Hk256 Brand New Antivirus Firewall, Successful? (700 Plus More)
In Jing Yayuan, Shi Lei deleted the virus database and antivirus firewall and wrote a small part of the source code. He had a new idea in his mind.
There are indeed tens of thousands of types of computer viruses, even exhaustive. If you want an anti-virus software to include all virus signatures, even if it is really possible. However, computer viruses are born with innovation every moment, and there are always anti-virus software methods to identify them!
Shi Lei tried his best to defend against all viruses without configuring a virus signature database. An antivirus firewall that can achieve this effect can only be a real artificial intelligence program.
AI programs, at this stage, are just a beautiful piece of shit!
In other words, it is impossible to have antivirus software that can accurately identify all viruses and automatically defend against viruses without configuring a virus database! [
Although this kind of antivirus software does not exist, it does not mean that such an effect cannot be achieved. Just like going to Rome, you do not have to take a plane, but you can also use other transportation to achieve the goal in a different way.
The moment Shi Lei deleted the source code of the antivirus firewall, he thought of a brain teaser.
The brain teaser about the sea in the gourd, ask how to put the sea in the gourd, the answer is put the sea outside the gourd!
From this brain teaser, a flash of light suddenly flashed in Shi Lei's mind.
Why do you have to identify the virus?
There are too many types of computer viruses. Even if there are a large number of virus signature databases, it is impossible to say that viruses can be completely identified, but there is no requirement that viruses must be identified!
Thinking in a different position is like putting a sea suit on the outside of a gourd. You can't identify all computer viruses, so you don't identify computer viruses at all, and instead identify computer files that need to be protected!
The files of the computer system are fixed and will not change endlessly like a computer virus.
An antivirus firewall software can be designed to directly protect computer system files and files that need to be protected, while ignoring computer viruses and illegal malicious data packets.
Any computer virus, or illegal data package that attempts to modify the protected file, delete it!
There is no need to identify unknown files at all, whether it is a computer virus or other unknown data packets, as long as it has malicious behavior, it will be deleted directly.
For example, the system of the No. 1 server is based on the lnux system, and Shi Lei independently modified the kernel system. The system file of this lnux system is a fixed file, it will not change like a computer virus, it will always change.
Shi Lei only needs to design a piece of software to protect the files of the entire system, and add other files that need to be protected in the No. 1 server to the protection sequence.
Once there is any virus or illegal data package, when Shi Lei accidentally invades the No. 1 server and wants to modify the system settings, the system will change the configuration file, causing the protected file to change, and then trigger the protection program to delete the attempt directly. A file that modifies system settings.
Whether that file is a virus or a junk file released by illegal data packets, antivirus software does not need to know. Antivirus software only needs to know that the system it protects is not compromised.
Once there is any file that attempts to infringe on system files or protected files, the antivirus software immediately stops its memory process and deletes it!
Designing an antivirus software in this way has achieved Shi Lei's original intention. There is no virus database, but it can kill any virus!
In my mind, I thought about it carefully, Shi Lei could make such a protection program!
After figuring out the antivirus firewall model, Shi Lei immediately started writing code in the programming software. His fingers fluttered on the keyboard like a beautiful butterfly. [
In the online world, the voice communication channel of the core layer of the Hacker Alliance, the black heart ranked the last tenth in the core layer, shouted: "Black devil, nigger, have you two researched anything? Can that moon virus be cracked?"
The Moon Virus broke out in Woosang Country, how could it be concealed from Xia Country's Hacker Alliance?
As the representative of the hacker community of the Xia Kingdom, the Hacker Alliance is tasked with monitoring the Hacker World of the Wosang Kingdom. It is one of the daily tasks of the Hacker Union to observe the online world of the Woosang Kingdom at any time.
When the black devil and the black ghost were browsing the Wo Sang country network, they found that an extremely powerful virus broke out in their network, which was even more difficult to deal with than the cherry blossom virus that broke out in the Xia country!
"Hei Xin, don't worry, don't worry, we are researching. The structure of the moon virus is very simple, it just controls the computer to perform low-level formatting, but the propagation mode it adopts and the packaging processing are very advanced, we can't open it temporarily." The ghost's mantra is 'don't worry'.
Hei Xin hummed: "I'm not in a hurry! Boss Hei Dao is in a hurry! Boss Hei Dao is worried about the introduction of the Moon Virus into our Xia Kingdom. I really don't know what Boss Hei Dao thinks, these things should obviously be NS and the four major network security bureaus. Worry, what is the black knife boss worrying about!"
The black devil's muffled voice came, and he didn't know if his voice had been processed by an electronic voice changer. It sounded very strange, as if something had strangled his neck.
"Don't worry about this, we found the existence of p-restriction in the moon virus. As long as our people in Xia Kingdom don't jump to the p-view in Wosang Kingdom, they will not be infected by the moon virus!"
