Rising's research and development products

Rising antivirus software V16 is the latest version officially released by Rising antivirus software, with frequency conversion and light cloud. On March 18th, 211, it was declared to be free forever. You can directly download Rising antivirus software V16 from Rising official website or the download website for free. Is the necessary software for safe internet access. Rising antivirus software online edition has added 15 new functions and 17 enhanced functions, which are based on professionalism, intelligence and efficiency.

Rising antivirus software V16

perfectly supports 64-bit operating system

File size: 36M

Support system: WIN8/WIN7/Vista/XP/Server23/Server28

Brand-new experience: brand-new security products based on user experience and visual effects, and product performance and compatibility are improved again.

brand-new development mode: the new transformation of Internet-based security service products, with product planning and R&D oriented to Internet users, can truly guarantee and meet users' daily security needs.

Brand-new team: a brand-new core development team composed of senior experts in the industry and doctors and masters in professional fields.

1. Intelligent cloud security

Rising "intelligent cloud Security" system can automatically collect, analyze, process and solve a large number of malicious viruses, horse-hanging websites and phishing websites appearing on the Internet.

System kernel reinforcement:

Through the in-depth analysis of virus behavior by Rising intelligent cloud Security, with the help of artificial intelligence, we can detect, monitor and intercept all kinds of virus behaviors in real time and reinforce the system kernel.

Trojan horse defense:

Based on Rising virtualization engine and "intelligent cloud Security", Rising dynamic behavior analysis technology is used in the operating system kernel to intercept malicious programs such as special unknown Trojans, backdoors and viruses in real time.

USB flash drive protection:

When inserting USB flash drives, mobile hard disks, smart phones and other mobile devices, Trojans, backdoors, viruses, etc. will be automatically intercepted and killed to prevent them from invading the user system through mobile devices.

Browser protection:

Take the initiative to strengthen the kernel of IE, Firefox and other browsers, and prevent special unknown Trojan horses, backdoors, worms and other viruses from using vulnerabilities to invade the computer in real time. Automatically scan a variety of browsers in the computer to prevent malicious programs from invading the user system through browsers, and meet personalized needs.

Office software protection:

When using office software formats such as Office, WPS, PDF, etc., prevent special unknown Trojan horses, backdoors, worms, etc. from using vulnerabilities to invade the computer in real time. Prevent infected viruses from invading user systems through OFFICE software such as Office and WPS, and effectively protect the security of user documents and data.

Zero disturbance in the game:

Optimize the user experience, and do not prompt by default during the game, so that players are not disturbed by prompts.

2. Intelligent antivirus

Intelligent virtualization engine:

Based on Rising's core virtualization technology, the antivirus speed is increased by three times. Under normal circumstances, it only takes 1 minutes to scan 12G data files.

Intelligent antivirus:

Based on Rising's intelligent virtualization engine, Rising's 211 edition increased the killing rate of Trojans, backdoors and worms to 99%. Intelligent operation, no user participation, one-click antivirus. The resource occupation is reduced, and at the same time, the rapid response to viruses and the killing rate are ensured.

Resource occupation:

Fully applying the intelligent virtualization engine can reduce the resource occupation of virus detection by 8%.

3. The killing engine

The extension engine

is mainly aimed at the early viruses that are difficult to deal with. This engine is responsible for viruses such as CIH, and it has existed for at least 1 years.

Trojan horse engine

The Trojan horse engine developed in p>9 is aimed at Trojan virus research and development, and its characteristic is fast.

TC engine

The TC engine developed in p>1 years is characterized by scripting and strong logic.

MP engine

The MP engine developed at the end of November is only used in V16. And MP engine and AMD cooperated to develop an accelerated version of GPU, and with the help of GPU, the scanning speed was improved.

cloud killing engine

the cloud killing engine

"DataMining" engine

has been introduced into p>V16. This engine is being developed, and it is a small part of the whole new huge system involving virus sample collection, automatic analysis and automatic processing, and it is only responsible for enjoying the fruits of data mining.

4. Rising launched the only anti-virus software For Linux system in China

In p>214, Rising anti-virus software for Linux was specially developed to solve the security problems such as Trojan horses, viruses and hacker attacks, and can achieve unified management to meet the daily security management of large and complex networks. Rising personal firewall V16

Software language: Simplified Chinese, Traditional Chinese, English

File size: 13.93M

Operating system: Windows 2/XP/23/Vista/Windows 7/Server 28/win8

Fully supports mainstream operating systems: perfectly supports 64-bit operating systems and is fully compatible with Win8.

