CN102194075A - Firewall - Google Patents
Firewall Download PDFInfo
- Publication number
- CN102194075A CN102194075A CN2010101223422A CN201010122342A CN102194075A CN 102194075 A CN102194075 A CN 102194075A CN 2010101223422 A CN2010101223422 A CN 2010101223422A CN 201010122342 A CN201010122342 A CN 201010122342A CN 102194075 A CN102194075 A CN 102194075A
- Authority
- CN
- China
- Prior art keywords
- value
- ultimate
- fire wall
- software
- program
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses an ultimate firewall for changing a value input by a user through a keyboard, so that a value of a programming procedure and a value of a document are different from original; the procedure cannot be executed in a computer after entering the computer; the ultimate firewall can be executed to intercept the value normally input by the original computer only when the user manually operates the ultimate firewall to convert the program; and a plurality of unexecuted program documents are the same as original; the ultimate firewall conversion number, conversion password, conversion safety code and the like of a nationally approved genuine software are required, and the conversion safety code is a normal value obtained by automatically converting the software by the ultimate firewall when the Chinese is verified by the genuine software.
Description
Technical field
Computing machine
Background technology
.NET, Windows operating system
Various programming languages can change department of computer science's harmful program of utilization of unifying, terrible fire wall is not known, antivirus software is not known, the destruction fire wall and the antivirus software that have, so make protection than lagging behind the hacker. ultimate fire wall changes the value of user with the keyboard input, make the value of the value of program or file and different originally, program enters computer and will can not carry out this in computing machine like this, have only by the user and could to carry out after manually the ultimate fire wall of operation is changed this program. ultimate fire wall is tackled the value of the normal input of former computing machine. and some not execution show with originally the same. need the ultimate fire wall of state approval copyrighted software to change number, additive cipher, conversion security codes such as conversion security code are Chinese. enters the ultimate fire wall in copyrighted software checking back like this and will automatically software be converted to normal value.
Summary of the invention
The thought of this software is the code of former various programming languages and the executive routine that may endanger computing machine such as EXE that stops all.
Software thought:
1. the program of this software can change the value of computing machine space bar input, and the value in space is become ' # ' or value that any one is of little use.
2. will change and beat the space input value after the keyboard input and just become ' # ', do not show ' # ' then and show former space value ' ' appearance.
3. the space is wanted in beginning when importing English word, is exactly to add under this software ' # ', the space between English word is exactly ' # '.
4. before importing computing machine into, file checks that by program information transmitted checked that void value is " ".
5. do not have if import in this machine information " " value and the beginning of each row English word have the Value Data of " # " just can import computer into, otherwise tackle.
6. if transmission is to resemble RAR, the words of the form of EXE at first are to open to check, can not check interception, if can check scrutiny program.
Process with the 5th the same, not right just interception.
8. picture is divided into each rank, knows picture format for low-level, and whether the high level information of then checking is color entirely.
9. film is divided into each rank, knows the film form for low-level, and whether high level be color value by the value of information entirely just.
10. change html code and some ASP codes existing safe in utilization and some existing Javascript codes safe in utilization automatically.
11. the regular website of state approval with country issue by number, by password, pass through security code.
12. directly normal input value advances to pass through computer.
13. legal product (as software) will be issued transcoding number, transcoding password, transcoding security code etc. by country.
14. this software is checked transcoding number, the transcoding password is after the transcoding security code is corresponding.
15.RAR files such as EXE file change into former space by this software program with space ' # ' with the content of the inside.
16. software can move normally.
17. another crosses a little bands on inspection ' program of # ' value or the code of various forms, the user can cooperate some virus killing instruments, this virus killing instrument can this software of killing this form, to utilize this software manual translation by the user after errorless, so risk still exists the result to hold list by individual subscriber.
Illustrate:
The situation of this software not: (machine) int a, b, c; (demonstration) int a, b, c
Have under the situation of this software: (machine) #int#a, b, c; (demonstration) int a, b, c
Explanation in addition:
This software can add various language, and transcoding number can be a (English) good (Chinese) e (Russia) ... Greek etc.
Same hand over word input three times with password not to looking into its IP number automatically
Description of drawings
Do not have
Embodiment
With most computer earlier free all load onto this software, the webserver is loaded onto this software.Realization is as the universalness of Windows.
Claims (4)
1. ultimate fire wall changes the value of user with the keyboard input, make the value of the value of program and file and different originally, program enters computer and will can not carry out this in computing machine like this, have only by the user and could to carry out after manually the ultimate fire wall of operation is changed this program. ultimate fire wall is tackled the value of the normal input of former computing machine. and some not execution show with originally the same. need the ultimate fire wall of state approval copyrighted software to change number, additive cipher, conversion security code etc. the conversion security code is Chinese. enters the ultimate fire wall in copyrighted software checking back like this and will automatically software be converted to normal value.
