What is the "panda burning incense" praying for?
The virus "panda burning incense" became popular. Under the pious prayer of Sanxiang, it became popular in China and CCTV in less than a few months. It also puts its name on the "home pages" of Rising, Jiang Min and Jinshan, as well as various information security forums and computer technology exchange websites. Even our national treasure panda has never had such an "honor" in the IT field, showing a spectacular scene of "burning panda incense in the whole city". If we put aside the legal and moral aspects, from a technical point of view, the 2006 China Financial Person Annual Activity Award will be held. "Panda Burning Incense" is really a national treasure in the field of information security in China. From another point of view, at least let everyone know that the basic knowledge and awareness of network security and anti-virus of China netizens need to be improved, and also let major virus manufacturers wake up completely from their boasted "international leading level" patents and titles. With many patented antivirus technologies and "international leading level" antivirus software, it is so vulnerable to the lovely "panda". It is always after the virus made a big splash and hurt hundreds of thousands of users that the "killing tool" finally arrived late. Some people say that SARS has formed a complete set of health early warning system. So can we say similarly that it is precisely because of a series of viruses such as "Panda Burning Incense", "Weijin" and "Magic Wave" that the fragile network becomes stronger and people's awareness of prevention and common sense are more deeply rooted in people's hearts. Moreover, at present, "panda burning incense" is not for economic benefits. Compared with all kinds of money-driven rogue software and fraudulent QQ tail, perhaps it just burns incense and prays for people to better guard against network security. "Panda Burning Incense" itself "Panda Burning Incense" is an infectious download written by Delphi. Technically, it has no innovation, but it draws on the technical advantages of many classic viruses, Trojans and even rogue software. It turned into a virus with a cute icon that makes people smell it. Any anti-virus software with a single technology can deal with it, but when combined, this "panda" in turn makes many anti-virus software "burn incense" taboo. Its operation principle is not complicated, such as "copying files to system directory and root directory", "adding registry startup items", "running with Microsoft's automatic playback function", "attacking weak passwords against the computer itself" and "adding script code to web files by taking advantage of loopholes in IE browser". But it is these "not the latest" technologies that have set off a "burning incense" craze all over the country. This shows that most of our netizens lack the most basic knowledge of network security and good online habits. If the user can patch the system as soon as possible, set complex and irregular passwords for the system management account, and close some unnecessary ports with security risks (such as139,445, etc. ), and at the same time turn off the "auto play" function that is not "necessary for the system". If the backup file. If the gho system is set to "read only", then "panda burning incense" will not spread so widely and so quickly, and many enterprises and institutions will not collectively "burn incense" on the whole LAN computer. Let's take a look at our major antivirus software vendors. In this era of "money first", "panda burning incense" has become the selling point of many anti-virus software, or its promotion tool, as well as its own anti-virus technology. As a result, "panda burning incense" became popular, and users lost their lives. However, antivirus software manufacturers laughed and said, "This year's profit target can be completed ahead of schedule ..." Driven by economic interests, antivirus manufacturers finally showed their true colors in front of this lovely panda icon. Finally, talk about the owner of "panda burning incense"-the virus author. From a technical point of view, he can be called a real top hacker, and his comprehensive application of knowledge such as network, system and programming has reached a perfect level. In contrast, many ignorant people drive scanning tools developed by others all day, occasionally sweep one or two loopholes, control one or two broilers or destroy one or two website pages, so they publicize their "achievements" in high-profile forums and pretend to be hackers at every turn. What's more, in order to publicize their prestige in the "network rivers and lakes", they made a large number of "hacker lists" or "top hacker lists" and then included them ... I think such people should be ashamed and reflect on the technical content of "panda burning incense". Postscript: It is said that the author of Panda Burning Incense decided not to update it in the future. As for the true meaning of "panda" burning incense devoutly, perhaps only its author knows it, perhaps it is prayer, perhaps … if there is any possibility …