|
angel144
初级用户
 
积分 66
发帖 26
注册 2007-2-3
状态 离线
|
『楼 主』:
裸机必备,病毒免疫包(2007年10月1号更新)
使用 LLM 解释/回答一下
此病毒免疫包是在三联病毒5。30免疫包基础上制作而成。
原理依然为通过0kb大小的文件夹去掉阻止病毒生成文件来预防已知病毒。
最后感谢三联,感谢所有热心的网友。让我们一起手携手,一起抵抗病毒同木马。
此病毒免疫包版本号为20070904
最新更新版本号为20071001。更新日期为2007年10月1号。基本上免疫了常见得各种恶性病毒同木马群。下一个版本会对未知病毒进行预防。
使用方法:直接双击运行即可。打过旧版本补丁也可以直接运行此免疫补丁
程序直接可以跳过旧版本补丁打上新的免疫文件。
如有BUG,或者提供病毒样本,请联系QQ:38463179 E-MAIL:angel144@yeah.net 深蓝
谢谢。
补充:病毒免疫包里面说明不尽准确,是新增部分注册表内容。主要是为了防止特别恶性的病毒。
Last edited by angel144 on 2007-10-1 at 11:24 AM ]
This virus immunity package is made based on the Sanlian virus 5.30 immunity package.
The principle is still to prevent the generation of virus files by using 0kb-sized folders to block them to prevent known viruses.
Finally, thanks to Sanlian and all enthusiastic netizens. Let's join hands together to resist viruses and trojans.
The version number of this virus immunity package is 20070904
The latest updated version number is 20071001. The update date is October 1, 2007. Basically, it immunizes against various common malignant viruses and trojan groups. The next version will prevent unknown viruses.
Usage method: Just double-click to run. Those who have installed the old version patch can also directly run this immunity patch
The program can directly skip the old version patch and install the new immunity file.
If there is a BUG, or if you provide a virus sample, please contact QQ: 38463179 E-MAIL: angel144@yeah.net Shenlan
Thank you.
Supplementary note: The description in the virus immunity package is not entirely accurate. It is to add some registry contents. Mainly to prevent particularly malignant viruses.
Last edited by angel144 on 2007-10-1 at 11:24 AM ]
此帖被 +5 点积分 点击查看详情 评分人:【 luowei14 】 | 分数: +2 | 时间:2007-9-19 22:22 | 评分人:【 koala 】 | 分数: +2 | 时间:2007-10-13 21:05 | 评分人:【 txratu 】 | 分数: +1 | 时间:2007-10-30 18:34 |
|
附件
1: 深蓝病毒免疫包.rar (2007-10-1 11:24, 15.23 KiB,下载次数: 519)
|
|
2007-9-17 20:10 |
|
|
HAT
版主
       
积分 9023
发帖 5017
注册 2007-5-31
状态 离线
|
『第 2 楼』:
使用 LLM 解释/回答一下
明明修改了注册表
声明中还说没修改
Obviously modified the registry
The statement also says it wasn't modified
|
|
2007-9-18 07:29 |
|
|
knoppix7
银牌会员
    
积分 1287
发帖 634
注册 2007-5-2 来自 cmd.exe
状态 离线
|
『第 3 楼』:
使用 LLM 解释/回答一下
既然已经改了。那就删除了
Last edited by knoppix7 on 2007-9-19 at 05:53 PM ]
Since it has been modified. Then delete it
Last edited by knoppix7 on 2007-9-19 at 05:53 PM ]
|
|
2007-9-18 18:16 |
|
|
huayu278814214
贫困用户
积分 -2
发帖 1
注册 2007-9-18
状态 离线
|
|
2007-9-18 22:02 |
|
|
angel144
初级用户
 