Super intelligent anti-phishing: the intelligent anti-phishing engine is upgraded, and the malicious address database is upgraded on a large scale, which comprehensively improves the interception ability of phishing websites.

intelligent advertisement blocking: blocks advertisements of videos, webpages and software in real time, and supports all browsers. Reduce harassment and give the computer a green environment.

Practical network toolbox: traffic statistics, ADSL optimization, IP automatic switching, parental control, network speed protection, * * * access management, anti-surfing ...

1. Intelligent security protection

MSN chat protection:

Provide encryption protection for MSN users to chat and prevent privacy leakage.

intelligent traffic monitoring:

enables users to know the internet traffic generated by various softwares.

Intelligent ARP protection:

Intelligently detect ARP attacks and attack sources in the local area network, detect outbound and inbound ARP, and detect suspicious ARP requests, and mark the severity levels of various attacks respectively, which is convenient for enterprise IT personnel to quickly and accurately solve network security risks.

3. Secure Internet access

Intelligent interception of phishing websites: enrich intelligent judgment rules and methods, more effectively solve the harm of phishing websites to users, and protect users' private information and account password security;

safe search: help users distinguish and filter unsafe search results when searching online;

Trojan download interception: completely intercept the virus downloaded from the user's computer by intercepting the spread source of Trojan virus;

ARP attack interception: to solve the network anomaly problem caused by ARP attack in local area network;

broiler attack prevention: prevent the user's computer from becoming a hacker broiler, and give the user the right to use the computer;

network intrusion attack interception: intercept the harm to users' computers caused by hacker attacks, virus attacks and other forms of network attacks in real time;

4. Green surfing

Web page content filtering: You can set keywords that you don't want to visit in the web page according to your own needs, and you can set whether the web page is allowed to play videos.

parental control: avoid the harm of bad information on the internet to teenagers, and it is suitable for parents. Parents can set the time allowed to surf the Internet, limit the keywords appearing in the webpage, control the downloading behavior, and control their children's use of watching videos, online games and chatting software.

5. Smart Internet access

Network speed protection: to ensure that you can access some network services smoothly under the pressure of the network and always get high performance. For example, optimize the network response speed, such as reducing the PING value of online games to ensure the smooth operation of online games; Hierarchical control of network data enables users to quickly access WEB services or online video services under P2P and other network environments.

network speed test: helps you know the speed of your network in real time.

network diagnosis: it helps you to diagnose network anomalies, so as to achieve the purpose of network fault handling or network optimization.

ADSL bandwidth manager: manage ADSL network resources in a unified way, and ensure the optimization of network resource utilization through network negotiation mechanism.

*** enjoyment management: manage the * * * enjoyment information of the system.

network invisibility: through the built-in intelligent detection rules of the firewall, the scanning detection behavior of hackers and viruses is intercepted, so that the computer can be invisible on the Internet.

IP switching tool: it helps users to access the network seamlessly and automatically when moving computers between multiple networks, thus eliminating frequent network configuration.

Rising full-featured security software includes antivirus software and firewall module, which is exactly the same as antivirus+firewall in function, but its system resources (CPU occupancy, upgrade bandwidth, etc.) are lower than those of independently installed antivirus software and firewall. At the same time, Rising full-featured security software realizes the linkage between firewall module and antivirus module.

1. Security Assistant

Rising intelligent cloud Security:

Automatically collect, analyze and block Trojan attacks, hacker intrusions and online fraud.

Trojan cloud killing:

A variety of killing methods can completely kill popular Trojans and protect users' privacy.

Computer physical examination:

One-click physical examination and safety score. Solve safety problems according to physical examination results.

Computer repair:

Repair the tampered registry or system location in the computer and restore the security state.

Vulnerability scanning:

Get the update information of system patches in the first time and patch them quickly.

computer optimization:

optimize the system, manage the process, and clean up plug-ins, junk files and traces of use.

Rising Security Website:

This station has been certified by Rising Security, which can ensure users' online safety.

complete collection of functions:

With a large number of practical tools, users can quickly solve difficult problems.

