Wednesday, February 16, 2011

Shaking the security world trilogy 4

 In order to more clearly reveal all of this, we may wish to be listed in a dictionary entry:

security community a safe and shady world of small dictionaries:
this article, most of the closely around us and information related to the things security-related magazines such as Q & A with the virus to kill broadcast so soft, or refer to a narrow security community, that is, that the professional and amateur Anquan Shi of the world.
broadcast two viruses: the main There are two Kingsoft and Rising.
Rising of the broadcast I've talked to analyze the characteristics of the classic broad-spectrum code as a joke. Virus is the classic symbol of the industry of the pedantic.
Jinshan Tang broadcast mainly in , say. However, worms, Trojans them, one is to spread by force majeure. One was caused by human will to sow, and you are eligible to have the ability to predict when they broke up?
If Jinshan which one to predict potential worm trojan , and also accurate to the day, I regret to tell you, that thing is written in Jinshan myself.
2005 soft, on the Great Kingsoft the broadcast and advertising has disappeared, and I was not writing this article. The only explanation is: the Inside Story of the soft kill my Jinshan very incisive analysis of false advertising, forcing it to show restraint.
three Jinshan:
Chinese IT company in the history of the most shameless, legitimate users of their lying deceitful, evil. to WPS Office software started, its founder Qiu Bojun long since retired, the current president is Lei Jun, the responsible persons of all evil. not for Lei Jun, Jinshan can not so.
Kingsoft translation, PowerWord, Kingsoft specifically studied in the eyes of their already stink. WPS although the founding father, but ability to close some of its mentally retarded. in the evaluation in the Ministry of Information Industry, WPS-made products at the most exclusive in the middle, and office is no comparison. Kingsoft Needless to say, after all, is worthy of its own experts. Ciba function is known to those either Jinshan several generations of engine, dictionary, the first generation of bug is enough to Jinshan out several SP. As for the quick translation, jokes and more, and wrote that the relevant article said: Yes (laughs). not to mention the translation of the sentence, are difficult to understand than the original, into a sentence out of a joke, so called The pictures are in this category around Yahoo's Chinese Web site as an example are the key words, sentences, touch, touch.
second-line video products such as Kingsoft Pa a bit nobody cares. Jinshan although practical value Ranger , but nothing more than some basic functions associated with the game from the big brother who raised winhex, technical content is not worth mentioning. (can not change some key Ranger, FPE able)
Why do some people buy a Kingsoft product? is simply the name of Qiu Bojun Kingsoft Lei Jun sell garbage fills a large banner. We know very well.
talk about products, Jinshan as well as reported problems: no one reported to the Trojan horse virus Jinshan, Jinshan will say that the virus has been reported, please wait for the update and so on. One users try to write a virus to be reported, people also say that! That is, Jinshan has never been have incentives to honor those who reported a . Unfortunately, Jinshan's influence, if they sell the milk powder in Fuyang, nine million Chinese Internet users is to poison the half-million people!
leak killed four:
now the sight of the media can not kill the virus , go to .
leak killed in the Rising my eyes have become almost synonymous. then in April 2004 have a version of Trojan nemesis leak killed the next day amendments, in addition I have never seen a leak outside Rising killed. < br> Rising leak killed a long history. to sub-generation, Rising Millennium Edition is the first real-time monitoring of products. old enough, right?
new Happy Hour is the perfect killing verifier leakage, as a folder script virus, which can easily be triggered, replication ability , and just do not share memory, but not open folders in the case can not be scanned at times no alarm within, combined with stress can not open the folder, but also reflects the real-time monitoring of dereliction of duty.
hard facts, no change.
five Rising 2005:
in the :
Rising almost unchanged compared to 2005 and 2004:
showed reduced memory footprint, speed is so slow, but when you start the main program a little better, what improvement? This is Rising on the basis of further intensified in the original dll into the process of implementing the guard to cover it with the horrors of occupation!!! large soft that is to improve, computer application abstracts is improved, improving ass!!
Dll into the first, although by a virus, but not idle the media said is Look, and KV Rising and AVP compared to levels far worse. can only be compared with earlier Kingsoft 6 stronger. The ability to kill the shell that is KVW3000/AVP3.5 his grandson.
addition to interface, Rising of 2005 left a big soft one irresponsible comments , blame the big soft in the the consumption of pressure), anti-virus capabilities of silence not to mention the key.
we can see, download anti-virus software is not in the embedded anti-virus, too? large soft evaluation level, attitude, orientation, can be seen.
