Crossover: 2014

Chapter 213 Offense Is Always Easier Than Defense?

Chapter 213 Offense Is Always Easier Than Defense?
Although not every company can achieve the top international level.

But it is expected that after seven or eight years, even if it is just an ordinary level of technology, it should not be a problem to deal with the current rampant mobile phone virus/virus.

In the case of having an enterprise-level hard drive from the previous company.

Lin Hui believes that if he rummages around, he may gain something else.

However, this has yet to be investigated, and now Lin Hui is not absolutely sure.

Although applying for a patent, this time Lin Hui is not for money.

Lin Hui wants to use technology to do something positive.

Since you want to make a contribution, why make a patent, which is very similar to a technical barrier?
Of course, it is to guard against some unsuitable enterprises.

Making a patent is not necessarily a fee.

Lin Hui can license patents for free to the security department without asking for money.

But if it is not in the form of a patent:
You dare to open source technology today.

Tomorrow, certain companies will be able to apply for some similar patents in seconds.

The worst thing is that the plagiarists will beat them back.

In turn sue you for patent infringement.

Very outrageous.

But this is the reality of the world.

In the Internet environment at this time, being too naive is really going to suffer a lot.

Lin Hui has always speculated about his domestic counterparts with the worst malice.

After all, Lin Hui is no longer a novice entering society.

It is not wrong to be a villain first and then a gentleman.

Specific to the technology for mobile phone viruses/viruses.

Lin Hui rummaged through the enterprise hard drive in his previous life for quite a while.

It took a lot of effort for Lin Hui to find some materials related to patents on mobile phone virus prevention/virus protection.

Uh, the mobile phone virus/virus detection method based on the base station...

From the data, although this kind of mobile phone virus/virus detection based on 4G base station works well.

But this is obviously not suitable for the current Lin Hui.

You must know that the current 4G base stations have just started commercial use.

Many irrelevant people should not know the detailed technical indicators of 4G base stations.

Later generations plant trees while predecessors enjoy the shade
Under such circumstances, what is the point of a person like Lin Hui, who has no match for 4G base stations in work and academics, to come up with a device for virus/virus detection based on base stations?
In short, it is obviously not suitable for Linhui to detect viruses based on base stations.

At least not suitable for the current Lin Hui.

Technology handling and the like are not as strong as possible, but the one that is suitable is the best.

For Lin Hui, there are some technologies that are strong enough to subvert the current people's cognition or have fatal loopholes in the chain of logic.

Rush handling will only bring endless risks.

Lin Hui didn't want to take some risks that could have been avoided.

Although base station-based virus detection this is not very suitable for forest ash.

But the problem is not big, Lin Hui quickly found a patent for detecting mobile phone viruses/viruses that is more suitable for him.

For this patent, Lin Hui tentatively calls it the SCAN mobile device identification virus/virus detection patent.

Just like its name, the patent mainly realizes virus/virus detection by scanning.

The principle of this patent is to use specific character strings, binary strings or code strings contained in each virus/virus body to detect and scan mobile phone files.

If the detected file matches successfully, it indicates that the file represents or contains this type of virus/virus.

This detection technology is somewhat similar to molecular probes in biology.

But only slightly similar in nature.

The prerequisite for this security measure to play a positive role is to have a strong virus/virus library.

According to this method, it is obvious that the more viruses/viruses in the virus/virus database, the more viruses/viruses can be found.

It stands to reason that such a technique is actually not brilliant, and even a bit dull.

Compared with some virus dynamic defense technologies or even more advanced artificial intelligence virus dynamic defense.

Such technology is not enough to watch.

Even if it is not compared with these advanced anti-virus technologies in the next few years.

Even compared with the technology adopted by some mainstream Internet security companies now.

Such technology cannot be called advanced.

Why do you say that.

First of all, the technology of using the virus database to detect viruses is a static virus defense technology.

This is doomed to a certain extent, this is a passive technology.

Secondly, this technology of detecting viruses/viruses using virus/virus databases is largely similar to open-book examinations.

Know the "content of the exam in the book" in advance before answering the questions.

If there is "content outside the book", it is easy to GG.

This virus/virus detection technology can handle known viruses/viruses with ease.

But for unknown viruses/viruses, it is easy to lie down.

In practical applications, this kind of technology is the norm.

Even in the previous life, such a technology was almost useless.

After all, viruses/viruses cannot always be virus/virus databases.

Even if there are corresponding security personnel to keep updating the virus/virus types in the technical virus/virus library.

However, the update speed of the virus/virus in the virus/virus database is generally not as fast as the iteration speed of the virus/virus in the external environment.

It's not because security people aren't trying hard enough.

But for some obvious reasons:

- Attacking is always easier than defending.

In the previous life, after the advent of this technology, the technology of using virus databases to scan often only served as an afterthought.

Because of this, the people who created this technology don't seem to attach much importance to this technology.

All the technologies related to this previous patent are simply encapsulated except the virus/virus library.

The rest of the technology sits on its working hard drive with little to no encryption.

This is undoubtedly cheaper Lin Hui.

It can be said that it is basically effortless for Lin Hui to reproduce this patent.

Although this technology was useless against the mobile phone virus/virus in the same period in the previous life.

But it does not hinder the value of this technology for Lin Hui.

You know, it is also using the mobile phone virus/virus database to open the book to answer the questions.

It was 14 years of Internet environment that gave Lin Hui the question.

However, Lin Hui referred to the "examination materials" of 21 years.

Although the mobile phone virus/virus database of 21 years in the previous life still cannot 100% prevent mobile phone viruses/viruses that emerged in an endless stream at the same time.

However, the types of mobile phone viruses/viruses collected by the mobile phone virus/virus library almost cover all mobile phone viruses/viruses (contained specific character strings, binary strings or code strings) before 2021 in the previous life.

That being the case, the mobile phone virus/virus database naturally covers all mobile phone viruses/viruses that have been released from 2014 to 2021.

In this case, even in the Internet environment, new forms of mobile phone viruses/viruses will continue to emerge.

It takes some brain cells to break through Lin Hui's simple mobile phone virus/virus detection technology.

Unless there are some mobile phone viruses/viruses that did not appear before 2021 in the previous life.

Perhaps it is possible to break through the technology of forest ash handling.

Leaving aside malicious malicious attacks made by humans, the technology that is only aimed at the mobile phone virus Linhui is trying to carry is still useful.

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like