Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One Chapter 133 Unexpected Results (1)

Previous page        Return to Catalog        Next page

    Chapter 133 Unexpected results (1)

    Reconnecting to Satellite No. 1, Zhang Yang opened the analysis server in the satellite. The entire satellite has multiple functions, and its server has specially equipped server components with powerful analysis functions. Its computing speed is at least 100% faster under the same conditions.  Fifty percent more performance than ordinary servers.

    This is the perfect way to do this kind of regular analysis. The data that military satellites need to analyze is so huge. Although the two are not the same, they are at least several times more efficient than Zhang Yang's server.

    Zhang Yang imported all the files into his Satellite No. 1 and directly asked the satellite to start analysis.  The satellite was analyzing over there, and Zhang Yang was not idle either. The mutation of the assassin virus this time gave Zhang Yang a lot of inspiration. First of all, his firewall is not invincible. Although it may maintain a very strong lead in performance, but  Even so, although it can stop some viruses, it cannot stop all viruses.

    For example, if the author of this mutated version of the Assassin virus makes the virus more penetrable, even a firewall with a high profile would have great difficulty in defending against such a virus.

    I can't help but think about all the anti-virus and virus prevention methods in the past life and now. All anti-virus methods require the support of a huge database, which is what people often call the virus database. People who are mediocre about anti-virus software will  I found that when your anti-virus software is updated, most of the time it is not the functionality of the anti-virus software itself that is updated, but its virus database.

    The saying goes as high as the devil. This sentence could not be more accurate in the virus and security circles. No matter how it develops, anti-virus software will always be a passive defense, and computer viruses are developing at a rate of almost every hour.  Dozens of new infection methods of viruses have emerged. Although major security companies have established their own virus warning centers, such virus warning centers are only an advance reminder to enrich the company's virus library.

    But everything has a drawback, that is, anti-virus software is getting bigger and bigger and takes up more and more computer resources, so many individual users do not like to use anti-virus software.  Originally, the performance of computers has been updated too quickly. If you buy a computer, the performance is not enough, and almost one-fifth of the performance has to be used to install an anti-virus software. Who would be happy?

    For example, these security companies are completely helpless when it comes to the Assassin virus mutation this time, and the network security of everyone in the world is under the threat of this virus. Even if the opponent mainly targets domestic computers, some foreign computers will inevitably be infected.  got this virus.

    After thinking for a while, Zhang Yang couldn¡¯t figure out the reason. He opened QQ on the desktop and logged in to the QQ he usually used.

    "Di" As soon as he logged in, a crisp message tone rang. As soon as Zhang Yang saw the message, he quickly threw what he had just thought out of his mind.

    Li Keqing (782364) 19:22:10 What are you doing?

    Li Keqing (782364) 19:32:53: Aren't you here?

    With two messages in a row, Zhang Yang quickly replied: Here I am, I just forgot to log in to QQ.

    Li Keqing: Ah, hee, I sold six more computers today, and the commission alone was more than 700.

    Zhang Yang smiled slightly, put on a cheering expression, and then typed: Well, hey, our Keqing is still awesome, come on.

    There is something mysterious about these three words in our family. Generally speaking, if you say these three words to a girl who doesn¡¯t hate you, she might object once or twice, but as time goes by, she won¡¯t say anything.  , then just keep saying these three words, and mm will gradually develop a special feeling for these three words subconsciously. Hey, you will be able to pick up girls soon.

    Li Keqing: I hate it. Who is from your family? Zhang Yang, don¡¯t talk nonsense.

    Zhang Yang: Ha, the weather is nice and sunny today. Tomorrow should be your last day at work. We will start school the day after tomorrow.  Zhang Yang wisely changed the topic and wanted to get vaccinated first.

    Li Keqing: Well, yes, I roughly did the math and found that I earned more than four thousand yuan in total. By the way, do you know who paid the fine for you?

    Looking at Li Keqing's question, Zhang Yang hesitated for a moment. He didn't know whether he should tell Li Keqing. After thinking about it, Zhang Yang decided to tell her. It would be better to ask this kind of question directly, otherwise it would be too troublesome to explain it later.  , anyway, he has no other thoughts about Tan Yudie.

    Zhang Yang: Tan Yudie paid the fine for me. She wanted me to represent the school¡¯s computer club in the national computer competition, so she paid the fine for me.

    Li Keqing: Oh, that¡¯s it, ?Is Yudie the number one school beauty?  I heard that my family is very rich and beautiful, right?

    Li Keqing's question made Zhang Yang's eyes light up. It seems that our work is not in vain. At least Keqing already has him in her heart. Otherwise, she would never ask such a question.  Even if gossip is a woman's nature, no woman will gossip with a man about how beautiful another woman is, unless she really cares about the man's opinion and wants to understand these issues from the side.