Kingsoft Internet Security 2005
3 six month would be a good month, the most foul of the software company Kingsoft came to me one's incompetence: the Duwang 2005 came, once again brought a bunch of venom ----< br > Trojan Firewall Trojan nemesis it!
notorious these things, why? This is a relevant line of any function of the gadget will be able to do better level of technology is not worth mentioning. just another ; sound is a good thing, but I said, Jinshan not have good things:
1 Jinshan's so-called EXE process can be related only fills two) then the ad is known as dangerous ; This is the proof!
soft kill, but not all are also way? Kingsoft is that you had not? Lovgate is also a service does not start? Then there is only one possibility: Chedan!
3 said that the anti-virus system, which started even before all the virus, how it can kill the live virus? Receive e-mail, downloaded from the web or QQ, MSN file transfer, open the disc for virus control, completely prevent the virus. Anti-Virus Jinshan icons show nothing more to do something.
and this is our Jinshan is not a day mad!!!
seven shell:
kill do not kill a large number of shells, has become the ability to kill unknown viruses and Trojans watershed, but newbies do not know nothing more, but the concept of shell not to the point where non-universal.
shell is something similar to a self-packet. However, there are two different self-shell package.
1 shell generally apply only to exe, dll, ocx, packers can be run directly after the success of the file, use.
2 runs without extracting packed files to the hard disk, but directly into the memory. so as to deal with real-time self-monitoring package can not be the same for them anymore. Computer News , the effect is equivalent to or even exceed the signature change, because almost all of the code is changed, not only to change some parts of the code only for the soft kill, unknown anti-virus heuristic also described the frequent failure of the code is no confusion because it tell the difference. For example, a Trojan horse code is ABCD, after I used the code into software packers packers: Please E into A, the F into B, G replaced by C, H replaced by D, the code is EFGH. this time, if the AB is characterized by soft-kill code, which kill not, if the unknown virus scan it to CD as a symbol of destructive code, it would not recognize, but the computer became a running program to decrypt the ABCD , trojan then copies itself to the system directory, set the self-starting, your computer so in the anti-anti-killing Trojans!
As a hacker can even change the ignorant anti-trojan virus to kill, just by looking Each rookie had correlation method can be learned, because this is only a few mouse clicks Bale. do not kill each shell with the soft kill your computer can hack this dream round, each horse is a well-known point of your HU can kill a few anti!
most worms have just packed shedding almost a variant, not to kill soft kill the shell so you do not have to bother to stare at the failure of the unknown virus scanning and the media want you to Upgrade warnings every day. Now a new generation of viruses are added almost shell, they also said that almost all ineffective.
Trojan is outrageous. put all the Trojans are man-made, and put almost all people understand the Trojan packers, so almost all of the Trojans have been packed, shedding spread in the world. (do not be called a rare horse packers!) If you can not kill the shell, killing the company to deal with soft-packed Trojan horse code completely confused exactly equal to killing A new Trojan horse. In fact, in addition to the original wood shell Makati (including some sites to tell you So in addition to kill the part of the Trojan, these soft kill almost no ability to kill the horse. say IP hackers got it now, the success rate is still high, a large number of bundled Trojans, we can say that, they almost did not kill trojan qualifications! it is wishful thinking!! world, there are many shells? many! then they are equivalent to face many new Trojan! even, and the world shell tried best I can successfully add to the black hole 20,040,815 20 times Aspack! this time unlimited number, at least!
I repeat, kill soft kill shell capacity of today can be divided into three levels:
Level 3: kill almost all of Shell: McAfee
Level 2: can kill most of the shell: AVP, KV
Level 1: Almost do not kill do not kill the shell or shell: Kingsoft, Rising (sweat, do not kill the shell worth mentioning, the two shells to kill people!) NAV, SAV, etc. Almost all the other soft kill.
However, the ability to blindly shell superstition is wrong to kill, kill just one shell ring, a broken shell of the ring is determined to kill does not work, others do not ring off the line. am I wrote McAfee.
McAfee kill Shell should be said that I agree with a strong name. But First, its simply not killing an unknown virus, the second is not to kill the black hole that made the classic Trojan 2,004,815, killing three memory capacity is less, so to kill the horse to kill the virus the ability to live to kill almost all broken ring. antivirus software to kill this shell is only a technical sense and research significance rather than practical significance. Of course, no practical sense to kill far more than the soft MCAfee.
Last By convention, let us look at the media: virtually all of the media on the term secretive shell up to a passing, but dare not mention the killing of each shell to kill the soft skills. almost no rookie to know this stuff.
as a former people tell you that they made this trojan is therefore time. shell, is the Trojan era of the most bloody word!
