HacKer

Chapter 257: Endless defense!

The newly-prepared anti-virus firewall, under the hands of Shi Lei, the world's top-level hacker, has supported half an hour without crashing, and can already explain its excellent performance.

But Shi Lei just ignored a problem. He always wanted to fight against the anti-virus firewall. He didn't think about changing the way to attack the anti-virus firewall directly.

In the normal invasion, many times it is first targeted at anti-virus software and firewalls. First, break the defense of the firewall, then puncture the anti-virus software, and terminate all defenses of the target.

Shi Lei disguised as a normal access, entering the old laptop from port 80, without changing other settings, but directly to the anti-virus firewall.

The newly written anti-virus firewall, while protecting all the targets that need protection, does not protect itself!

Shi Lei invaded the anti-virus firewall, controlled the anti-virus firewall, modified the anti-virus firewall itself, changed the target to be protected, and unlocked the access restrictions.

Change the settings of the anti-virus firewall, without any defense, directly changed by Shi Lei!

The entire process, no more than three minutes, the original invincible defense, from its own collapse, became extremely fragile.

Shi Lei frowned, quit from the old notebook, and then open the source code of the anti-virus firewall to make a new modification.

The newly written anti-virus firewall has insufficient defense power for itself, and Shi Lei has increased its power in this area. In addition to this, there is one of the most important drawbacks.

That is, you can directly change the settings of the anti-virus firewall in the computer!

Is there a way to lock the settings of the anti-virus firewall, and prohibit the modification of the anti-virus firewall settings on the computer?

It is forbidden to modify the settings of the anti-virus firewall in the computer. How to modify the settings?

Shi Lei inadvertently picked up the high-definition camera on the server chassis of No.1, and he flashed another aura in his mind!

"Yeah! How can I be so stupid! Sitting on Baoshan, but I don't know how to use it!" Shi Lei said to himself, and in the source code of the anti-virus firewall, began to modify it.

It is forbidden to modify the settings in the computer. It is not really not allowed to modify the settings in the computer. If it is really done, what computer software is it called?

The so-called prohibition of modifying settings in the computer is not allowed to modify the settings directly through the computer without authorization. Just as Shi Lei just did, after simulating normal access, after entering the system, the protection list and access rules of the anti-virus firewall were directly modified.

In the anti-virus firewall, Shi Lei embeds a behavioral dynamic capture program, and the behavior dynamic capture program makes a solid shell to prevent being cracked.

If you want to modify the settings of the anti-virus firewall, you must pass the certification of the behavior dynamic capture program. In other words, you need Shi Lei in reality, using the high-definition camera to complete the modification, you can not directly modify the settings in the computer alone!

After the behavior dynamic capture program was made into a sturdy shell, Shi Lei once again packaged the entire anti-virus firewall and copied it on the old notebook through the U disk for installation and debugging.

Determine the old laptop, the anti-virus firewall runs successfully, Shi Lei once again through the No. 1 server, the old notebook began to invade.

This time, Shi Lei entered the system through the 80-port camouflage as in the previous time, in an attempt to modify the settings of the anti-virus firewall.

Unfortunately, the hard shell of the behavioral dynamic capture program protects the anti-virus firewall. To change the settings of the anti-virus firewall, you need to verify the dynamic behavior of the behavior!

In other words, not only must the action be met, but also the behavioral dynamic characteristics are also met, you can enter the settings page!

Shi Lei and the behavioral dynamic capture program are on the bar, and all kinds of means are exhausted. However, these methods cannot be accessed through port 80.

Whether it is a virus, a Trojan, or a puncture, there is no effect at all.

Seeing that the anti-virus firewall could not be solved, before the addition of the external intrusion was invalidated, Shi Lei directly tried the last resort.

The last resort is to attack the anti-virus firewall with huge data streams.

Although the anti-virus firewall is powerful, the performance of the machine equipped with it is always limited. Shi Lei wants to see how the old notebook will be after the extreme load of the machine.

Through the No. 1 server, connect to the public server of Shuangqing University, draw the resources of the public server of Shuangqing University, and unite the No. 1 server to conduct a unified attack on the old notebook!

The public server of Shuangqing University, even if it is occupied by the campus security system, is far beyond the performance of the old notebook.

Under the impact of huge data volume, the CPU usage of the old notebooks increased rapidly, and the temperature kept rising. When the safety limit was reached, the old notebook crashed directly!

Seeing the result of the crash, Shi Lei had no surprises. The old notebook restarts, the anti-virus firewall automatically starts randomly, and continues to perform its duties to protect the security of the old notebook.

