CN102194075A - Firewall - Google Patents

Firewall Download PDF

Info

Publication number
CN102194075A
CN102194075A CN2010101223422A CN201010122342A CN102194075A CN 102194075 A CN102194075 A CN 102194075A CN 2010101223422 A CN2010101223422 A CN 2010101223422A CN 201010122342 A CN201010122342 A CN 201010122342A CN 102194075 A CN102194075 A CN 102194075A
Authority
CN
China
Prior art keywords
value
ultimate
fire wall
software
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2010101223422A
Other languages
Chinese (zh)
Inventor
毕剑斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN2010101223422A priority Critical patent/CN102194075A/en
Publication of CN102194075A publication Critical patent/CN102194075A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses an ultimate firewall for changing a value input by a user through a keyboard, so that a value of a programming procedure and a value of a document are different from original; the procedure cannot be executed in a computer after entering the computer; the ultimate firewall can be executed to intercept the value normally input by the original computer only when the user manually operates the ultimate firewall to convert the program; and a plurality of unexecuted program documents are the same as original; the ultimate firewall conversion number, conversion password, conversion safety code and the like of a nationally approved genuine software are required, and the conversion safety code is a normal value obtained by automatically converting the software by the ultimate firewall when the Chinese is verified by the genuine software.

Description

A kind of fire wall
Technical field
Computing machine
Background technology
.NET, Windows operating system
Various programming languages can change department of computer science's harmful program of utilization of unifying, terrible fire wall is not known, antivirus software is not known, the destruction fire wall and the antivirus software that have, so make protection than lagging behind the hacker. ultimate fire wall changes the value of user with the keyboard input, make the value of the value of program or file and different originally, program enters computer and will can not carry out this in computing machine like this, have only by the user and could to carry out after manually the ultimate fire wall of operation is changed this program. ultimate fire wall is tackled the value of the normal input of former computing machine. and some not execution show with originally the same. need the ultimate fire wall of state approval copyrighted software to change number, additive cipher, conversion security codes such as conversion security code are Chinese. enters the ultimate fire wall in copyrighted software checking back like this and will automatically software be converted to normal value.
Summary of the invention
The thought of this software is the code of former various programming languages and the executive routine that may endanger computing machine such as EXE that stops all.
Software thought:
1. the program of this software can change the value of computing machine space bar input, and the value in space is become ' # ' or value that any one is of little use.
2. will change and beat the space input value after the keyboard input and just become ' # ', do not show ' # ' then and show former space value ' ' appearance.
3. the space is wanted in beginning when importing English word, is exactly to add under this software ' # ', the space between English word is exactly ' # '.
4. before importing computing machine into, file checks that by program information transmitted checked that void value is " ".
5. do not have if import in this machine information " " value and the beginning of each row English word have the Value Data of " # " just can import computer into, otherwise tackle.
6. if transmission is to resemble RAR, the words of the form of EXE at first are to open to check, can not check interception, if can check scrutiny program.
Process with the 5th the same, not right just interception.
8. picture is divided into each rank, knows picture format for low-level, and whether the high level information of then checking is color entirely.
9. film is divided into each rank, knows the film form for low-level, and whether high level be color value by the value of information entirely just.
10. change html code and some ASP codes existing safe in utilization and some existing Javascript codes safe in utilization automatically.
11. the regular website of state approval with country issue by number, by password, pass through security code.
12. directly normal input value advances to pass through computer.
13. legal product (as software) will be issued transcoding number, transcoding password, transcoding security code etc. by country.
14. this software is checked transcoding number, the transcoding password is after the transcoding security code is corresponding.
15.RAR files such as EXE file change into former space by this software program with space ' # ' with the content of the inside.
16. software can move normally.
17. another crosses a little bands on inspection ' program of # ' value or the code of various forms, the user can cooperate some virus killing instruments, this virus killing instrument can this software of killing this form, to utilize this software manual translation by the user after errorless, so risk still exists the result to hold list by individual subscriber.
Illustrate:
The situation of this software not: (machine) int a, b, c; (demonstration) int a, b, c
Have under the situation of this software: (machine) #int#a, b, c; (demonstration) int a, b, c
Explanation in addition:
This software can add various language, and transcoding number can be a (English) good (Chinese) e (Russia) ... Greek etc.
Same hand over word input three times with password not to looking into its IP number automatically
Description of drawings
Do not have
Embodiment
With most computer earlier free all load onto this software, the webserver is loaded onto this software.Realization is as the universalness of Windows.

