Chapter 8: Weird
Mu Xuan scratched his head with his right hand, before, he himself was a researcher of viruses, so to speak, he was extremely familiar with some characteristics of viruses... Therefore, Mu Xuan's firewall has made special defensive measures and improvements to the ways and means that viruses may invade his computer according to his own research... Whether the virus can successfully infect your computer, the key is how to find the virus to infect you. The second method is to find a computer with this virus, monitor the computer, check the abnormal data flow and packets of the computer, and whether the files are intercepted in the transmission of the network, so as to obtain some data. The key to this method is the same as the final problem of the first method...
In this regard, Mu Xuan is quite entangled...
Just when Mu Xuan was struggling with how to find this virus, the flame icon in the communicator friend flashed. Mu Xuan immediately clicked on the icon, and the flame: "Boss, how is it?" The virus has already infected 1.8 million units. ”
Mu Xuan tapped on the keyboard and responded: "Now, I only know from you, the amount of infection of this virus, and the rest, I don't know anything... ”
"According to your ability, boss, you can't detect the traces of this virus? It seems that this virus should not be underestimated. Flames responded.
"Khan, the main thing is that I haven't even seen the comet of the virus, how do you tell me to get the data?" Mu Xuan responded depressedly.
"Ah, I said earlier, I have a friend in the group who was infected with this virus, and I heard him say that this virus is very secretive. Scan everything is normal,Don't use the computer,But the CPU usage rate is very high,The memory usage rate is much higher than usual,There are a lot of dll,IBOS,Kobb and other format files appear in the system disk,As long as you click,It will jump into an unknown web page。 After each click, the page you go to is different. After entering, this virus will use some download software installed on the computer to download some software on the web page, not so much software, in fact, some viruses that cannot be deleted, which leads to the high memory usage of the CPU and the computer, and presents, a slow growth trend. If he still can't delete these files, I'm afraid his computer will crash due to overload..."
"Oh, that's right, I'll take a look. If you contact him, just say I'm a computer expert and tell him not to resist. Ask you, is your friend a hacker or..." Quick response. Finally, the tangled problem of finding a virus has been solved.
"He's a rookie, otherwise, he wouldn't have asked me for help. Boss, here's his PC number: 125.125.763 You can find it directly, just enter it, I just told him. He agreed. After a moment, Flame responded.
"Okay." Mu Xuan didn't say much.
Mu Xuan, pull out your own antivirus software. To be on the safe side, I pulled out a firewall written by myself.
Prudence is one of the most believed principles since Mu Xuan was black...
The firewall and anti-virus software written by Mu Xuan himself are generally turned off, unless they are engaged in a battle between hackers. As usual, they use general commercial antivirus software and firewalls. Mu Xuan did this in order not to arouse the suspicion of others and bring unnecessary trouble. Do you think, if you are an ordinary computer user, why install such a powerful firewall and anti-virus software?
Mu Xuan thought about it, and for the sake of prudence, he adjusted the security level of the firewall to the highest. This set of firewall and antivirus software was written by Mu Xuan, who spent two full years staying up until 1 a.m. every night. Mu Xuan's main focus was on the establishment of the firewall.
Because, the format of the virus (dll.ibos.kobb.lod and the like) can be changed drastically. However, from a certain point of view, there are many ways for viruses to invade and infect, but they are unique. Listen, it's the only one. Why? In fact, no matter how complex a virus is written, there are some things that cannot be changed. He also needs the exchange of documents and the transmission of data, as well as the transmission of carriers. As a result, the virus is complex, but simple. All you need to do is prevent and stop viruses from infiltrating and sneaking into your computer.
Therefore, Mu Xuan was deeply aware of this, so his main focus was on the compilation of various modules of the firewall. Firewall modularization, including the current many software is the implementation of modular writing. Why write software this way?
That's because, as the name suggests. The module, piece by piece, must have gaps, and these gaps are updated for the staff's later testing and path (called patches in Chinese), which is possible. Now software upgrades are just through the seams to achieve the purpose of updating.
The modularity of the software, though, has so many benefits. However, this modularity is also a benefit to the intrusion of viruses, because viruses can disguise the upgrade package and blend into the interior of the system. The invasion was successful...
Therefore, Mu Xuan spent a lot of energy on the research of firewalls, striving to achieve a seamless connection between modules, but it has not yet reached absolute seamlessness, and for antivirus software, he has not put so much effort into research. Because Mu Xuan knew that it was useless, for example, you had just researched a very powerful virus and eliminated the virus. Unfortunately, this virus suddenly mutated at this time, and at this time, you suddenly have to start from scratch to study the source code that has become strange and anomalous...
That's why Mu Xuan didn't do much research on antivirus software, but spent a lot of effort to write a firewall...
Of course, Mu Xuan was also thinking about what to do after he was invaded by the virus? Therefore, Mu Xuan desperately researched viruses, created viruses, or downloaded viruses from the Internet to study, until he wrote the source code of the virus, and through this method, he could improve his understanding of various viruses... Moreover, he could also know the problems of his firewall and improve them.
Enter the flame on the scanner just tell yourself the PC number, after finding it, click, pop up a dialog box, is it invasive? After Mu Xuan clicked OK, he entered the other party's computer unimpeded...
After entering the other party's computer, Mu Xuan was not in a hurry, looking for the location of the virus, but first observed the various parameters of his firewall, and paid special attention to the change of data traffic... That is to say, what Mu Xuan is running now is nothing more than firewalls, anti-virus software, and some necessary analysis software.
Mu Xuan's eyes narrowed slightly, the cold light flowed, and the whole person was also engrossed in looking at the numbers on the desktop window, which were quickly refreshed... After seeing that the parameters were nothing unusual, Mu Xuan began to move...
According to the introduction of the flame just now, his friend's scanning is normal, and he doesn't know what his friend used to scan..." Mu Xuan thought, but the movements in his hands did not stop...
Click Custom Scan on the scanner, set the object to the connected device, and start scanning...
Mu Xuan, staring intently at the data of each window, looked at the progress bar of the scan and the scan results below, and after a few minutes, with a ticking sound, the scan was over. Mu Xuan looked at the scanning accuracy bar until the end, and the scanning results still did not yield any results.
Mu Xuan thought that logically speaking, after so long of access, if the virus really existed, there should be a response!
"It shouldn't be so peaceful!" Mu Xuan still squinted his eyes slightly.
Generally, after the virus invades, it will first disguise it, either delete the original file and create the same folder by itself, then it is difficult for the scanning software to detect such changes, because the scanning software is not omnipotent, it is also made by people. Unless the error is displayed unless the system is trying to retrieve a previously changed file, which is also the time of the virus outbreak. There is no folder created after the invasion, and then hidden. The system also does not search for its existence. In fact, there are some hidden areas in the hard disk, which can be revealed through a certain amount of processing...
Mu Xuan began to be distressed, looking for a file is an extremely heavy task, and it is also an unknown document, with so many paths. Mu Xuan wants to be like a hacker novel, Mu Xuan, at this time, he also began to think about it...
After a long search, Mu Xuan completely gave up...
No matter what, just look for it wantonly.
The search was fruitless for a while, and it was really evil... Mu Xuan thought.
This virus is really weird...