typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk256 brand new antivirus firewall, successful? (700

. Jing Yayuan, Shi Lei deleted less than half of the source code of the virus-free antivirus firewall, and he had a new idea in his mind.

There are indeed thousands of types of computer viruses, even endless. It is even possible to make an anti-virus software contain all the virus signatures. But computer viruses are being innovatively born every moment.

, there are always things that anti-virus software cannot recognize!

Shi Lei was over the top at first, desperately trying to defend against all viruses without configuring a virus signature database. The only anti-virus firewall that could achieve this effect could only be a true artificial intelligence program.

Artificial intelligence programs, at this stage, are just beautiful nonsense!

In other words, it is impossible to have anti-virus software that can accurately identify all viruses and automatically defend against them without configuring a virus database!

Although this kind of anti-virus software does not exist, it does not mean that such an effect cannot be achieved. Just like going to Rome, you do not have to take a plane. You can also use other means of transportation to achieve your goal.

The moment Shi Lei deleted the source code of the anti-virus firewall, he thought of a brain teaser.

A brain teaser about how to put the sea into a gourd. The answer is to put the sea outside the gourd!

From this brain teaser, an idea suddenly flashed in Shi Lei's mind.

Why do you have to identify viruses?

There are too many types of computer viruses. Even if there are a large number of virus signature databases, we cannot say that we can completely identify viruses, but there is no requirement to identify viruses!

Thinking about it like putting the sea outside the gourd, if you can't identify all computer viruses, you simply don't identify computer viruses, and instead identify computer files that need protection!

Computer system files are fixed and will not change endlessly like computer viruses.

An anti-virus firewall software can be designed to directly protect computer system files and files that need to be protected, while ignoring computer viruses and illegal malicious data packets.

If any computer virus or illegal data packet attempts to modify a protected file, delete it directly!

There is no need to identify whether the unknown file is a computer virus or other unknown data package. As long as it has malicious behavior, it will be deleted directly.

For example, the system of Server No. 1 is a system that Shi Lei independently modified the kernel based on the Linux system. The system file of this Linux system is a fixed file and will not change like a computer virus. It will always change.

.

Shi Lei only needs to design a software to protect the files of the entire system, and add other files that need protection in the No. 1 server to the protection sequence.

Once there is any virus or illegal data packet, and Shi Lei accidentally invades the No. 1 server and wants to modify the system settings, the system will change the configuration file, causing changes to the protected files, and then trigger the protection program, directly deleting the attempt.

Files that modify system settings.

No matter what kind of virus that file is, or a junk file released by an illegal data package, the anti-virus software does not need to know. The anti-virus software only needs to know that the system it protects is not compromised.

Once there is any file that attempts to infringe the system files or protected files, the anti-virus software immediately terminates its memory process and then deletes it!

Designing an anti-virus software in this way has achieved Shi Lei's original intention. It does not have any virus database, but it can kill any virus!

After thinking about it carefully in his mind, Shi Lei could definitely make such a protection program!

After figuring out the anti-virus firewall mode, Shi Lei immediately started writing code in the programming software. His fingers were flying on the keyboard like a beautiful butterfly.

In the online world, in the voice communication channel of the core layer of the Hacker Alliance, Black Heart, who is ranked tenth at the bottom of the core layer, shouted: "Black devil, nigger, have you two researched anything? Can that moon virus be cracked?"

How could the Moon Virus be hidden from the Xia Kingdom's hacker alliance when the Moon Virus broke out in the Wosang Kingdom?

As the representative of the hacker community of Xia Kingdom, the Hacker Alliance is responsible for monitoring the hacker community of Wosang Country. Observing the online world of Wosang Country at any time is one of the daily tasks of the Hacker Alliance.

When the Black Demon and the Black Ghost were browsing the Wosang Kingdom's network, they discovered that an extremely powerful virus broke out in their network, which was even more difficult to deal with than the Sakura virus that broke out in the Xia Kingdom!

"Black heart, don't worry, don't worry, we are studying it. The structure of the moon virus is very simple, it just controls the computer to perform low-level formatting, but its propagation mode and packaging processing are very advanced, and we cannot open it for the time being."

The ghost's mantra is 'Don't worry'.

Black Heart snorted: "I'm not in a hurry! Boss Black Knife is worried! Boss Black Knife is worried about the introduction of the Moon Virus into our Xia Kingdom. I really don't know what Boss Black Knife is thinking. These things should clearly be the responsibility of CNS and the four major network security bureaus.

What are you worried about, Boss Black Knife, what are you worried about!"

The dark devil's muffled voice came out, and I don't know if his voice has been processed by an electronic voice changer. It sounded very strange, as if something had strangled his neck.

"Don't worry about this. We have discovered the existence of IP restrictions in the Moon Virus. As long as our Xia Kingdom personnel do not jump to the IP browsing of Wosang Kingdom, they will not be infected by the Moon Virus!"

