Hk257 Endless Defense!
The newly written antivirus firewall, under Shi Lei, who is the world's top hacker, lasted for half an hour without crashing, which can already show its excellent performance.
But Shi Lei just ignored a problem. He always wanted to fight the anti-virus firewall head-on, but never thought of another way to directly attack the anti-virus firewall?
In normal intrusions, antivirus software and firewalls are often targeted first, breaking the firewall's defenses, and then piercing the antivirus software to terminate all defenses of the target.
Shi Lei disguised as a normal access, entered the old laptop through port 80, did not change other settings, but directly probed the antivirus firewall.
The newly written antivirus firewall can protect all the targets that need to be protected, but it can't protect itself! [
Shi Lei invaded the inside of the anti-virus firewall, controlled the anti-virus firewall, modified the settings of the anti-virus firewall itself, changed the targets to be protected, and unlocked the access restrictions.
The antivirus firewall that has been changed has no defense and was directly changed by Shi Lei!
During the whole process, within three minutes, the original enemy's defense collapsed from itself and became vulnerable.
Shi Lei frowned, exited from the old notebook, opened the source code of the antivirus firewall, and made some new modifications.
The newly written antivirus firewall was insufficient for its own defense, so Shi Lei increased his strength in this regard. In addition, there is one most important drawback.
That is, you can directly change the settings of the antivirus firewall in the computer!
Is there a way to lock the settings of the anti-virus firewall and prohibit modifying the settings of the anti-virus firewall on the computer?
It is forbidden to modify the settings of the antivirus firewall in the computer, so how to modify the settings?
Suddenly, Shi Lei glanced at the high-definition camera on the No. 1 server chassis, and a flash of light flashed in his mind again!
"Yeah! How can I be so stupid! Sitting on Baoshan, I don't know how to use it!" Shi Lei muttered to himself, and began to modify the source code of the antivirus firewall.
Prohibiting the modification of settings in the computer is not really not allowed to modify the settings in the computer. If it is true, what kind of computer software is it called?
The so-called prohibition of modifying the settings in the computer means that it is not allowed to modify the settings directly through the computer without authorization. Just like Shi Lei just did, by simulating normal access, after entering the system, he directly modified the protection list and access rules of the antivirus firewall.
Shi Lei embedded a behavioral dynamic capture program in the antivirus firewall, and made a solid shell with the behavioral dynamic capture program to prevent it from being cracked and entered.
If you want to modify the settings of the anti-virus firewall, you must pass the certification of the behavior dynamic capture program. That is to say, Shi Lei needs to use the high-definition camera to complete it in reality, and you can directly modify the settings in the computer alone!
After making the behavior dynamic capture program into a solid shell, Shi Lei packaged the entire antivirus firewall again, and copied it to the old notebook through a USB flash drive for installation and debugging.
After confirming that the antivirus firewall was running successfully on the old notebook, Shi Lei passed through the No. 1 server again and began to invade the old notebook.
This time, Shi Lei pretended to enter the system through port 80, as he did last time, in an attempt to modify the settings of the antivirus firewall.
Unfortunately, the hard shell made by the behavior dynamic capture program protects the anti-virus firewall. If you want to change the settings of the anti-virus firewall, you need to verify the behavior dynamic characteristics!
That is to say, not only must the action conform, but also must conform to the dynamic characteristics of the behavior before entering the setting page! [
Shi Lei and the behavior dynamic capture program are on the bar, all means are exhausted, but these means, the basic method is to enter through port 80.
Whether it is a virus, a Trojan horse, or a puncture, it has no effect at all.
Seeing the solution to the antivirus firewall, and adding that he had tested the effect of intrusion from the outside, Shi Lei directly dispatched the last resort.
The last resort is to attack the antivirus firewall with a huge data flow.
Although the antivirus firewall is powerful, the performance of the machine equipped with it is always limited. Shi Lei wants to see what happens to the old notebook after the limit load of the machine is exceeded.
Through the No. 1 server, connect to the public server of Shuangqing University, transfer the resources of the public server of Shuangqing University, unite the No. 1 server, and conduct a unified attack on the old notebook!
Even though the public server of Shuangqing University is occupied by a large amount of resources by the campus security system, it far exceeds the performance of the old notebook.
Under the impact of the huge amount of data, the pu usage rate of the old notebook increased rapidly, and the temperature kept rising. When the safety limit was reached, the old notebook directly crashed!
Seeing the result of the crash, Shi Lei was not surprised. The old notebook is restarted, and the antivirus firewall is automatically activated randomly, continuing to perform its duties to protect the security of the old notebook.
After passing the brute force test, Shi Lei was very satisfied with the performance of the antivirus firewall.
What else is there to be dissatisfied with?