积分 66
发帖 26
注册 2007-2-3
状态 离线
|
『第 5 楼』:
使用 LLM 解释/回答一下
回复2楼 3楼
里面的说明当初我是照抄三联的。我没认真看。
现在我重新做说明,确实是新增了一部分注册表。
主要是对特别恶性的病毒的注册表映像劫持预防。我想这里的大部分人都比我厉害,
应该也可以看明白。
此免疫包纯粹为批处理而已,具体对系统做了什么改动,大家都可以自行察看批处理的内容。我懂不懂注册表?其实说真的,不怎么懂,很多东西还没有深入了解。
当然,无论如何,免疫说明确实是说错了。在此,我想大家道歉。以后的版本会修改说明的。觉得不好用的,可以不用,关于这个也没必要多说了。
最后,感谢2楼,3楼两位朋友提醒。
Last edited by angel144 on 2007-9-18 at 11:11 PM ]
Reply to Floor 2 and Floor 3
The instructions inside were copied from Sanlian originally. I didn't read them carefully.
Now I'm redoing the instructions. Indeed, a part of the registry has been added.
It's mainly for the prevention of registry image hijacking of particularly malicious viruses. I think most people here are more capable than me, and should also be able to understand it.
This immunity package is purely a batch file. Everyone can check the content of the batch file to see exactly what changes have been made to the system. Do I understand the registry? Actually, to be honest, not very much. I haven't deeply understood many things yet.
Of course, in any case, the immunity instructions were indeed incorrect. Here, I want to apologize to everyone. The instructions will be modified in future versions. Those who find it not useful can not use it, and there's no need to say more about this.
Finally, thank you to friends Floor 2 and Floor 3 for the reminders.
Last edited by angel144 on 2007-9-18 at 11:11 PM ]
|
|
2007-9-18 23:07 |
|
|
HAT
版主
       
积分 9023
发帖 5017
注册 2007-5-31
状态 离线
|
『第 6 楼』:
使用 LLM 解释/回答一下
//主要是对特别恶性的病毒的注册表映像劫持预防
实在看不出这样可以预防什么东西
这样做的本意是让病毒无法运行吧
但是病毒可以考虑先把这些键值删掉的呵呵
//Mainly for the prevention of registry image hijacking of particularly malignant viruses
Really can't see what this can prevent
The original intention of doing this is to make the virus unable to run, right
But the virus can consider deleting these key values first, heh heh
|
|
2007-9-19 03:48 |
|
|
yovie
初级用户
 
积分 92
发帖 42
注册 2007-8-14 来自 重庆市巫山县
状态 离线
|
『第 7 楼』:
使用 LLM 解释/回答一下
那么长,没有功劳也有苦劳。辛苦了。继续努力吧。
So long, no credit but also hard work. Thanks for your hard work. Keep up the good work.
|

拾人牙慧者! |
|
2007-9-19 13:15 |
|
|
angel144
初级用户
 
积分 66
发帖 26
注册 2007-2-3
状态 离线
|
『第 8 楼』:
使用 LLM 解释/回答一下
Originally posted by HAT at 2007-9-19 03:48 AM:
//主要是对特别恶性的病毒的注册表映像劫持预防
实在看不出这样可以预防什么东西
这样做的本意是让病毒无法运行吧
但是病毒可以考虑先把这些键值删掉的呵呵
目前来说,病毒还没有考虑到。
而且现在常见的木马已经免疫掉了,无法生成。当然,病毒同木马也可以
考虑把免疫文件夹权限设置为完全控制,然后再生成。但是目前来说,还
没有病毒同木马这样做,准确点讲是大部分病毒同木马没有这样做。而且
根据实际效果来说,这个东西还是可以的。打了之后,基本上中毒的几率
很少了。
原理很简单,但是收集齐全就困难。以后每个月更新一次。呵呵 ,高手见笑了
Originally posted by HAT at 2007-9-19 03:48 AM:
//Mainly for the prevention of registry image hijacking of particularly malignant viruses
I really can't see what this can prevent
The original intention of doing this is to prevent the virus from running
But the virus can consider deleting these key values first, heh heh
At present, the virus has not considered it.
And the common trojans are already immune now and cannot be generated. Of course, trojans and viruses can also
consider setting the immune folder permissions to full control and then generating. But at present, no trojans and viruses have done this. To be precise, most trojans and viruses have not done this. And
according to the actual effect, this thing is still okay. After installing it, the probability of getting infected is basically very low.
The principle is very simple, but it is difficult to collect all. It will be updated once a month in the future. Hehe, experts please forgive me
|
|
2007-9-19 18:16 |
|
|
knoppix7
银牌会员
    
积分 1287
发帖 634
注册 2007-5-2 来自 cmd.exe
状态 离线
|
『第 9 楼』:
使用 LLM 解释/回答一下
//主要是对特别恶性的病毒的注册表映像劫持预防
如果能用命令行工具修改注册表项的权限。
应该可以预防映像劫持
//Mainly to prevent registry image hijacking of particularly malicious viruses
If you can use command-line tools to modify the permissions of registry entries.
It should be able to prevent image hijacking
|
|
2007-9-19 18:30 |
|
|
kaidashi01
初级用户
 
积分 108
发帖 38
注册 2006-5-7
状态 离线
|
『第 10 楼』:
使用 LLM 解释/回答一下
有没了卸载的程序。我安装了,但是删除不了。
Is there a program that can't be uninstalled? I installed it, but I can't delete it.
|

http://kds.ys168.com <--开达石“还原、备份”程序 v8.1.5更新
原文 |
|
2007-9-19 18:58 |
|
|
angel144
初级用户
 