Black Heart asked curiously: "Black devil, nigger, are you talking about the moon virus caused by Mr. M? Although Mr. M issued a statement on the NHK official website, after the moon virus broke out, Mr. M

The mystery disappeared without any news!"

"Black Heart, don't worry, you will know when the time comes. If it is really Mr. M, I estimate that Mr. M will come forward and admit it. If it is not Mr. M, the International Intelligence Bureau of the Ministry of Foreign Affairs of Wasang Country will also come forward and make an announcement."

The nigger said with a smile.

"Hmph! Nigger, can you stop saying not to be anxious?" Black Heart was a little annoyed, "Black Devil, this time Wosang Country is in trouble, why don't we, the Hacker Alliance, launch another attack on them? It's the end of the year.

Give them New Year’s gifts in advance!”

Hei Mo said in a sullen voice: "Ask the boss of Black Knife! Nigga, let's go to the encrypted channel. This kid Black Heart is making a lot of noise!"

As expected, the nigger and the black devil set up an encrypted channel to exclude the black heart and make the black heart groan.

"Hmph! You two virus maniacs! I'll contact my second brother to instigate him and let him organize a third invasion of the Wosang Kingdom this year!" Black Heart muttered to himself in a low voice.

The second brother he talks about is Black Tiger, the second in command of the Hacker Alliance.

Black Tiger is impulsive, and his technology is biased toward offense and invasion, so he is very interested in invading the country of Wosang.

Taking advantage of the outbreak of the Moon Virus, the Hacker Alliance may launch the third cyber war of 2006 against the Wosang Kingdom!

Jing Yayuan and Shi Lei have been completely obsessed with writing a new anti-virus firewall.

Based on the theory of reverse thinking, Shi Lei made the entire anti-virus firewall go from nothing to some outline, and then gradually became full-fledged.

After four o'clock in the morning, Shi Lei stretched out, and his spine and waist made a sound of joints. Looking at the program being debugged line by line, Shi Lei's eyes showed a look of satisfaction.

After more than eight hours of non-stop struggle, Shi Lei finally programmed the anti-virus firewall in his mind.

Watching the line-by-line debugging on the console, one by one passed, the smile on Shi Lei's face became more and more obvious. It took more than an hour to finally complete the debugging of all the codes of the entire anti-virus firewall.

There were some minor errors. During the line-by-line debugging process, Shi Lei completed the modifications one by one. After confirming that they were correct, Shi Lei clicked to run the newly written anti-virus firewall.

The anti-virus firewall ran smoothly. After just a few minutes, Shi Lei closed the anti-virus firewall and began to encapsulate and secrete the anti-virus firewall.

The encryption process relies on the behavioral dynamic capture program to make the encryption of the entire program impeccable.

After the packaging is completed, copy it through a USB flash drive and install it on the laptop. This laptop is Shi Lei's old notebook before he started school.

The notebook brought back from Wosang Country was sold to the Shuangqing Municipal Bureau together with the steel number because it was equipped with the FCH system.

After installing the newly written anti-virus firewall on his old laptop, Shi Lei first began to set the protection list, as well as the access rules and packet filtering rules allowed by the firewall.

After setting it up, Shi Lei started the anti-virus firewall, and then used Server No. 1 to invade his old laptop.

The performance of Server 1 is better than that of high-end personal computers, and is about ten times that of old laptops. With Shi Lei's technology, it is almost easy to hack into old laptops through Server 1.

However, this time, Shi Lei ran into trouble!

The email bombs and Trojan viruses sent through the No. 1 server were directly and unceremoniously deleted by the fire protection software, making it impossible for them to enter the old laptop.

Although the system resources of the old laptop were almost all occupied by the anti-virus firewall when Shi Lei attacked, it still resisted tenaciously.

Seeing that virus Trojans and email bombs couldn't get in, Shi Lei changed his approach and chose a system vulnerability in a laptop, trying to get in from the outside through the system vulnerability in the laptop.

However, when Shi Lei invaded the vulnerability, he was directly blocked by the anti-virus firewall. Unpermitted normal access could not pass the restrictions of the anti-virus firewall and was rejected.

Shi Lei was surprised. He was attacking system vulnerabilities, but the anti-virus firewall could actually defend against it!

After testing for more than half an hour, the No. 1 server's performance was ten times better than that of the old laptop. Coupled with Shi Lei, the world's top hacker, he was unable to defeat the anti-virus firewall.

Instead of being angry, Shi Lei laughed happily!

Antivirus firewall without virus signature database was successful!

Shi Lei, who was excited, tried again, pretending to be a normal access, and entered the system of the old laptop through port 80.

The disguised normal access successfully deceived the anti-virus firewall, but Shi Lei could not perform any operations, otherwise it would trigger the anti-virus firewall and let it automatically defend.

Shi Lei did not touch other settings, but attacked the antivirus firewall itself on a whim.

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next