Hei Xin asked curiously: "Dark devil, nigga, you said that this moon virus was created by Mr. M? Although Mr. M made a statement on the official nhk website, after the outbreak of the moon virus, Mr. M again Mysteriously disappeared without any news!"
"Black heart, don't worry, you will find out in time. If it is Mr. M, it is estimated that Mr. M will stand up and admit it. If it is not Mr. M, the International Intelligence Bureau of the Ministry of Foreign Affairs of Woosang will also stand up and announce." The nigger laughed twice.
"Hum! Nigga, can you stop saying don't worry?" Hei Xin was slightly annoyed, "Dark Demon, this time Woosang is in trouble, why don't we, the Hacker Alliance, launch another attack on them? It's the end of the year, Give them a New Year's gift in advance!"
The black devil said in a sullen voice: "You ask the black knife boss! Nigga, let's go to the encrypted channel, the black heart is so noisy!"
The nigger and the black devil really set up an encrypted channel to keep the black heart out and let the black heart hum.
"Hmph! You two virus madmen! I'll contact the second brother, instigate the second brother, and let the second brother organize a feat of invading Wosang for the third time this year!" Hei Xin whispered to himself, he The second brother in his mouth is the second-in-command Black Tiger of the Hacker Alliance.
Heihu is impulsive, and his technology is inclined to attack and invasion, and he is very interested in invading the country of Wosang.
With the outbreak of the Moon virus, the Hacker Alliance may target Wosang to launch the third cyber war in 2006!
Jingyayuan and Shi Lei have become completely addicted to writing a brand new antivirus firewall.
According to the theory of reverse thinking, Shi Lei made the entire anti-virus firewall become somewhat contoured, and then gradually full-fledged.
After four o'clock in the morning, Shi Lei stretched his waist, and his spine and waist made a sound of knuckles. Seeing that the program was being debugged line by line, Shi Lei's eyes showed a look of satisfaction.
After more than eight hours of uninterrupted struggle, Shi Lei finally wrote the antivirus firewall in his heart.
Looking at the line-by-line debugging of the console, one by one, the smile on Shi Lei's face became more and more obvious. It took more than an hour to debug all the codes of the entire antivirus firewall.
There are some small errors in it. During the line-by-line debugging process, Shi Lei completed the modification one by one. After confirming the error, Shi Lei clicked to run the newly written antivirus firewall. [
The anti-virus firewall was running smoothly. After only a few minutes, Shi Lei turned off the anti-virus firewall and began to encapsulate and secretly process the anti-virus firewall.
The encryption process, with the help of the behavior dynamic capture program, makes the encryption of the entire program unassailable.
After the package is completed, copy it out through the U disk and install it on the laptop. This laptop is the old notebook that Shi Lei used before school started.
The notebook brought back from Woosang country was sold to Shuangqing City Bureau along with the steel number due to the installation of the fh system.
After installing the newly written antivirus firewall on his old laptop, Shi Lei first set up the protection list, as well as the access rules and packet filtering rules allowed by the firewall.
After setting up, Shi Lei activated the antivirus firewall, and then used the No. 1 server to invade his old laptop.
The performance of the No. 1 server is also stronger than that of a high-end personal computer, about ten times that of an old notebook. With Shi Lei's technology, it was almost an easy thing to hack into an old notebook through the No. 1 server.
However, this time, Shi Lei ran into trouble!
Through the No. 1 server, the emails sent, and the Trojan virus were directly deleted by the fire prevention software, and it was impossible to enter the old notebook.
Although almost all the system resources of the old notebook were occupied by the antivirus firewall when Shi Lei attacked, it still resisted stubbornly.
Seeing that virus Trojans and emails couldn't get in, Shi Lei chose a different method and chose a system loophole in his notebook, trying to get in from the outside through the system loophole of the notebook.
However, when Shi Lei invaded the vulnerability, he was directly blocked by the anti-virus firewall, and normal access that was not allowed was rejected by the anti-virus firewall.
Shi Lei was surprised. What he attacked was a system loophole, but the antivirus firewall could actually defend against it!
After more than half an hour of continuous testing, the performance of the No. 1 server surpassed the performance of the old notebook ten times, and Shi Lei, the world's top hacker, could not help the antivirus firewall.
Instead of being angry, Shi Lei laughed happily!
Virus signature database antivirus firewall succeeded!
Excited, Shi Lei tried again, disguised as normal access, and entered the system of the old laptop through port 80.
The disguised normal access successfully deceived the antivirus firewall, but Shi Lei could not perform any operations, otherwise it would trigger the antivirus firewall and let it automatically defend.
Shi Lei did not touch other settings, but attacked the antivirus firewall itself on a whim.
(To be continued. Please search [], the novel is better and faster!)