. The newly written anti-virus firewall, under the hands of Shi Lei, who is the world's top hacker, lasted for half an hour without crashing, which already illustrates its excellent performance.
But Shi Lei just ignored a problem. He always thought about fighting the anti-virus firewall head-on, but he never thought of another way, directly attacking the anti-virus firewall?
In normal intrusions, many times the anti-virus software and firewall are first targeted, first breaking the firewall's defense, and then penetrating the anti-virus software to terminate all defenses of the target.
Shi Lei pretended to have normal access and entered the old laptop through port 80. He did not change other settings, but directly detected the anti-virus firewall.
Although the newly written anti-virus firewall can protect all targets that need to be protected, it cannot protect itself!
Shi Lei invaded the anti-virus firewall, controlled the anti-virus firewall, modified the settings of the anti-virus firewall itself, changed the targets that needed to be protected, and unlocked access restrictions.
The anti-virus firewall that changed the settings had no defense and was directly changed by Shi Lei successfully!
The entire process took no more than three minutes. The originally invincible defense collapsed from itself and became extremely fragile.
Shi Lei frowned, exited from the old notebook, then opened the source code of the anti-virus firewall and made some new modifications.
The newly written anti-virus firewall did not have enough defense power for itself, so Shi Lei increased its power in this area. In addition, there was another most important drawback.
That is, you can directly change the settings of the anti-virus firewall on your computer!
Is there a way to lock the anti-virus firewall settings and prohibit modification of the anti-virus firewall settings on the computer?
It is forbidden to modify the anti-virus firewall settings on the computer, so how to modify the settings?
Shi Lei accidentally caught a glimpse of the high-definition camera on the No. 1 server chassis, and a flash of light flashed through his mind again!
"That's right! Why am I so stupid! I have a treasure mountain, but I don't know how to use it!" Shi Lei muttered to himself, and began to modify the source code of the anti-virus firewall.
Prohibiting modification of settings on the computer does not really mean not allowing modification of settings on the computer. If that were really done, what else would it be called computer software?
The so-called prohibition of modifying settings on the computer means that it is not allowed to modify settings directly through the computer without authorization. Just like Shi Lei just did, by simulating normal access, after entering the system, he directly modified the protection list and access rules of the anti-virus firewall
.
Shi Lei embedded a behavioral dynamic capture program into the anti-virus firewall and used the behavioral dynamic capture program to create a solid shell to prevent people from cracking in.
If you want to modify the settings of the anti-virus firewall, you must be certified by the behavioral dynamic capture program. In other words, Shi Lei needs to use a high-definition camera to complete it in reality. He cannot modify the settings directly on the computer alone!
After making the behavioral dynamic capture program into a solid shell, Shi Lei encapsulated the entire anti-virus firewall again and copied it to his old laptop through a USB flash drive for installation and debugging.
After confirming that the anti-virus firewall was successfully running on the old laptop, Shi Lei started to invade the old laptop through Server 1 again.
This time, Shi Lei disguised himself as the last time and entered the system through port 80 in an attempt to modify the anti-virus firewall settings.
Unfortunately, the hard shell made by the behavioral dynamic capture program protects the anti-virus firewall. If you want to change the settings of the anti-virus firewall, you need to verify the behavioral dynamic characteristics!
In other words, not only the actions must be consistent, but the dynamic characteristics of the behavior must also be consistent before you can enter the settings page!
Shi Lei got into trouble with the behavioral dynamic capture program and used all kinds of methods. However, these methods couldn't come in through port 80.
Whether it's a virus, Trojan horse, or puncture, it has no effect at all.
Seeing that he could not solve the problem of the anti-virus firewall, and after adding that the previous intrusion test from the outside was ineffective, Shi Lei directly tried the last resort.
The last resort is to use huge data flow to attack the anti-virus firewall.
Although the anti-virus firewall is powerful, the performance of the machine equipped with it is always limited. Shi Lei wants to see what will happen to the old laptop after the machine's limit load is exceeded.
Through the No. 1 server, connect to the public server of Shuangqing University, allocate the resources of the Shuangqing University public server, and unite with the No. 1 server to launch a unified attack on the old notebooks!
Shuangqing University's public server, even though a large amount of resources are occupied by the campus security system, far exceeds the performance of old laptops.
Under the impact of the huge amount of data, the CPU usage of the old notebook increased rapidly, and the temperature continued to rise. When it reached the safety limit, the old notebook crashed directly!
Seeing the result of the crash, Shi Lei was not surprised. The old laptop restarted, and the anti-virus firewall automatically started randomly and continued to perform its duties to protect the security of the old laptop.
After passing the brute force test, Shi Lei was very satisfied with the performance of the anti-virus firewall.
What else is there to be dissatisfied with?
