roughly guessed Meng Fei's intentions, and immediately stood up and interrupted:

"When have customers complained about such a small problem?"

"Haha," Meng Fei clicked the mouse, opened the mailbox, and instantly found a "User Feedback Information Bulletin" from more than a month ago, one of which was:

"There is feedback from users that after installing the intranet security system provided by Mantis Software, the input method will occasionally become stuck.

"The development team's investigation conclusion: It has been tested and cannot be reproduced. It is guessed that it is caused by the problem of the input method itself, the probability of occurrence is low, and it is not related to the security system, and the problem is closed."

Liu Gang almost scolded.

Hundreds of thousands of user feedback are received every day. You remember the emails for more than a month so clearly. Isn’t this a premeditated plan? ? ?
In fact, not only Liu Gang was shocked, but even the other members of the vulnerability group were also shocked.

Meng Fei hasn't said a few words after working for five or six years. When did he become so articulate and persuasive?
"What evidence do you have that this problem is related to the intranet security system?"

Liu Gang held the last glimmer of hope that Meng Fei had not actually investigated the issue, but was just guessing.

If Meng Fei just guessed without evidence, he could give a hundred reasons to get rid of the matter.

Even if Meng Fei finds evidence and sends it to Roan in the future, that will change over time, and the blow to the development team will become very small.

Until then, he just needs to work harder and get better grades.

The corner of Meng Fei's mouth twitched, and he said, "I am not only sure that this problem is related to the intranet security system, but it can be repaired on the spot."

Liu Gang's face was a little weird with shock.

Repair on the spot?

Are you kidding me?
Do you want to change the source code of the intranet development system on the spot, fix the bug, and then compile, install, and verify it on the spot?

This is not possible.

Because he does not have the source code of the intranet security system.

For Liu Gang, the source code of the intranet security system is his lifeblood.If there is source code, he has it, and without source code, he has nothing.

Except for the person who directly developed it, himself and his immediate boss, Roan, he did not open the source to anyone at all.

For the vulnerability discovery team that is in close contact with the business, he is even more fire-proof, theft-proof and loophole-proof!
Therefore, the vulnerability group finds vulnerabilities through black-box attack testing, rather than directly reading the source code.

If another group has his source code, it means that other groups can replace his work at any time. What is his irreplaceability?
In an emergency, Roan can download his code and deliver it to another group to continue development.But actually Roan wouldn't do it.He would not do such a thing that would displease Love.

Can you fix bugs without source code?

I do not believe! ! !
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like