At least Shi Lei couldn't break through the defense of this anti-virus firewall. No matter what method he used, he was either deleted or rejected by the anti-virus firewall.
As the world's top hacker, is there anyone else who can break through the antivirus firewall that Shi Leifa has broken through?
Shi Lei dares to say that such a person does not exist!
In other words, such a person, the world's top-level hacker that Shi Lei knows, can break through the absolute law!
The newly written anti-virus firewall is a one-step defense. Even if it is hacked into the system, it cannot prevent the anti-virus firewall from running.
Once the defense rules are touched, they will be cleaned up directly!
Taking the moon virus as an example, although the moon virus can be browsed normally through a browser, and then enters the system in the form of a cached temporary file, when it wants to form a resident virus, or wants to infect pictures of other protected files When the file is deleted, it will be deleted by the antivirus firewall!
For this newly written antivirus firewall, Shi Lei is full of absolute confidence.
Compared with the Rock Firewall, the newly written antivirus software is not sure how many times stronger!
Shi Lei named the newly written antivirus firewall "Defend All!"
It means that the defense of this antivirus software has no end, only an endless defense! [
After confirming the availability of the defense, Shi Lei immediately encrypted the source code of the defense with the behavioral dynamic capture program, and stored it separately in the USB flash drive.
On the No. 1 server, the Panshi Firewall retreats behind the scenes, and is supported by a brand-new defense that provides the latest defense.
Seeing that the defense was installed on the No. 1 server, Shi Lei yawned, stood up and locked the No. 1 server. It was already bright outside, Shi Lei washed a little, then lay on the bed and fell asleep.
I stayed up all night and couldn't afford to hurt!
In Wo Sang, in the Internet, Raphael set up many traps, waiting for Mr. M to appear, and after waiting all night, he didn't even see Mr. M's ghost shadow!
Raphael, who was in vain, decided to wait a little longer.
Raphael is on the other side of the world, and the time there is opposite to the time here. An overnight in Woosang, Southern Dynasties, and Xia is just a day on Raphael's side.
A day is nothing to Raphael, and Raphael is going to wait for another overnight. According to Raphael's idea, Xia Kingdom, Vosang Kingdom and Nanchao Kingdom are during the day. Maybe Mr. M likes to act during the day?
The second-generation moon virus broke out at about nine o'clock in the daytime in Woosang country!
Time passed by in a hurry. It was close to five o'clock in the afternoon, and Shi Lei, who had stayed up all night, finally got up in a daze. On the other side of the world, where Raphael was, it was almost five in the morning.
Raphael, who was so angry, couldn't help it. He controlled his supercomputer Lei and easily captured the official website of nhk TV station, leaving an inexplicable announcement.
‘Mr. M, you damn despicable thief, now I solemnly warn you to return the stolen things to me quickly. Otherwise, no matter the ends of the earth, I will find you and tear you to pieces! ’
There is no sign, and there is no sign. Raphael doesn't want to cause trouble in Wo Sang country. After all, the International Intelligence Bureau of the Ministry of Foreign Affairs is not easy, and Raphael will feel annoyed when they are staring at him.
nhk TV is unlucky!
Before and after, the nhk TV station was repeatedly injured many times. Every time the hacker invaded, the official website of the nhk TV station was always forgotten.
This time, Raphael also subconsciously used the official website of nhk TV station. Maybe he also thinks that the official website of nhk TV station is best to invade!
When Shi Lei finished washing up, unlocked the behavior dynamic capture program of the No. 1 server, and checked the situation of the moon virus in Wosang Country, he checked the news of tbs TV station by the way.
From the news of tbs TV station, Shi Lei found information that the official website of nhk TV station was hacked again, and also found Raphael's message.
From Raphael's message, Shi Lei immediately judged that it was Raphael!
Shi Lei once stole the fruits of Raphael's victory in Sumida Ward, Tokyo, and had a grudge against Raphael. Fortunately, Mr. M's vest was used at the beginning, otherwise it would not be a good thing to be remembered by the Angel Council!
However, after the successful development of the defense, as long as the supercomputer Yan is in hand, Shi Lei doesn't seem to be too afraid of the Angel Council!
Complete defense, different from the rock firewall, it has no characteristics. There are only two moves, delete and deny access. That is to say, without corresponding characteristics, you are not afraid of exposure!
Even if the International Intelligence Bureau of the Ministry of Foreign Affairs besieged Shi Lei again, Shi Lei could calmly exhaust his defenses and resist the International Intelligence Bureau of the Ministry of Foreign Affairs.
As long as you run a well-defended server with good enough performance, you can resist any attack!
"Raphael, do you want to play? Then let's have fun!"
(To be continued. Please search [], the novel is better and faster!)