Wealth

v5 Chapter 561: A masterpiece of a madman

Han Chu took someone there to restore the virus, and then performed a simulation on a test machine, but adjusted the time of the virus. After five minutes, the hard disk kept spinning and all the data was destroyed. The hard disk partition information is also lost.

A technician close to Han Chu explained to Fan Wubing, “After this virus is executed, the hard disk can only be repartitioned. Furthermore, when the virus is executed, it may also destroy the voltage of certain types of motherboards. The s of the read-only memory, the damaged motherboard can only be sent back to the original factory for repair and re-burned into s. This is the only virus we have seen so far that can destroy the hardware. It is of great significance!"

Fan Wubing nodded, and then asked, "This is indeed a major incident. Have you found a way to deal with it?"

The staff immediately nodded and replied, "In the version of this virus, the information that identifies the version number is in plain text, so you can identify whether it is infected by the string in the executable file. The search feature string is netbsp. ;v Or if you want to search for a more complete character string, try to remember not to search netbsp directly; because this also exists in many normal programs, it is easy to cause misjudgments."

Another staff member reminded, "The specific search method is to first open the Explorer, select the menu function tool to find a file or folder, enter the character string you want to find in the pop-up window, and finally click the search button. You can start the search. If a large number of executable files that match the search characteristics are displayed during the search, it means that your computer has been infected with this virus."

Han Chu explained, "Actually, there is a fatal flaw in the above methods, that is, if the user has just been infected with this virus, then such a large-scale search process is actually expanding the virus infection. . The best way is to use regular anti-virus software or a targeted and specialized tool to remove it."

Fan Wubing nodded, and then asked, "How did this thing come out?"

Logically, the h virus was written on April 26th next year. Why was it revealed by Han Chu and others at this time? It seems that my rebirth has indeed brought about tremendous changes in many things, at least at this time, the emergence of the h virus will avoid the paralysis of a large number of computers next year.

"According to our analysis, its carrier is a tool called the Q Chinese chat module, and it uses popular pirated CD games such as Tomb Raider or s95/98 as the medium, which is reproduced on various Internet sites to make it spread quickly. At present, the main channels of dissemination are mainly through media such as e-mail, and some of the CDs also show its existence." Han Chu introduced, "but fortunately, it was written on April 26 next year. , It has not caused any harm so far."

"Has the new virus been named?" Fan Wubing asked casually.

"We all use the signature code to name it, which is called the h virus." A staff member replied.

Fan Wubing touched his nose unnaturally, saying that the naming method was exactly the same as before.

From the current analysis, the s95/98 operating system does not seem to have any effect on the s operating system. This may be caused by the use of virtual device driver technology under s. Therefore, for users who only use s, this virus does not seem to have any impact, but if it is s95/98 users should pay special attention. It is precisely because h uniquely uses Vxd technology that this virus spreads in the s environment, and its real-time and concealment are particularly strong. It is difficult to see the spread of this virus in the system using general anti-virus software.

When the virus works, on the one hand, it completely destroys the data on the computer system's hard disk, and on the other hand, it rewrites the s of some computer motherboards. After s is rewritten, the system cannot start, only send the computer back to the factory for repair and replace the s chip.

Since the damage of h virus to data and hardware is irreversible, once h virus explodes, users can only watch the computer worth 10,000 yuan and the important data accumulated for many years are destroyed. It can now be determined that the h virus is an example of a virus that can damage computer system hardware, and it is also the most lethal vicious virus.

From a technical point of view, the h virus achieves a perfect integration with the operating system. The virus uses the core Vxd technology of s95/98 and is considered to be firmly connected to the bottom layer of the operating system, so the h virus will neither spread to the s operating system nor the snT operating system.

Han Chu explained to Fan Wubing, “The reason why we attach great importance to this is not only because of its destructiveness and the virus that can destroy hardware in time, but because the technical characteristics of the h virus allow us to use traditional Anti-virus technology to prevent and control computer viruses poses a huge challenge. This is because the traditional anti-virus tools we use are basically pure s or simulated s applications that work under s95, and they cannot penetrate the s95/98 operating system. To completely remove the h virus from the bottom layer of the operating system. On the other hand, because it can be closely integrated with the bottom layer of the operating system, the spread of the h virus is faster and more concealed. The best way to prevent viruses like h that can be closely integrated with the operating system is Use anti-virus software that can be closely integrated with various operating systems."

The h virus usually does not make any destructive actions, nor does it display any screen, but only takes up part of the memory. However, after some programs are infected, they may operate abnormally and even cause crashes. However, the h virus resides in the main memory for a long time, and every time it is executed, it will check the date of the computer. If it meets the requirements, it will destroy all the data on the user’s computer, even the data in the hard disk data area and the boot area. It's all gone.

When the user restarts the system, the hard disk boot failure will appear on the screen. Please press Enter after ** the system disk. Even if there has been a backup boot sector data, but the data in your disk has been completely destroyed, can you boot it? Makes sense.

Speaking of the h virus that paralysed 60 million computers worldwide, Fan Wuyao naturally thought of the author who made it, Taiwanese Chen Yinghao.