2. ultimate fire wall also can stop laser disc, the software of normal values such as USB.
3. the html code changed automatically by ultimate fire wall and some have ASP code safe in utilization and some existing Javascript codes safe in utilization.The ASP code will upgrade, and Javascript will upgrade. and will not tackle after discerning the regular website of state approval.
4. picture is discerned some forms such as JPAG, high safety will be by all being that color value is discerned.Film is by the film format identification, and high safety is discerned by color.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101223422A CN102194075A (en) | 2010-03-08 | 2010-03-08 | Firewall |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2010101223422A CN102194075A (en) | 2010-03-08 | 2010-03-08 | Firewall |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102194075A true CN102194075A (en) | 2011-09-21 |
Family
ID=44602135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2010101223422A Pending CN102194075A (en) | 2010-03-08 | 2010-03-08 | Firewall |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102194075A (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1286447A (en) * | 1999-08-26 | 2001-03-07 | 国际商业机器公司 | System and method for incorperating semantic characteristics into syntax file code transformation architecture |
CN1308463A (en) * | 2000-02-09 | 2001-08-15 | 德国汤姆森-布兰特有限公司 | Encryption and decryption method for protecting data stream and coder and decoder |
CN1737879A (en) * | 2004-08-20 | 2006-02-22 | 松下电器产业株式会社 | Encryption instruction processing apparatus |
-
2010
- 2010-03-08 CN CN2010101223422A patent/CN102194075A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1286447A (en) * | 1999-08-26 | 2001-03-07 | 国际商业机器公司 | System and method for incorperating semantic characteristics into syntax file code transformation architecture |
CN1308463A (en) * | 2000-02-09 | 2001-08-15 | 德国汤姆森-布兰特有限公司 | Encryption and decryption method for protecting data stream and coder and decoder |
CN1737879A (en) * | 2004-08-20 | 2006-02-22 | 松下电器产业株式会社 | Encryption instruction processing apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3440542B1 (en) | Applying bytecode obfuscation techniques to programs written in an interpreted language | |
RU2610254C2 (en) | System and method of determining modified web pages | |
US9582666B1 (en) | Computer system for improved security of server computers interacting with client computers | |
US8495578B2 (en) | Integrated software development system, method for validation, computer arrangement and computer program product | |
US20170116410A1 (en) | Software protection | |
Barua et al. | Server side detection of content sniffing attacks | |
CN103186739A (en) | Method for secure web browsing | |
Prokhorenko et al. | Context-oriented web application protection model | |
US20240291863A1 (en) | Systems and Methods for Detecting Phishing-Based Cybersecurity Threats | |
Rauti et al. | Browser extension-based man-in-the-browser attacks against Ajax applications with countermeasures | |
US8484232B2 (en) | Method, computer arrangement, computer program and computer program product for checking for the presence of control statements in a data value | |
CN104965701A (en) | Method and device for acquiring application information | |
CN110192195A (en) | It is accessed by the secure data of any data channel | |
Blonce et al. | Portable document format (pdf) security analysis and malware threats | |
JP2013506185A (en) | Windows Kernel Modification Detection Method | |
CN102194075A (en) | Firewall | |
CN115774865A (en) | Front-end code operation method and device, electronic equipment and storage medium | |
KR102513460B1 (en) | Method and system for transmitting safty file by remote browser | |
Müller et al. | PostScript Undead: Pwning the Web with a 35 Years Old Language | |
Nurgaliyev et al. | Analysis of reverse engineering | |
Poll | Secure input handling | |
CN114168950B (en) | Method, device, equipment and product for repairing cross-site scripting attack vulnerability | |
KR102190359B1 (en) | Method and apparatus for verification of integrity | |
Benchbana | Cyber Security: Polyglot Files | |
Mohanta et al. | Fileless, Macros, and Other Malware Trends |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
DD01 | Delivery of document by public notice |
Addressee: Bi Jianbin Document name: Notification of Passing Preliminary Examination of the Application for Invention |
|
C06 | Publication | ||
PB01 | Publication | ||
C53 | Correction of patent of invention or patent application | ||
CB02 | Change of applicant information |
Address after: 430050, room 34, Zili village, Hanyang District, Hubei, Wuhan, 502 Applicant after: Bi Jianbin Address before: 430050 parrot road 25, Hanyang District, Hubei, Wuhan Applicant before: Bi Jianbin |
|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20110921 |