| Back to logs list
70191 2010 年 08 月 13 日 17:53 Reading (loading. ..) Comments (3) Category: Personal Diary
All rights reserved! Without the consent can not be freely reproduced, Aberdeen, Qian
play to have a good psychological quality horse! Otherwise be home farm.
must first understand the horse, what horse? The word from the Greek legend of Trojan horse: ambushed a group of people is the huge Trojan horse inside, on the outside,
la gear sale, pretending to retreat. The Trojans thought that enemy soldiers have been back, put the Trojans moved into the city as a trophy. Middle of the night, people in an ambush in the Trojans jumped out and opened the gates, the Greeks took over the city.
Trojan is the world's first computer in 1986, PC-Write Trojan, and now have thousands of thousands of trojans on it!
understand the Trojans and then look at anti-virus software:
anti-virus software along with the increase in computer users with the Trojans and more! Competition under the anti-virus technology improves,
special permit code is killing the original, that is, such as file location 3388 PE @ @ character is the Trojan horse appears, then use the multi-multi-codes, such as special permit Location 3388 @ @ characters appear, position 3319 $ $ character is the Trojan horse appears.
antivirus software also permits use of special code input table,
la gear light, special card code plus icon resources special permit, PE first special permit so
active anti-dumping and anti-virus heuristic Technology: I will not speak in this term, brief, that is to copy a file from the run to the C drive, active anti-dumping to the police, no matter what program! That virus is how to do it?
I did experiment with running the program from the copy (CopyFile) function to copy the program to the C drive,
la gear, active anti-dumping to the police, but called when the program is run CMD command Copy Copy Program to the C drive to not alarm! Obviously antivirus is HOOK (link) detection program is initialized with copy (CopyFile) function. Later I discovered virus
afraid manslaughter, will also HOOK (link) detected two functions to reduce the manslaughter. Dynamically by modifying the input table and call the function, or as I said the method call CMD command had lost a lot of active anti-dumping.
antivirus and Trojan war will not stop, anti-virus methods are endless:
I have experience doing a Trojan-free license to kill has positioned special code and modify the special permit code, scan, or killed, then modify the source code is not OK! ? Ultimately found to be anti-virus simultaneous detection of the icon, another icon to kill free, sigh antivirus is also very people tricks halo
that killing under the cloud, cloud killing technology is also very faint, and colloquially antivirus set up a server, installing the database, when we not only scan files scan code is also connected to the special permit anti-virus server to get back to the second special breeding license code, matching killing. At the same time the cloud killing upload suspicious files also use the technology, I found that he would not upload the entire file, scan, subject to various conditions (such as resources, no digital signature, copyright, location, etc.) to upload files, but is not very mature,
la gear originals, I found that many small software did not toxic, but still was alive was killed! ! ? ? Killing off the best way out of the cloud is embedded in formal software, in fact, should the use of cloud technology trojan, download call to restore the block (I am still studying it, just imagine), halo
and psychological quality seems nothing more! Play only to remind the horse and the horse must first understand when you kill the horse ...
I will use the computer and typing from the horse to play with this idea, it begins as far as possible Ma got to play,
la gear footwear, play what? Pirates of the XX, delete others files, peep the strongest of these ideas, take a look at a person's process:
from a hacker Web site to download a few software and a few tutorials, the software generally scanner, remote control and the like, tutorial download wrong! Is the system security settings and the like, though, learned to system settings. For the first time to see a stranger's computer desktop, very excited, because Trojans often killing, also purchased the software upgrade available free to kill, adding hackers training and so on. He is still relatively normal mental quality, and keep playing, because the Trojans will not be killed, can not find the chicken will not give up or self-mutilation suicide invasion away like ... like many others are just a hobby.
In fact, play to play the horses
very expert people, not necessarily a good psychological quality,
la gear womens shoes, such as a large spread of the virus XX, DDOS Defense Department, for the money to write some Pirates of the bank's procedures, abetting under 16 years of age to play MM Trojans and so on. 1
So mental quality, technology, learning the first one, does not require that only the accumulation of more the more expert.
psychological
2, play a strong horse not have too many ideas, from the play in their own interest in the exercise.
psychological
3, before the idea of doing a strong first ready at running, or else to kill you one, there are thousands and thousands of you.