    "Well, her mother is the chairman of Jinghai Group, and her family is quite wealthy. In her eyes, the fifty thousand yuan is no different from the five yuan in our eyes. She is very beautiful, otherwise how could she become  She is number one on the school beauty list. But" Zhang Yang paused deliberately, he wanted to tease Li Keqing.

    ¡°Nothing but what?¡± Sure enough, Li Keqing replied to the message quickly.

    "But it's not as beautiful as our Keqing home." Zhang Yang quickly made a drooling expression.  Although he couldn't see Li Keqing's expression, Zhang Yang could imagine that her little face might look like a red apple again.

    "I won't tell you this, but these rich people really don't regard money as money. When I was having dinner with Sister Zhao at noon today, a couple had an argument and ordered a table full of dishes without eating a single bite.  Just pack it up and throw it away." Li Keqing said quickly.

    Zhang Yang was stunned for a moment, then packed it up and threw it away?  Pack it up and throw it away!  A flash of light flashed through Zhang Yang's head almost instantly, and he quickly thought of a possibility!  It might even be a pretty awesome anti-virus method. Zhang Yang couldn't wait to leave a message to Li Keqing: "Keqing, let's assemble our robot tomorrow. You first think about what shape to use. I'll program the robot now."  Chip program.¡±

    "Ah, can it be assembled? Okay, then go and do your work."

    Closing the dialog box, Zhang Yang quickly opened his firewall. Li Keqing¡¯s words just now directly sparked an idea in Zhang Yang¡¯s mind, pack it up and throw it away!  There are currently two infected viruses embedded in Zhang Yang's firewall, one bright and one dark. After being attacked, these two viruses will quickly launch a counterattack against the source of the attack, and directly follow the other party's attack data flow to search for the other party.  the real ip.

    The infection bug that Zhang Yang used to assist the invasion was modified by him, and his infection bug virus can monitor the entire system. Li Keqing's words just now gave Zhang Yang a lot of inspiration, so pack it up and throw it away!  Just like when we go to a restaurant to eat, the tables in many restaurants are now covered with disposable tablecloths. After the guests have finished eating, they can just pack the tablecloths and throw them away, and the tables will still be clean.

    If viruses are compared to the leftovers on the dining table, and computer systems and files are compared to the dining table, then as long as such a disposable tablecloth is built between the two, wouldn't all problems be solved?  If you are infected with a virus, as long as you throw away the disposable tablecloth together with the garbage, won't the system still be clean?

    When the time comes, won¡¯t it be enough to just change to a new disposable tablecloth?  Although this problem seems simple, it is not simple at all. For example, strictly speaking, this model is not new. The firewall is actually similar to this principle. All data needs firewall monitoring. As long as a virus appears, it will  It will be discovered and then call the police to achieve the purpose of preventing viruses.

    This model is correct, but all firewalls currently on the market are not thorough. Its virus detection model is still based on cooperating with anti-virus software, detecting the illegal behavior of the program, and then matching it with the virus database of the anti-virus software.  achieve prevention purposes.

    Naturally, this is not what Zhang Yang did. His eyes started to shine. This program does not need to be too big. It can be modified directly based on the infection.  Zhang Yang first quickly completely revised the mode of the infection bug, completely removing its ability to actively infect and spread, and at the same time, also removing all its parts that affected system files and opened backdoors for the computer.

    In this way, the infection bug becomes a software and no longer a virus.  What Zhang Yang needs is to make a fuss about the detection function of infected insects. First of all, Zhang Yang needs to put a protective film on the entire system. This protective film is just a name, it is an intangible thing. Speaking of which, this thing has something to do with the simulation system.  It's the same thing, it's like putting a layer of clothing on your original system, and this layer of clothing can be pulled off at any time.

    Just like our mobile phone film, this protective film will not affect your use. You can still use the software and various functions in the system, but once a virus invades, the computer virus will  Illegal operations will be performed.

    This is for sure, no matter it is any computer virus, no matter how awesome it is, it wants to infect the system to a certain extent.If it meets its own purpose, it will run autonomously.  This membrane will monitor the entire system, and any program that runs independently and illegally cannot escape its monitoring.

    Whether it is modifying system files or doing other actions, it will directly hit this film. After detecting this behavior, the infected bug after Zhang Yang's modification will directly copy the system file that the virus wants to modify. Computer viruses are not human.  , as long as this file is detected, it will automatically be infected with the mutation.

    When the time comes, as long as the film is closed, the virus will be like a turtle in a urn, unable to escape even if it wants to, so just throw away the packaged film.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report