Chen Yinghao has been obsessed with computers since his freshman year. He has to go online every day to download the most popular software and games, so he often encounters computer viruses. In order to solve the trouble of computer poisoning, he read the newspaper and bought a lot of anti-virus software that was advertised in a big way. As a result, it was often useless, so he felt that he was deceived.

The h virus was completely designed by him alone, with the purpose of coming up with a company that boasted "100% anti-virus software" in advertisements.

Chen Yinghao has a history of epilepsy. Although he has an easy-going temper, he becomes very stubborn when it comes to computers. According to his college classmates, he usually gets along very happily with Chen Yinghao, but if anyone mentions the computer, he will be very aggressive. He is especially uncomfortable with others claiming that computers are good. Students in the Department of Computer Science at Datong Institute of Technology used to compare programs to see who can program the shortest number of lines and the most complicated programs. But this kind of competition was boring in Chen Yinghao's eyes, and he didn't even bother to discuss it with them. In order to show his own strength, he deliberately wrote a three-line but difficult program, which made the computer majors stare.

While serving in the army, Chen Yinghao once boasted to the military that he could design a program that would paralyze military computers. The Taiwan Military Intelligence Bureau is very interested in this, and plans to take him under his command as an expert in electronic warfare. However, after they investigated Chen Yinghao's family history, it was found that his mental state was unstable and he had a family history of mental illness. Therefore, the Taiwan Military Intelligence Bureau not only did not include him, but also ordered him to retire immediately.

"Have we issued the corresponding anti-virus software? And the disaster recovery program?" Fan Wuyao shook his head and asked Han Chu.

"Post-disaster recovery may not be easy, but the software that can be found or prevented is already there. Considering the harmfulness of the virus, we plan to officially release this virus special killing tool and release it to users for free." Han Chu said to Fan Said without illness.

For a long time, the anti-virus department of the s club often distributes some special killing tools to the public to solve some virus problems that often plague everyone, and the effect is also very good. Therefore, Han Chu believes that this time there has been such a significant impact and destructive power. Viruses naturally need to be foreseen to users in advance.

However, Fan Wubing didn't think so. He shook his head and said, "No, this matter needs to be discussed in a long-term view. I can't spread this news to the outside for the time being. I have important arrangements to consider."

The h virus is raging mainly in foreign countries. One is because the popularity of foreign networks is much higher than that in China. The other reason is that foreign networks are also relatively open. Users are more likely to be infected with viruses through the Internet. Generally, it is spread through floppy disks or CDs. As for the spread through the network, there are some, but the overall number is not large.

Fan Wubing remembers very clearly that the number of computers affected in China is very small, but many overseas are affected. Since the impact of this virus has a huge impact overseas, there is no reason for him to expose this fact now, and then Let foreigners also enjoy their achievements?

Of course, Fan Wubing also asked Han Chu to integrate the special killing tool for h virus into the new version of Pili Beibei anti-virus software, and upgrade his users for free.

"We only need to be responsible for our users, and we can't take the meaning of this virus too seriously, so we can treat it as a general virus." Fan Wubing said to Han Chu, "Otherwise, once everyone notices this In the case of problems, it will blame us for making a fuss and deliberately creating tension."

"Doing this is a bit too unkind?" Han Chu disagrees with Fan Wu's opinion.

Fan Wubing said to Han Chu very seriously, "From a purely commercial point of view, it is understandable for us to do this. At least we are working hard to prevent domestic users from being affected. This work is free. For overseas markets, they Don't buy our anti-virus software, let them live or die?"

If the h virus is to be implemented as scheduled in April next year, when many anti-virus companies have no solutions for a while, the situation on their own side is as solid as a rock, then the popularity of the s club's anti-virus software will suddenly It will be promoted to the point where everyone knows. It will have a huge role in further expanding the company's anti-virus business unit's reputation and expanding overseas markets. This business opportunity cannot but make Fan Wuyao feel excited.

Sometimes, if the heart is dark, then the heart is dark, if the hand is hot, then the hand is hot, otherwise it will never be possible to achieve great things!

All in all, this opportunity is a rare opportunity in a century. Fan Wuyi did not think of such a thing before. If it weren’t for Han Chu’s anti-virus division, he had discovered the whereabouts of h~lightnovelpub.net~ and analyzed it. If it is harmful to the operation time, and if Han Chu presents this virus that can damage the hardware to himself as a result, it is impossible for him to think of using this matter to promote the popularity of his anti-virus software.

There is a chance in everything. Now that the opportunity is in front of you, you need to grasp it, operate it well, and achieve your goals, so that the company's antivirus software will go to the world market in one fell swoop.

This kind of opportunity was something that Fan Wuyi couldn't let go. Therefore, he directly denied Han Chu's opinion on publicizing the characteristics of the h virus and its removal tools to the public, and decided to conceal the matter and use it as his own assassin.

"Although this is a bit unkind, we must do our best to prevent and control domestically. I will also communicate with the Ministry of Security on this matter and promote our anti-virus software on domestic office computers to achieve prevention and control. The harm caused by the spread of the virus.” Fan Wubing explained to Han Chu, “The Ministry of Security has a good relationship with me. This can be done well, and it is good for national security to do so, at least You can start thinking in advance about what to do and how to prevent it in the event of a similar situation."

"Well, I'll listen to you." After thinking for a while, Han Chu agreed, although he was a little reluctant.