2, "cloud security" plan

"cloud security" is a huge system, which is the actual embodiment of the internet-based anti-virus software. Specifically, Rising's "cloud security" system mainly includes three parts: more than 1 million clients, intelligent cloud security servers and hundreds of internet heavyweight companies (partners of Rising).

first of all, the clients, such as Rising 29 and Rising Kaka Internet Security Assistant, have integrated "cloud security probes", and users' computers become "cloud security" clients after installing these softwares. With the development of "cloud security", a number of heavyweight manufacturers, including Thunder, Express, Giant and Jiuyou, have joined Rising's "cloud security" plan, and their software has also added the function of "cloud security probe" to become clients.

the "cloud security probe" installed by the user can sense the security information on the computer, such as the abnormal Trojan file starting to run, the Trojan modifying the key position of the system registry, the webpage visited by the user being infected, etc. The "probe" will upload these information to the "cloud security" server for in-depth analysis.

after the analysis, the server adds the analysis results to the "Cloud Security" system, so that all clients of "Cloud Security" can immediately defend against these threats. Different types of threats have different ways to deal with them. If it is a newly discovered Trojan virus, the "Smart Security" server will send the signature code of the virus back to the poisoned client, so that users can kill the virus in time. If a "poisonous webpage" is found, the "cloud security" system will send the URL to all partners, so that companies such as search engines and download software can block these websites in the first time, thus ensuring the safety of users in the shortest time.

in order to establish a "cloud security" system and make it run normally, four major problems need to be solved: first, a large number of clients (cloud security probes) are needed; Second, professional anti-virus technology and experience are needed; Third, it needs a lot of capital and technical input; Fourth, it must be an open system, and a large number of partners need to join.

first, a large number of clients (smart security probes) are needed. Only with a large number of clients can we have the most sensitive perception of viruses, Trojans and websites that hang horses on the Internet. Rising has more than 1 million clients of its own. If clients of partners such as Xunlei and Jiuyou are added, it can completely cover all netizens in China. No matter which netizen is poisoned and visits the website of Guama, he can respond at the first time.

second, you need professional anti-virus technology and experience. Rising has accumulated anti-virus technology for nearly 2 years, and has a research and development team composed of hundreds of engineers, which has continuously obtained international-level technical certification, and its technical strength ranks among the top in the world. All these make Rising's "cloud security" system the first in China and the first in the world. The comprehensive application of a large number of patented technologies, virtual machines, intelligent active defense, large-scale parallel computing and other technologies enables Rising's "cloud security" system to process massive reported information in time and share the processing results with every member of the "cloud security" system.

thirdly, it needs a lot of capital and technical input. Rising's "cloud security" system has invested more than 1 million yuan in hardware such as servers and bandwidth, and the corresponding top technical team and the continuous research expenditure in the next few years will be several times the hardware investment, which is beyond the reach of non-professional manufacturers.

fourth, it must be an open system, and a large number of partners need to join. Rising "Cloud Security" is an open system, and its "probe" is completely compatible with all software. Even if users use other anti-virus software, they can install software with "probe" function such as Rising Kaka Assistant and enjoy the fruits brought by the "Cloud Security" system. The addition of hundreds of heavyweight manufacturers such as Jiuyou and Xunlei has also greatly enhanced the coverage of the "cloud security" system.

3. What is the relationship between Rising's "cloud security" and "cloud computing"?

"cloud security" is the internetization of antivirus software, which is more like the application of network, but it also uses a lot of technologies of "cloud computing", including the massive information captured by cloud security, which needs to be analyzed and processed. These things are bound to need some technologies of cloud computing, such as clustering and distributed computing, to deal with it.

4. Will the information uploaded by Rising Cloud Security affect my privacy?

Rising "Cloud Security" has strict regulations on the scope of information collection. It only collects information such as the running status and function logs of security software, which has no personal characteristics of users at all, and there will be no privacy problems in itself. Moreover, Rising provides users with convenient closing options, and users can close the collection of cloud security information at any time. Of course, then users will not enjoy the fruits of "cloud security".

5. After installing the software with Rising "Cloud Security Probe", will it consume my system resources and slow down the machine?

The user's experience is the primary concern of Rising, and Rising has a strict definition of resources and information collection consumed in every link of "cloud security". "Cloud security probe" is only a small module, and it is mainly used to collect some information, without any complicated calculation, and the system resources consumed can be ignored. If you feel that the computer slows down after installing the "cloud security" system, you are welcome to make suggestions and opinions to Rising through various channels. On December 3rd, 214, Rising Company released the third mobile Internet product this year-Rising Wi.