积分 66
发帖 26
注册 2007-2-3
状态 离线
|
『第 11 楼』:
使用 LLM 解释/回答一下
Originally posted by kaidashi01 at 2007-9-19 06:58 PM:
有没了卸载的程序。我安装了,但是删除不了。
卸载程序很简单.把权限重新设置,然后删除空文件夹就可以了.
抱歉的是,目前我的工作比较忙.实在没有多余的时间来弄个卸载
程序.等过段时间有空了 我会连卸载程序一并发出来.谢谢
Originally posted by kaidashi01 at 2007-9-19 06:58 PM:
Is there any uninstall program? I installed it but can't delete it.
Uninstalling is simple. Reset the permissions and then delete the empty folders.
I'm sorry, but I'm currently very busy with work. I really don't have extra time to make an uninstall program. When I have time later, I will release it along with the uninstall program. Thank you
|
|
2007-9-19 21:06 |
|
|
angel144
初级用户
 
积分 66
发帖 26
注册 2007-2-3
状态 离线
|
『第 12 楼』:
使用 LLM 解释/回答一下
Originally posted by knoppix7 at 2007-9-19 06:30 PM:
//主要是对特别恶性的病毒的注册表映像劫持预防
如果能用命令行工具修改注册表项的权限。
应该可以预防映像劫持
用setacl工具配合可以做到.目前我在考虑用setacl工具
锁住注册表的某些重要键值来预防未知病毒.主要是考虑
到大家使用上是否方便.或者可以写两个批处理.需要用的时候
就解锁.平时就锁死.后续版本会作这方面的尝试改进.
Originally posted by knoppix7 at 2007-9-19 06:30 PM:
//Mainly for the prevention of registry image hijacking by particularly malignant viruses
If you can use command-line tools to modify the permissions of registry keys.
It should be possible to prevent image hijacking
Using the setacl tool can be done in combination. Currently, I am considering using the setacl tool
to lock certain important key values in the registry to prevent unknown viruses. Mainly considering
whether it is convenient for everyone to use. Or you can write two batch files. When needed,
unlock them. Usually, lock them. Subsequent versions will attempt to improve in this regard.
|
|
2007-9-19 21:11 |
|
|
luowei14
初级用户
 
积分 193
发帖 98
注册 2007-1-17
状态 离线
|
『第 13 楼』:
使用 LLM 解释/回答一下
楼主辛苦了。。。加分,,,
The building owner has worked hard... Adding points...
|

这家伙很聪明 什么都没留下 |
|
2007-9-19 22:22 |
|
|
HAT
版主
       
积分 9023
发帖 5017
注册 2007-5-31
状态 离线
|
『第 14 楼』:
使用 LLM 解释/回答一下
//用setacl工具配合可以做到.目前我在考虑用setacl工具锁住注册表的某些重要键值来预防未知病毒.
在你的程序里修改玩注册表以后,再用setacl命令设置一下这个键值的权限,应该可以预防一些未知病毒。因为有些病毒就是在这里添加键值达到禁用杀软的目的。
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
// It can be done with the setacl tool. Currently, I'm considering using the setacl tool to lock some important key values in the registry to prevent unknown viruses.
After modifying the registry in your program, set the permissions of this key value with the setacl command, which should be able to prevent some unknown viruses. Because some viruses add key values here to disable antivirus software.
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options
|
|
2007-9-20 05:36 |
|
|
angel144
初级用户
 
积分 66
发帖 26
注册 2007-2-3
状态 离线
|
『第 15 楼』:
使用 LLM 解释/回答一下
14楼大哥的建议不错。我没有考虑到防止禁用杀软这点。因为我本身是在网吧行业做的,很少用杀软。我想应该考虑到应用的普遍性,设置这个为只读的。
另外,我最想设置权限的是 run runonce 以及HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
这些键值,以及system.ini win.ini 文件来防止未知病毒的自启动。
只是这样会否造成大家安装正常软件时的出错?
一切的兼容性同可行性还在测试之中。
The suggestion from the brother on floor 14 is not bad. I didn't consider preventing the anti-virus software from being disabled. Because I'm in the internet café industry and rarely use anti-virus software. I think I should consider the universality of the application and set this to read-only.
In addition, what I most want to set permissions for are run runonce and HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
These key values, as well as the system.ini and win.ini files, to prevent the self-start of unknown viruses.
Just will this cause errors when everyone installs normal software?
All compatibility and feasibility are still in the testing stage.
|
|
2007-9-20 12:18 |
|