HK256 New Antivirus Firewall, Successful? (700 plus more)

. Jing Yayuan, Shi Lei deleted the virus-free database antivirus firewall has written a small part of the source code, and he has a new idea in his mind.

There are indeed thousands of types of computer viruses, even endless, and it is true that an antivirus software can contain all the virus signatures. But computer viruses are innovating all the time, and there are always antivirus software that can't recognize!

Shi Lei drilled the tip of the bull's horns at the beginning, desperately trying to defend against all viruses without configuring the virus signature database. An antivirus firewall that can achieve this effect can only be a real artificial intelligence program.

The AI program, at this stage, is just a beautiful!

In other words, it is impossible to have an antivirus software that does not have a virus database configured, but can accurately identify all viruses and defend against them automatically!

Although this kind of antivirus software does not exist, it does not mean that it cannot achieve such an effect, just like going to Rome, you don't have to take a plane, you can also use other transportation, and you can achieve the goal in another way.

The moment Shi Lei deleted the source code of the anti-virus firewall, he thought of a brain teaser.

About the brain teaser of the gourd loading the sea, ask how to put the sea into the gourd, and answer that the sea is outside the gourd!

From this brain teaser, Shi Lei's mind suddenly had a flash of inspiration.

Why do you have to identify viruses?

There are too many types of computer viruses, even if there are a large number of virus signature databases, I dare not say that we can completely identify viruses, but there is no regulation that viruses must be identified!

It's like putting the sea on the outside of a gourd, and if you can't identify all computer viruses, you simply don't identify computer viruses, but instead identify computer files that need to be protected!

The files of the computer system are fixed and do not change endlessly like a computer virus.

You can design an antivirus firewall software. Directly protect computer system files and files that need to be protected, ignoring computer viruses and illegal malicious packets.

Any computer virus, or illegal data packet, as soon as you try to modify the protected file, just delete it!

There is no need to identify an unknown file, whether it is a computer virus, or other unknown data packets, as long as it has malicious behavior, it will be deleted directly.

For example. The system of the No. 1 server is a system based on the Linux system and independently modified the kernel. The system file of this Linux system is a fixed file and will not act like a computer virus. The past has changed, and it is always changing.

Shi Lei only needs to design one piece of software. Protect files across the system. And add other files that need to be protected in the No. 1 server to the protection sequence.

Once there is any virus or illegal data packet, Shi Lei intrudes into the No. 1 server without paying attention and wants to modify the system settings, the system will change the configuration file. Triggers a change in the protected file, which in turn triggers the protection program to directly delete the file that attempts to modify the system settings.

It doesn't matter what kind of virus that file is, or it's a junk file released by illegal packets. Antivirus software doesn't need to know the truth. Antivirus software only needs to know the way it is going to protect the system from being compromised.

As soon as there is a file that attempts to infringe on the system file or the file being protected, the antivirus software immediately aborts its memory process and then deletes it!

Designing an antivirus software in this way has achieved Shi Lei's original intention. There is no virus database, but it can kill any virus!

In his mind, he thought about it carefully, such a protection procedure, Shi Lei can completely make it!

After figuring out the mode of the anti-virus firewall, Shi Lei immediately began to write code in the programming software. His ten fingers fluttered on the keyboard like a pretty butterfly.

In the Internet world, the voice communication channel of the core layer of the Hacker Alliance, the black heart ranked tenth at the bottom of the core layer, shouted: "Black devil, black ghost, have you two researched anything?" Can the moon virus be cracked? ”

The outbreak of the Moon Virus in the country of Wasang, how can it be hidden from the hacker alliance of the Xia country?

As a representative of the Xia country's hacker community, the hacker alliance is tasked with monitoring the hacker community of the Vosang country, and it is one of the daily tasks of the hacker alliance to observe the network world of the Wasan country at any time.

The black devil and the black ghost, when they browsed in the network of the country of Wasang, found that an extremely powerful virus broke out in their network, which was even more difficult than the cherry blossom virus that broke out in the country of Xia!

"Black heart, don't worry, don't worry, we're working on it. The structure of the Moon Virus is very simple, it only controls the computer for low-level formatting, but the mode of transmission it takes, and the packaging processing is very advanced, and we can't open it for the time being. "The mantra is, 'Don't be in a hurry.'"

Blackheart snorted, "I'm not in a hurry! The Black Knife Boss is in a hurry! The Black Knife Boss is worried that the Moon Virus will enter our Xia Kingdom. I really don't know what the black knife boss thinks, these things should obviously be worried about CNS and the four major cyber security bureaus, what is the black knife boss worried about! ”

The black devil's sullen voice came, and I don't know if his voice has been processed by an electronic voice changer. It sounded very weird, as if something had choked the neck.

