HacKer

Chapter 256: New anti-virus firewall, successful? (700 plus more)

Jingyayuan, Shi Lei deleted the virus-free library anti-virus firewall has written a small part of the source code, he has a new idea in his mind.

There are thousands of computer viruses, and there are endless possibilities. I want to make an anti-virus software that contains all the virus signatures, even if it can be done. But computer viruses are born in innovation every moment, and there are always anti-virus software that cannot be recognized!

Shi Lei began to drill the horns and desperately wanted to defend against all viruses without configuring the virus signature database. The anti-virus firewall that can achieve this effect can only be a real artificial intelligence program.

The artificial intelligence program, at the current stage, is just a beautiful pull!

In other words, anti-virus software that wants to not configure the virus database but can accurately identify all viruses and automatically defend itself cannot exist!

Although this kind of anti-virus software does not exist, it does not mean that it can't achieve such an effect. Just like going to Rome, you don't have to fly, you can also use other traffic and change the way to achieve the goal.

Shi Lei deleted the anti-virus firewall source code for a moment, and thought of a brain teaser.

About the brain teasing of the gourd sea, ask how to put the sea into the gourd, and answer the sea outside the gourd!

From this brain teasing, Shi Lei’s mind suddenly flashed.

Why do you have to identify the virus?

There are too many types of computer viruses, even if there are a large number of virus signatures, and I dare not say that they can fully recognize the virus, but there is no requirement to identify the virus!

Just like changing the sea outside the gourd, you can't identify all the computer viruses, just don't recognize the computer virus, and then identify the computer files you need to protect!

Computer system files are fixed and don't change like a computer virus.

You can design an anti-virus firewall software that directly protects computer system files and files that need to be protected, while ignoring computer viruses and illegal malicious packets.

Any computer virus, or illegal data packet, once you attempt to modify the protected file, delete it directly!

There is no need to identify unknown files at all, whether it is a computer virus or other unknown data packets, as long as it has malicious behavior, it will be deleted directly.

For example, the system of the No. 1 server is a system in which Shi Lei has independently modified the kernel based on the Linux system. The system file of this Linux system is a fixed file. It will not change like the computer virus. It is always changing.

Shi Lei only needs to design a software to protect the files of the entire system, and also add other protected files to the protected sequence in the first server.

Once there is any virus or illegal data packet, Yan Shilei does not pay attention to invade the first server. When he wants to modify the system settings, the system will change the configuration file, trigger the change of the protected file, and then trigger the protection program to directly delete the attempt. Modify the files for the system settings.

Regardless of the virus of that file or the junk file released by the illegal packet, the anti-virus software does not need to know. Antivirus software only needs to know that the system it protects is not compromised.

Once there is any file that attempts to invade the system file, or the protected file, the anti-virus software immediately aborts its memory process and then deletes it!

So designed an anti-virus software, has reached the original intention of Shi Lei. There is no virus database, but it can kill any virus!

In my mind, I carefully thought about it again, this kind of protection program, Shi Lei can make it!

After figuring out the anti-virus firewall model, Shi Lei immediately started writing code in the programming software. His fingers fluttered on the keyboard like a beautiful butterfly.

The online world, the vocal alliance core layer voice communication channel, the core layer ranked the last tenth black heart, said: "Black Devil, Nigga, what did you study? What is the moon virus, can you crack?"

The Won Sang country broke out the moon virus, how can it get through the Xia Guo hacking alliance?

As the representative of the Xiaguo hacker community, the hacker alliance is the task of monitoring the hacker community in the Wozang State. It is one of the daily tasks of the hacker alliance to observe the Wassangguo network world at any time.

The Dark Lord and the Nigga, when browsing in the Wozang State Network, found that their network had an extremely powerful virus, which was even more difficult than the cherry virus that broke out in the summer!

"Black heart, don't worry, don't worry, we are studying. The structure of the moon virus is very simple, just control the computer for low-level formatting, but the propagation mode it takes, and the packaging processing is very advanced, we can't open it for a while." The ghost's mantra is 'Don't worry.'

Black heart shouted: "I don't worry! The black knife boss is in a hurry! The black knife boss is worried that the moon virus will be introduced into our country. I really don't know what the black knife boss thinks. These things clearly indicate the CNS and the four major network security bureaus. Worried, the black knife boss is worried about anything!"

The black magic screamed and sulking, and did not know his voice, whether it was processed by an electronic voice changer. It sounds very strange, as if it was something, it was the same.

"Don't worry about this, we found the existence of IP restrictions in the moon virus. As long as our Xia Guo personnel do not jump to the Worth Country IP browsing, they will not be infected by the moon virus!"