If the media of have found little or no killing to kill shell shell Kingsoft, Rising NAV, SAV, etc. Almost all the other shell when the soft kill kill, that is, that it?! advertising in order to protect their sources, they will have done such a heartless thing!!!
alert it, the word to statistics, I was the same way, and I want revenge, I want revenge on those who created a whole generation of people ignorant users.
fellow hackers, you should know that the shell damage. If the media refuses to assume their rightful responsibility, then all you should be sensible, after countless evil, yet devoid of their own conscience to tell every rookie, tells them what is shell! this is your social responsibility!!
eight KV3000: classic jokes, many of Ma, also curse, you are an idiot ah?
As with AVP engine KV saying that at least KVW3000 ago now. this release: This argument is at least 2001 to fix. what age thing ah?
in concept, AVP, and KV parted ways long ago. Besides, Jiangmin dare to hold as old as the Jinshan AVP hold it? a brain think about it.
Note: surprise , the media has made such a KV3000-type error, or even 200,505 large soft, you are blind or soft kill gunman?!
Nine Crazy gunman In the famous Mao: the System Restore folder! If KV lip service. This is the most classic secretly smile to these ignorant people.
Chinese Internet world is very closed, which is the root of it all. Xianxin almost no Chinese Internet users have on the English site, and vice versa. this way, both home and abroad, worm propagation greatly affected, Trojans are very lack of communication that few Chinese hackers out of five foreign countries can offer generic Trojan, foreign hackers can offer pretty good out of two.
Therefore, in addition to AVP, almost no foreign antivirus Trojan-made software recognize the black hole 2,004,815, which is impossible to achieve the basic requirement. This is understandable, but they now want to come to China, then they is no excuse, what VB100%, what recommendations related to PC MAGAZINE stall on the fake foreign diploma, as scrap.
xenophilia people no longer need to drum up support for his ignorance of the. What kind of philosophy is what kind of soft kill, how much behind the idea of domestic and foreign similar. I reflected is an international problem, but most of the evidence taken in the country nothing more. China has a large soft as Kingsoft, Rising to drum up support, people with PC Magazine for the Symantec technical enterprising slacker this drum to cheer at home and abroad There are many mediocre incompetent shouted Heavy on the person!
behind, will be beaten!
eleven but not for the net: This divides people into two factions
1 poisoning could not do anything
you think, so many people called me, I Gaima you?
not talking about my result of concentrated special-purpose pen wind, that can only be proved by idle Huitie not responsible for the number of users on the Internet many, because only they can send so much of this paste, know why I do this and have emboldened?
say the least, you know the net send send eye does not see how much it? including most of the luck of less than excellent rookie, all over the north and south: schools, cafes, flats, offices, the net is their world. kill soft, they used the drug tyrants Rising NAV, there are hearts softened to sell their coffee AVP installed, of course, the beginning , played a role in real-time monitoring of course, but as I predicted, the defense will eventually be a surprise attack for various reasons, broken, and for the soft kill, often with a single break Lovgate, Netsky's favor, then the local area is enveloped in shadow under the ... ... .... Or not AVP, domestic packers Trojan on the computer over time, one year do not know how many of the horse or a good thing ... ... .. to follow-up story is even more interesting: On the NIS (!!), and then reload the backup folder to open Shiyou poisoning (lovgate.h), the results and reload!
another example: two rooms in our school a segment:
Lovgate our side once extremely prosperous, office desktop PCs exposure rate of at least 30%, filling meal card and the computer LED display is Rising, which was the successful breakthrough Lovgate had stop working properly. our school computer teacher advocate Symantec, the whole of the set of SAV8.1, null and void. then there is probably a whole set of the teachers themselves KV a kill, good. Since we school the screen from time to time the dog Jiangmin frog. (screensaver virus)
computer teachers to the school was not in the Lovgate each office desktop and notebook computers pre-loaded onto the SAV, at any rate do not like Rising, anti-maintained, after all, real-time monitoring is often failure Rising , and is not improve, such as a new happy hour did not prevent. But they do not know, Taichung, plus a six Lovgate Ben QQ Trojan hacking Second, I use KV clear, except I had installed AVP, there Several teachers had installed in the above Rising drug gangsters, six immortal LOVGATE is its end!
our first two days of classroom time on the computer class, excluded from idle computers, conservatively estimated rate of more than 80% of the poisoning, all four serial virus infection: a new Happy Hour, winfile, there are two viruses on the mail and in winfile. in the operation of the students to copy files over, they scattered into the thousands of families in succession to ... ...
another Division I not so much about, but it is estimated that the office computer multimedia in the classroom most of all infected 1-3 Lovgate and they were loaded on Rising! new happy hour, winfile, etc. are just countless. Some of the old computer room Computer can not afford the memory footprint, direct abandoned ... ....
