Chapter 7: Super Virus (2)
Chapter 7: Super Virus (2)
Many people know about computer viruses, but few people know what a computer virus is. Computer viruses can quickly parasitize and multiply through computer networks, and quickly gain a certain degree of system control through system vulnerabilities through mutation and hybridization.
At the same time, the perfect virus is also bound to have a distributed structure and a mother-child structure, that is, when the parent virus is detected and discovered, it will release a program with stronger destructive power or a higher concealed sub-virus.
At the same time, the perfect virus also needs to be able to hybridize, mutate, and exchange genetic information with the same mutated virus, so as to further improve its own program, make itself more hidden, and more destructive.
The most important thing for hackers is not how advanced you are to hack the enemy, how powerful you are to write viruses, and most importantly, to hide yourself.
Although Zhang Yang's understanding of computer viruses can be said to be a master-level figure, but for hiding himself is at a rookie level, maybe an ordinary hacker's computer security surname is stronger than Zhang Yang's computer, in his previous life, because of this incident, Zhang Yang simply did something that all hackers can't think of.
He first wrote a virus to infect his computer, Zhang Yang deliberately wrote this virus is very domineering, where it infects the machine, this virus will automatically search for other viruses in the machine, once found, it will destroy and kill these viruses first, and then reside in the hard disk.
Of course, this is not the most important feature, the most important function is that the virus mutates when an external program sneaks into the system to try to gain control of the system, or tries to release a virus into the computer.
It releases two sub-viruses, one with a highly concealed surname that automatically tracks intrusive data streams, and the other a mutant virus based on the genetic map of the Ebola virus.
The mutant surname of this virus is completely based on the genetic map of the Ebola virus, if other people don't know the law of mutation of this virus, then he is unlucky, this virus is simply direct and open anti-tracking infection, even if you can find it, you can't kill it.
Later, Zhang Yang adapted a lot of functions on the basis of this virus, and slowly this small firewall was finally formed. Soon the peripheral function of the firewall is basically completed, and all that remains is the core program of this firewall, the super virus. Strictly speaking, this is a shell of the parent program of this super virus, which can be attributed to a virus with a good surname, just like a tumor in the human body has a bad surname, and the virus itself is not harmful.
Even because Zhang Yang used this virus for his own use, its loss of system functions has reached a very small point, which occupies less system resources than ordinary firewalls, and the two different sub-viruses inside it, Zhang Yang wrote according to the genetic map of the Ebola virus in his last life, but now Zhang Yang is not ready to do this.
The virus on the bright side of the virus Zhang Yang still uses the genetic map of the Ebola virus as the mutation law of the virus to compile, but the highly concealed virus, Zhang Yang uses the genetic map of the HIV virus as the mutation law. And the genetic map of the HIV virus was discovered and drawn by American scientists only five years later, and no one will know about it now.
Because of the changes, it took a lot of time to write the core part of this firewall, and it was not until more than nine o'clock in the evening that the welcome party was estimated to be coming to an end, and Zhang Yang was completely completed with this firewall. After completion, Zhang Yang directly installed this firewall on his computer. Zhang Yang's Linux system was still downloaded from the Black Alliance Forum, and it was written by others, but he didn't have time to change it to the system he was familiar with.
After running the firewall, Zhang Yang directly chose the function of searching for viruses, which is actually to let his virus infect his system first. There is a big difference between the files infected by the virus and the files of the system itself, even if some antivirus software cannot find out the files disguised by the virus are different from the files themselves, and in the process of the same virus infection, it is easy to find which files are infected.
Theoretically, it is impossible to find viruses with the function of publicizing the firewall. Because it's a newly installed system,There are basically no redundant files.,Soon the progress bar of the search came to an end.,Zhang Yang is actually just doing a check.,Just do the system.,Log in to a black alliance forum.,There can be no virus.。
But when the firewall was checked, a bright red 1 made Zhang Yang stunned.
"I'm grass!" After coming back to his senses, Zhang Yang was a little in a hurry, and a virus was found in the system, so there was only one possibility! That is, someone has a virus on the black alliance forum, or a Trojan horse!
But now the Black Alliance Forum has just been established, and there are a lot of great gods in the hacker world who reside in it, and how strong technical strength does it take to infect this virus into the other party's system under the noses of these great gods?!
Zhang Yang quickly made a simulated partition of his own system, and then continued to make a simulated system inside, locked the found virus with his own firewall, and directly isolated it into the simulated system assigned by himself.
Because it is the isolation of the whole file, until it is clear what type of virus this virus is, such isolation can ensure that it will not mutate and re-infect to the greatest extent. After isolating the file, Zhang Yang ran his firewall's finder again.
Soon, the firewall searched again, and looking at the search results, Zhang Yang breathed a sigh of relief, fortunately, except for the simulated quarantine area, there were no viruses in other places. After relieving his worries, Zhang Yang was curious, what kind of virus is it that can avoid so many hacker gods on the hacker alliance forum?
But now there are not enough tools at hand, Zhang Yang hesitated, didn't care about the virus for the time being, but quickly started writing the program again, first he needed a decompilation software, and a powerful analysis software.
There is no need to decompile the software first, no matter what kind of virus it is, it is impossible to succeed in decompiling without knowing its details and cracking its shell.