The black heart curiously asked: "Black Devil, Nigga, you said this moon virus, is it that Mr. M made it out? Although Mr. M made a statement on the NHK official website, after the outbreak of the moon virus, Mr. M again God mysterious disappeared, no news!"

"Blackheart, don't worry, you will know when you get there. If it is Mr. M, it is estimated that Mr. M will stand up and admit it. If it is not Mr. M, the International Intelligence Bureau of the Ministry of Foreign Affairs of the country will also stand up and announce." The **** smiled and said two times.

"Hey! Nigga, can you not say don't worry?" The black heart is a little annoyed. "The black devil, this time the Worth country is irritated, not as good as our hacking alliance, and then launching an offensive against them? It is already at the end of the year, Give them a New Year's gift in advance!"

The black magic sulking and sulking: "You ask the black knife boss! The nigga, let's go to the encrypted channel, the black heart is noisy!"

The **** and the black devil really built an encrypted channel, which refused to let the black heart go out and let the black heart go straight.

"Hey! You two madmen! I contacted my second brother, provoked and provoked my second brother, and let the second brother organize a feat of the third invasion of Wozang this year!" The black heart whispered to himself, he The second brother in the mouth is the second-hand black tiger of the hacker league.

The black tiger is impulsive, and the technology is biased towards offensive intrusion, which is of great interest to the invasion of Vossan.

Through the outbreak of the moon virus, the hacker alliance may target the Won Sang country, launching the zero-sixth year, the third network war!

Jingyayuan, Shi Lei has completely indulged in the preparation of a new anti-virus firewall.

According to the theory of reverse thinking, Shi Lei made the entire anti-virus firewall become somewhat contoured from nothing, and then gradually became full.

At four in the morning, Shi Lei stretched out a lazy waist, spine and waist, and made a burst of bones. Looking at the program that was performing line-by-line debugging, Shi Lei showed a satisfactory color in his eyes.

After more than eight hours of uninterrupted struggle, Shi Lei finally wrote the anti-virus firewall in his heart.

Looking at the console's line-by-line debugging, one by one, the smile on Shi Lei's face is more and more obvious. It took more than an hour for all the code of the entire anti-virus firewall to be fully debugged.

There are some minor errors. In the process of line-by-line debugging, Shi Lei completed one by one. After confirming the error, Shi Lei clicked to run the newly written anti-virus firewall.

The anti-virus firewall runs smoothly. After only a few minutes, Shi Lei shut down the anti-virus firewall and began to encapsulate and add anti-virus firewalls.

The process of encryption, with the behavior of dynamic capture programs, makes the encryption of the entire program impeccable.

The package is completed, copied out via a USB flash drive, and installed on a laptop. This laptop is the old book before Shi Lei started school.

The notebook brought back from Wozang was sold to the Shuangqing City Bureau because of the installation of the FCH system and the steel number.

After installing a newly written anti-virus firewall on his old laptop, Shi Lei first began to set up a protection list, as well as access rules and packet filtering rules allowed by the firewall.

After the setup, Shi Lei launched the anti-virus firewall, and then used the No. 1 server to invade his old laptop.

The performance of the first server is stronger than that of the high-end personal computer, about ten times that of the old notebook. With Shi Lei's technology, it is almost a breeze to invade old notebooks through the No. 1 server.

However, this time, Shi Lei has run into trouble!

Through the No. 1 server, the mail bomb and the Trojan virus are directly removed by the fire protection software, it is impossible to enter the old notebook.

Although the system resources of the old notebook, when Shi Lei attacked, almost all occupied by the anti-virus firewall, but it still stubbornly resisted.

Seeing that the virus Trojans and mail bombs couldn't get in, Shi Lei changed the way to pick a system loophole in the notebook and tried to drill in from the outside through the system loopholes in the notebook.

However, when Shi Lei invaded the vulnerability, it was directly blocked by the anti-virus firewall. Non-permitted normal access could not be denied by the anti-virus firewall.

Shi Lei was surprised. He attacked the system, but the anti-virus firewall can defend!

Continuously tested for more than half an hour, with the No. 1 server surpassing the performance of the old notebook ten times, plus Shi Lei, the world's peak-level hacker, actually can't help the anti-virus firewall.

Shi Lei is not angry, but laughs happily!

Virus-free signature library antivirus firewall is successful!

Excited Shi Lei, tried again, pretending to be a normal access, through the 80 port into the old laptop system.

The normal access to the camouflage successfully deceives the anti-virus firewall, but Shi Lei can't do anything, otherwise it will touch the anti-virus firewall and let it automatically defend.

Shi Lei did not touch other settings, but instead attacked the antivirus firewall itself.

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like