I called up to the 20CN this young 21st century base and see the land of Aihong:
. v? Memory anti-virus. do not see how these theories come.?
they are soft kill mask the company's survival! Over the years, they are constantly taught to us, ? This is not pedantic, this is shameless! This is the evil! most ridiculous is that they actually created a theory: to safe mode to kill (useless), or reinstall. Pro enemy, neurotic, but is overwhelming, one emergency help people back, but God. lack of reason, but not the spirit of seeking truth. For a more comprehensive system theory, he had broken the gossip jump to break. Do you have a system theory? not. You said nothing but more stronger. years of experience, said Kingsoft, Rising, or just a lot stronger than almost KV, we do not believe him that the gunman. There is even a story of the morning train Looking around, he criticized.
I admit that I will make some error, and even some serious. but not a shady gunmen layers can reveal, at least have a normal evaluation of non-standard. Jinshan's show is a sing along, you also chimed. What it say? even ; master ; Yizhengciyan No truth is more non-technical, this is the contemporary security industry who reflect the victim card. If you still insist on talking on their behalf, it is conscience of the.
2, I think XXX is also not bad, Moderator Chad So like KV? I have not used in the sterile XXX.
luck in this camp was very good indeed, it must be recognized. but attempting to to represent all, 40% represents 100%, this only shows your stupidity. the rest of the intelligence on a more serious problem.
especially the Trojan virus is now more subtle, more resources are not accounted for, and sometimes feel alone can not detect.
So you kill your own XXX Soft (especially NAV, SAV, etc.) to check, can not find. But you had to use it to protection, and use it to check, I can not find the added nonsense, mind you there are problems?
The large soft two effective.
second Ministry of Public Security, Guanghua: Ministry of Public Security evaluation is undoubtedly cheating, it goes without say. Guanghua this time a sign out advertising, but also sudden, the problem.
Bright claims to have ;, companies, it is the state organs!
Liu Jie, if still a member of the Public Security Ministry, which he self-dealing. If he had quit, it was his national public property, stealing, while the Ministry of Public Security has to be, more serious crime !
Also, Guanghua advertising claims can be used on multiple computers, but in fact only one can be upgraded, this is not false advertising to mislead consumers? In that case, the glory of 188 bought for? not as Two serial number 198 KV2005.
deeds of Liu Jie, see: writing for the notoriety of the Ministry of Public Security evaluation metrics, such as wonder and Jinshan way out of a withdrawal. Kingsoft Lei Jun successors of the!
As I Guanghua not used, but look at their advertising, in addition to killing a number of shell outside the old idea of the whole should be out of the waste it. Of course, stronger than the Rising Kingsoft.
Thirteen Media:
media are roughly so Category:
silence is golden School: Most of the IT media, sent to steal
: Large soft and computer enthusiasts.
former Needless to say, large soft is a more shameless. while pious, or the absence of background E net big shot screaming, enjoying themselves, while another chimed in for the Jinshan Rising secretly, quietly to help put down the 3721 storm. is worthy of hidden gunmen. As for computer enthusiasts, stay a while you know. < br> I hate all of IT media, is by large soft sky, and everyone in the : Computer Abstracts, Computer enthusiasts
worship Mei assignment: computer fans, etc.
media are in the
In fact, it only considered a semi-finished products. Why? I first put it in the wind, we see a large soft response was entered as evidence in this paper.
this era., the media have cast a word: hidden gunmen. by me at the to bear legal responsibility, not just the Jinshan's You make your media tools, but you will understand: as if the media silence on certain things, then you will eventually bear the responsibility together. The media should no longer fiddle with some non-tools. If you mess up again, plus one crime other.
if the big software they call me in the mood to make a topic, please send the above paragraph and answer as my confession.
fourth The list assessment, this is the most classic media materials for the Gunners:
2004 22 in of :
AVP of consumption is well known, but the process manager only 1460K of KAV.exe process, from that leads to a EXE process is Gansha's? AVP4.5 real service process! KAV.exe just the shell!
Furthermore consumption go consumption, a soft kill a dll into what is not normal? no dll into the adjustment port, KV how dynamic canisters? I said, only Rising is rate of only about 1000KB or so. B despite the many threads they actually see the software, directly to the conclusion that AVP's said: outstanding 'software devouring your resources. virus tricks to improve their reputation. It is like the same couple shopping, woman is always excited to walk in front of most of the men carrying large bags in, how could Shenqingruyan it?
AVP is not the

No comments:

Post a Comment