After passing the violent test, Shi Lei is very satisfied with the performance of the anti-virus firewall.

What else is not satisfied?

At least Shi Lei can't break through the defense of this anti-virus firewall. No matter what method is used, it is either deleted by the anti-virus firewall or rejected.

As the world's top-level hacker, Shi Lei can't break through the anti-virus firewall, can other people break through?

Such a person, Shi Lei dare to say that it does not exist!

Or, such a person, Shi Lei knows the world's peak-level hackers, absolutely can not break!

The newly written anti-virus firewall, this is a no-defense defense, even if it is black into the system, it can not prevent the anti-virus firewall from running.

Once you touch the defense rules, they will be cleared directly!

Take the moon virus as an example. Although the moon virus can be browsed normally through the browser and then entered into the system as a cached temporary file, when it wants to form a resident virus, or wants to infect other protected files. When the file is filed, it will be deleted by the anti-virus firewall!

For this newly written anti-virus firewall, Shi Lei is full of absolute confidence.

Compared with the meteorite firewall, the newly written anti-virus software does not know how many times it is powerful!

Shi Lei named the newly written anti-virus firewall - endless defense!

It means that the defense of this anti-virus software has no end, only endless defense!

After determining the availability of endless defense, Shi Lei immediately encrypts the source code of the endless defense, using the behavioral dynamic capture program, and stores it separately in the U disk.

On the first server, the meteorite firewall retired behind the scenes, with new endless defenses, providing the latest defense support.

Looking at the endless defense installation on the first server, Shi Lei hit a big yawn, stood up and locked the No. 1 server, at this moment the window has been bright, Shi Lei washed a little, and then slept in bed.

I got an all-nighter and couldn’t afford it!

Wozang State, in the Internet, Rafael placed a lot of traps, waiting for the appearance of Mr. M, waiting for an overnight, even the shadow of Mr. M did not see!

Rafael, who was so painstaking, decided to wait a second.

Raphael is on the other side of the world. The time there is just the opposite of the time here. An all-nighter in the Vossan, Southern and Xia countries is just a day in Rafael.

A daytime is nothing for Rafael. Rafael is also preparing to wait for an all-nighter. According to Raphael, Xia, Wozang and the Southern Kingdom are daytime. Maybe Mr. M likes to act during the day?

The second generation of the moon virus broke out at about nine o'clock in the wosang time!

Time passed by, and in the afternoon, it was close to five o'clock, and an all-night Shi Lei classmate finally got up and got up. On the other side of the world, Rafael’s place is already close to five in the early hours of the morning.

Rafael, who waited for a anger, couldn't help it. He controlled his super computer mine and easily captured the official website of NHK TV, leaving a notice that was inexplicable.

‘Mr. Mr. M, your **** despicable thief, now solemnly warns you, returning the stolen things to me quickly. Otherwise, whether it is the ends of the earth, I will find you and smash your body! ’

There was no signing and no sign. Rafael didn't want to get into trouble in Wozang. After all, the International Intelligence Agency of the Ministry of Foreign Affairs was not simple. They were eyeing them and Raphael would be annoyed.

NHK TV is unfortunate!

Before and after, NHK TV station repeatedly injured many times, every time hacking, always forget the official website of NHK TV.

This time, Rafael also subconsciously used the official website of NHK TV. Maybe he also thinks that the official website of NHK TV is best to invade!

When Shi Lei was finished, unpacked the behavioral dynamic capture program of the No. 1 server and checked the situation of the moon virus on the side of Wozang, and then took a look at the news of TBS TV.

From the news of TBS TV, Shi Lei discovered the information that NHK TV official website was hacked, and found Rafael's message.

From Rafael's message, Shi Lei judged it in an instant, it was Raphael!

Shi Lei once robbed Rafael's victory in the Sumida district of Tokyo, and he complained with Raphael. Fortunately, Mr. M's vest used at the beginning, otherwise it was not a good thing to be hanged by the Angels Parliament!

However, after the success of the endless defense development, as long as there is a super computer Yan in hand, Shi Lei does not seem to be afraid of the Angel Council!

Endless defense, unlike the meteor firewall, it has no features. There are only two moves, deletes and denials of access. In other words, there is no corresponding feature, so you are not afraid to be exposed!

Even if the International Intelligence Bureau of the Ministry of Foreign Affairs once again besieged Shi Lei, Shi Lei can calmly use the endless defense to withstand the International Intelligence Bureau of the Ministry of Foreign Affairs.

As long as you run an endlessly defensive server, performance is good enough to withstand any attack!

"Raphael, do you want to play? Then let's have fun!".

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like