With the popularity of Wi-Fi devices such as laptops and smartphones, home routers have gradually become the core of home Internet. The recent hotly discussed backdoor incidents of mainstream brand routers have made the security of such devices that we "only use but don't use" in daily life worrying. Faced with this new threat, 360, as a well-known domestic Internet security manufacturer, took the lead. After integrating the new feature of "home network management" into the PC-side "360 Security Guard", it continued to work hard and launched the "360 Security Router" terminal product with the real router security as the primary purpose. In-depth understanding of the characteristics of security routers and what new ideas 360, a software company, will bring to router products make our product experience this time particularly meaningful. The unique appearance combined with powerful hardware is the first to bear the brunt. The packaging of 360 Security Router is definitely enough to "catch the eye". In the past, the "tactical briefcase" style that the graphics card bosses in the PC industry liked to use for their flagship products was used by 360 to package router products. However, this rigorous and steady style is also very consistent with the product's positioning of focusing on security. Fortunately, after opening the "suitcase", the internal product layout is not too "feverish". The router host, separate antenna, power adapter and network cable are the main parts of the product. For general users, it is not difficult to install. The workmanship of the router host is still very fine. The design similar to the flying saucer shape gives people a visual sense of "floating". There is a Wi-Fi indicator light that can display the working status of the router under the 360 logo on the front. The machine interface is concentrated at the rear end of the fuselage, including the antenna, power interface, "one in and two out" network cable interface, standard USB expansion port and a reset button. It is particularly worth mentioning that the surface of the whole machine is treated with skin-like material. Students who are familiar with Google Nexus products must be familiar with this. The back cover of the latest Nexus5/7 products is made of this material. As a loyal Google fan, the author also quite approves of this design of router products. In terms of hardware parameters, the 360 security router uses Qualcomm AR9344+AR9882 processing chips, built-in 128M memory and 32M flash memory space, adopts the 802.11ac standard, and supports 5GHz and 2.4GHz dual-band 1200M wireless transmission. From the actual experience, the router has shown a good signal strength level. In the test, under the initial setting of the router, whether there are obstacles between the networked device and the router, the signal strength of the 360 security router is better than other products of traditional router manufacturers. Optimize the interface design and improve the PC-side experience. "360 Security Guard" and other mature PC-side products have left a deep impression on people, which also makes us look forward to 360 Security Router's breakthrough in the interactive interface design on the PC side. After connecting to the router wireless network, open any page in the browser on the PC or enter "luyou360.cn" in the address bar to access the router setting page. After completing the guidance of the router networking and password setting, the router will automatically restart to allow users to connect again in the form of a password. Setting up the router again requires two steps: logging in to the account and setting the management password. This can be regarded as setting up the most basic double defense at the "door" of the router, reducing the risk of malicious intrusion on the router. The main setting interface is designed to be divided into eight partitions. When the mouse moves to the partition icon, the main information of the corresponding area will be dynamically displayed. The idea of simplifying the operation is still very user-friendly. In terms of security, the design idea of the router system is more about integrating the protection function of the 360 PC security software for the router into the hardware terminal of the security router. Operations such as connection device management and control, security level assessment, and network fault analysis can now be achieved directly through the router. As a major feature of the product, the ability to manually adjust the signal strength of the router is a unique highlight of the product. On the one hand, reducing the signal strength of the router in an unnecessary environment can reduce environmental radiation and is beneficial to health; on the other hand, controlling the signal coverage of the router for different usage areas can also reduce the probability of "freeloading" by others and improve the family network security index. The mobile app creates a new mode of mobile terminal control of the router. Some people may say that the various operations of the 360 security router on the PC side can actually achieve 70% to 80% of the effect of ordinary routers with 360 security software, but if the intelligent joint control function of the 360 security router and terminal devices such as smartphones is mentioned, it is estimated that it will be the most competitive killer of this product. In the PC setting interface, the "Mobile Remote Control" section can obtain the download address of the mobile app. After entering the mobile app and entering the 360 account to log in to the software, the mobile phone will automatically search for the surrounding 360 security router products to start pairing. After pairing is successful, you will find that the mobile terminal is the real focus of the 360 security router. The special functions of various products are controlled through the mobile app. The App will first test and optimize the network environment of the router, and can detect Wi-Fi signals of two frequency bands at the same time to reduce the impact of the external environment on the stability of the wireless network. The App also has more comprehensive information on the control of networked devices. In addition to being able to view the number of devices and set a blacklist, it can even display the terminal's network type in the device list. "Eating alone" and "password-free Internet access" are also important features of the product. The former can manually adjust the allocation of LAN network resources to bias the network speed to devices with greater demand; the latter is like the "guest mode" turned on by the router. During special family activities such as friends' gatherings, devices within a certain range can be connected to the router without a password within a certain time limit. In the mobile phone App, there are also functions for updating the firmware of the router and timing the wireless switch. For the current stage where Internet hacking with the help of routers is becoming more and more frequent, this setting will undoubtedly further ensure the security of the router during non-working hours. In addition, we also found in the test that even if it is not connected to the 360 security router, the terminal device in hand can still control the status of the router in different network environments, which also makes it possible for us to control the network environment at home when we are away from home. Summary: The new product actually creates a new model . The purpose of the birth of the 360 security router is to maintain the security of home routers. From the product development ideas, the security control of the software link and the SOS security system developed by 360 for the router, 360 has done a good job in this regard. But if we look at the way the router is operated, the device that we originally set up once and would not touch again can interact with our PC and smart devices in a simple and intuitive way on this 360 product, becoming interesting and diversified, creating the prototype of a new product model. Many people think that in the future deeply networked home environment, routers will become a vital part of the development of smart homes. The idea of interactive integration of multiple devices and routers brought to us by 360 security routing is more worthy of further exploration. As a winner of Toutiao's Qingyun Plan and Baijiahao's Bai+ Plan, the 2019 Baidu Digital Author of the Year, the Baijiahao's Most Popular Author in the Technology Field, the 2019 Sogou Technology and Culture Author, and the 2021 Baijiahao Quarterly Influential Creator, he has won many awards, including the 2013 Sohu Best Industry Media Person, the 2015 China New Media Entrepreneurship Competition Beijing Third Place, the 2015 Guangmang Experience Award, the 2015 China New Media Entrepreneurship Competition Finals Third Place, and the 2018 Baidu Dynamic Annual Powerful Celebrity. |
<<: Analysis of mobile phone camera sensors
When it comes to mantis shrimp, many people will ...
Have you ever noticed this phenomenon: the tips o...
When it comes to information flow , I think most ...
Battle reports can be deceiving, but battle lines...
Why is Apple's hardware design so elegant and...
At 20:30 on February 6, 2025, Huang Xuhua, an aca...
With the development and popularization of artifi...
The bonus period of live streaming has not yet pa...
Are you ready to switch to a 5G phone? Before ans...
Course Description Plan 1: Analysis of new etique...
WeChat food ordering applets can be seen everywhe...
Garlic is a common condiment in the kitchen. Dump...
If a friend tells you that sound can propagate in...
Zhang Xiaolong said: Even the smallest individual...