"Don't worry, we found the existence of IP restrictions in the Moon Virus. As long as our personnel in Xia Kingdom do not jump to the IP browsing of Wosang Kingdom, they will not be infected by the Moon Virus! ”

Hei Xin asked curiously: "Black devil,, did you say that this moon virus was created by Mr. M?" Although Mr. M posted a statement on the official NHK website, after the outbreak of the Moon Virus, Mr. M mysteriously disappeared without any news! ”

"Black heart, don't worry, you'll know when the time comes. If it is really Mr. M, it is estimated that Mr. M will stand up and admit it. If it weren't for Mr. M, the International Intelligence Bureau of the Ministry of Foreign Affairs of Vozan would have come forward to make an announcement. The laughed twice.

"Humph! , can you please stop saying don't worry? Black Heart was slightly annoyed, "Black Devil, this time the Vosang country is in big trouble, why don't we hacker alliance launch another attack on them?" It's already the end of the year. Give them a New Year's gift in advance! ”

The black devil said in a sullen voice: "You ask the black knife boss!" , let's go to the encrypted channel, this kid with a black heart is noisy! ”

The and the black devil really set up an encrypted channel, rejecting the black heart and making the black heart snort.

"Humph! You two virus maniacs! I contacted the second brother to instigate and instigate the second brother to organize a feat of the third invasion of the country of Wasan this year! Black Heart whispered to himself, the second brother in his mouth was the second-in-command Black Tiger of the Hacker Alliance.

The Black Tiger is impulsive, and his technique is biased towards attacking and invading. He was very interested in invading the country of Vausan.

With the outbreak of the Moon Virus, the Hacker Alliance may launch the third cyber war against the country of Vausang in Year 06!

Jing Yayuan, Shi Lei has been completely addicted to writing a new anti-virus firewall.

According to the theory of reverse thinking. Shi Lei made the entire anti-virus firewall from nothing to a little outline. Then gradually fledgling. Full.

It's past four o'clock in the morning. Shi Lei stretched his waist, his spine and waist, and there was a sound of bone joints, looking at the program that was being debugged line by line, Shi Lei's eyes showed a look of satisfaction.

After more than eight hours of uninterrupted struggle, Shi Lei finally wrote the anti-virus firewall in his heart.

Watch the console's line-by-line debugging. passed one by one, and the smile on Shi Lei's face became more and more obvious. It took more than an hour to debug all the code of the entire antivirus firewall.

There are some minor bugs in it. In the process of line-by-line debugging, Shi Lei completed the modifications one by one. After confirming that it was correct, Shi Lei clicked to run the newly written antivirus firewall.

The anti-virus firewall was running smoothly, and only a few minutes later, Shi Lei turned off the anti-virus firewall and began to encapsulate and encrypt the anti-virus firewall.

The encryption process, with the help of the behavior dynamic capture program, makes the encryption of the entire program impeccable.

The package is completed, copied out through a USB flash drive, and installed on the laptop. This laptop is Shi Lei's old book before school started.

The notebook brought back from the country of Wasang, due to the installation of the FCH system, along with the steel number, was sold to the Shuangqing Municipal Bureau.

After installing the newly written anti-virus firewall on his old notebook, Shi Lei first began to set up the protection list, as well as the access rules and packet filtering rules allowed by the firewall.

After setting it up, Shi Lei activated the anti-virus firewall, and then used the No. 1 server to invade his old notebook.

The performance of the No. 1 server is also better than that of high-end personal computers, about ten times that of old laptops. With Shi Lei's skills, it is almost easy to invade the old notebook through the No. 1 server.

However, this time, Shi Lei ran into trouble!

Through the No. 1 server, the mail bombs sent and the Trojan virus were directly deleted by the fireproof software unceremoniously, and it was impossible to enter the old notebook.

Although almost all of the system resources of the old notebook were occupied by the anti-virus firewall when Shi Lei attacked, it still resisted stubbornly.

Seeing that viruses, Trojans and mail bombs could not get in, Shi Lei changed his way and picked a notebook's system vulnerability, trying to drill into it from the outside through the notebook's system vulnerability.

However, when Shi Lei invaded the vulnerability, he was directly blocked by the anti-virus firewall, and the non-allowed normal access could not pass the restrictions of the anti-virus firewall and was denied.

Shi Lei was surprised in his heart, what he attacked was a system vulnerability, but the anti-virus firewall could actually defend it!

After more than half an hour of continuous testing, the performance of the No. 1 server surpassed that of the old notebook by ten times, coupled with Shi Lei, a hacker at the pinnacle of the world, he couldn't help the anti-virus firewall.

Shi Lei was not angry, but laughed happily!

The virus-free antivirus firewall has succeeded!

Shi Lei, who was excited, tried again, disguised as normal access, and entered the system of the old laptop through port 80.

The disguised normal access successfully deceived the anti-virus firewall, but Shi Lei couldn't do anything, otherwise it would trigger the anti-virus firewall and let it defend itself.

Shi Lei did not touch other settings, but attacked the anti-virus firewall itself on a whim

(To be continued.) )

PS: There is a chapter at 12 o'clock in the evening, and there is a plan to update next month, which is summarized this month. 【Reward Thanks】一劍drunk red dust,TOM. H,Tip588.zhangsheng23,Friend0402,MAXZZZ,heroman01,Iron-blooded Yixuan,Knife Acacia Sword Ecstasy,Qingling,,Tip100.