Claims (4)

1. ultimate fire wall changes the value of user with the keyboard input, make the value of the value of program and file and different originally, program enters computer and will can not carry out this in computing machine like this, have only by the user and could to carry out after manually the ultimate fire wall of operation is changed this program. ultimate fire wall is tackled the value of the normal input of former computing machine. and some not execution show with originally the same. need the ultimate fire wall of state approval copyrighted software to change number, additive cipher, conversion security code etc. the conversion security code is Chinese. enters the ultimate fire wall in copyrighted software checking back like this and will automatically software be converted to normal value.
2. ultimate fire wall also can stop laser disc, the software of normal values such as USB.
3. the html code changed automatically by ultimate fire wall and some have ASP code safe in utilization and some existing Javascript codes safe in utilization.The ASP code will upgrade, and Javascript will upgrade. and will not tackle after discerning the regular website of state approval.
4. picture is discerned some forms such as JPAG, high safety will be by all being that color value is discerned.Film is by the film format identification, and high safety is discerned by color.
CN2010101223422A 2010-03-08 2010-03-08 Firewall Pending CN102194075A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2010101223422A CN102194075A (en) 2010-03-08 2010-03-08 Firewall

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2010101223422A CN102194075A (en) 2010-03-08 2010-03-08 Firewall

Publications (1)

Publication Number Publication Date
CN102194075A true CN102194075A (en) 2011-09-21

Family

ID=44602135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2010101223422A Pending CN102194075A (en) 2010-03-08 2010-03-08 Firewall

Country Status (1)

Country Link
CN (1) CN102194075A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1286447A (en) * 1999-08-26 2001-03-07 国际商业机器公司 System and method for incorperating semantic characteristics into syntax file code transformation architecture
CN1308463A (en) * 2000-02-09 2001-08-15 德国汤姆森-布兰特有限公司 Encryption and decryption method for protecting data stream and coder and decoder
CN1737879A (en) * 2004-08-20 2006-02-22 松下电器产业株式会社 Encryption instruction processing apparatus

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1286447A (en) * 1999-08-26 2001-03-07 国际商业机器公司 System and method for incorperating semantic characteristics into syntax file code transformation architecture
CN1308463A (en) * 2000-02-09 2001-08-15 德国汤姆森-布兰特有限公司 Encryption and decryption method for protecting data stream and coder and decoder
CN1737879A (en) * 2004-08-20 2006-02-22 松下电器产业株式会社 Encryption instruction processing apparatus

Similar Documents

Publication Publication Date Title
EP3440542B1 (en) Applying bytecode obfuscation techniques to programs written in an interpreted language
EP3267350B1 (en) Method of and system for analysis of interaction patterns of malware with control centers for detection of cyber attack
Robertson et al. Static Enforcement of Web Application Integrity Through Strong Typing.
US20170116410A1 (en) Software protection
US8806440B2 (en) Integrated software development system, method for validation, computer arrangement and computer program product
Pan et al. Cspautogen: Black-box enforcement of content security policy upon real-world websites
Barua et al. Server side detection of content sniffing attacks
CN103582888A (en) System and method for preserving references in sandboxes
CN103186739A (en) Method for secure web browsing
WO2023053101A1 (en) Systems and methods for malicious code neutralization in execution environments
US8484232B2 (en) Method, computer arrangement, computer program and computer program product for checking for the presence of control statements in a data value
Leithner et al. Hydra: Feedback-driven black-box exploitation of injection vulnerabilities
US11449243B2 (en) System and method to secure a computer system by selective control of write access to a data storage medium
CN103577188B (en) The method and device of defence cross-site scripting attack
CN110192195A (en) It is accessed by the secure data of any data channel
Blonce et al. Portable document format (pdf) security analysis and malware threats
CN105184150B (en) Means of interpretation, the device of a kind of sentence preprocess method, device and sentence
CN102194075A (en) Firewall
KR102513460B1 (en) Method and system for transmitting safty file by remote browser
Sane Is the OWASP Top 10 list comprehensive enough for writing secure code?
CN112989337A (en) Malicious script code detection method and device
Poll Strings considered harmful
Poll Secure input handling
Asia Mitigating the risks of fileless attacks
CN114168950B (en) Method, device, equipment and product for repairing cross-site scripting attack vulnerability

Legal Events

Date Code Title Description
DD01 Delivery of document by public notice

Addressee: Bi Jianbin

Document name: Notification of Passing Preliminary Examination of the Application for Invention

C06 Publication
PB01 Publication
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: 430050, room 34, Zili village, Hanyang District, Hubei, Wuhan, 502

Applicant after: Bi Jianbin

Address before: 430050 parrot road 25, Hanyang District, Hubei, Wuhan

Applicant before: Bi Jianbin

C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20110921