At least Shi Lei couldn't break through the defense of this anti-virus firewall. No matter what method he used, it would be deleted or rejected by the anti-virus firewall.
As the world's top hacker, Shi Lei cannot break through the anti-virus firewall. Can anyone else break through it?
Shi Lei dared to say that such a person did not exist!
In other words, such a person, the world's top hacker known to Shi Lei, will never be able to break through!
The newly written anti-virus firewall is a one-trick defense. Even if someone hacks into the system, it cannot prevent the anti-virus firewall from running.
Once you touch the defense rules, you will be cleared out directly!
Take the Moon virus as an example. Although the Moon virus can be browsed normally through a browser and then enters the system in the form of cached temporary files, when it wants to form a disk-resident virus, or it wants to infect pictures of other protected files.
When you open a file, it will be deleted by the anti-virus firewall!
Shi Lei is full of absolute confidence in this newly written anti-virus firewall.
Compared with Panshi Firewall, the newly written anti-virus software is many times more powerful!
Shi Lei named the newly written anti-virus firewall - Endless Defense!
It means that the defense of this anti-virus software has no end, only endless defense!
After confirming the availability of Endless Defense, Shi Lei immediately encrypted the source code of Endless Defense using a behavioral dynamic capture program and stored it separately in a USB flash drive.
On Server 1, the Rock Firewall retreats behind the scenes, and the new Endless Defense provides the latest defense support.
Seeing that Endless Defense was installed on Server No. 1, Shi Lei yawned loudly, stood up and locked Server No. 1. At this moment, it was already dark outside the window. Shi Lei washed up a little, then lay down on the bed and fell asleep.
I stayed up all night and couldn't bear the pain!
In the country of Wosang, on the Internet, Raphael laid many traps, waiting for Mr. M to appear. After waiting all night, he didn't even see the ghost of Mr. M!
Raphael, whose efforts were in vain, decided to wait a little longer.
Raphael is on the other side of the world, and the time there is exactly the opposite of the time here. An all-nighter in Wasang, Nanchao, and Xia is just a day on Raphael's side.
One day is nothing to Raphael, and Raphael is prepared to wait for another whole night. According to Raphael's idea, Xia Kingdom, Wosang Kingdom and Nanchao Kingdom are in daytime. Maybe Mr. M likes to act during the day?
The second generation moon virus broke out around nine o'clock in the daytime in Wosang Kingdom!
Time flew by, and it was close to five o'clock in the afternoon. Classmate Shi Lei, who had stayed up all night, finally got up in a daze. On the other side of the world, where Raphael was, it was already close to five o'clock in the morning.
Raphael, who was filled with anger after waiting, couldn't bear it anymore. He controlled his supercomputer Lei and easily captured the official website of NHK TV station, leaving a baffling announcement.
'Mr. M, you damn despicable thief, now I solemnly warn you to return the things you stole to me quickly. Otherwise, no matter where you are in the world, I will find you and cut you into pieces!'
There was no signature and no sign. Raphael didn't want to cause trouble in the Wasan Country. After all, the International Intelligence Bureau of the Ministry of Foreign Affairs was not an easy person. Raphael would be annoyed if he was targeted by them.
NHK TV station is unlucky!
NHK TV station has been injured many times before and after. Every time hackers invade, the official website of NHK TV station cannot be forgotten.
This time Raphael also subconsciously used the official website of NHK TV station. Maybe he also thought that the official website of NHK TV station was the best to invade!
When Shi Lei finished washing, he unlocked the behavioral dynamic capture program of Server No. 1 and checked the situation of the moon virus in Wosang Country. He also checked the news on TBS TV station.
From the news of TBS TV station, Shi Lei discovered the information that the official website of NHK TV station had been hacked again, and also found Raphael's message.
From Raphael's message, Shi Lei instantly judged that it was Raphael!
Shi Lei once stole the fruits of Raphael's victory in Sumida District, Tokyo, and thus became a grudge against Raphael. Fortunately, he used Mr. M's vest, otherwise he would be remembered by the Angel Council, which would not be a good thing!
However, after the endless defense was successfully developed, Shi Lei didn't seem to be too afraid of the Angel Council as long as he had the supercomputer Yan in hand!
Endless Defense is different from Panshi Firewall in that it has no special features. It only has two moves, deletion and access denial. In other words, if there are no corresponding features, you are not afraid of being exposed!
Even if the International Intelligence Bureau of the Ministry of Foreign Affairs besieges Shi Lei again, Shi Lei can calmly use endless defense to resist the International Intelligence Bureau of the Ministry of Foreign Affairs.
As long as the server running Endless Defense has sufficient performance, it can withstand any attack!
"Raphael, do you want to have some fun? Then let's have some fun!".
(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)