Build a system of defensive and offensive tackle for the next viruses and virus filtering using the method of static files
Abstract
Talking about building anti-virus systems in traditional and well-known ways has become useless at the present time, due to the fact that we are dealing with terminal stations within local and international networks, which makes us vulnerable to many viruses coming through those networks, which anti-virus programs cannot address because These programs depend on the names of common viruses that are recorded in the file of warnings or programs that are not allowed to pass into the calculator. Accordingly, computers that do not participate in a specific network can be controlled and protected from viruses, with the exception of modern viruses that are not registered with anti-programs and that come through some common storage media. As for the topic of our research, it deals with how to build effective systems far from the traditional method known to it, as this system includes defining operating systems on non-standard files to book those files using software prepared for this purpose within extended operating systems and at the same time preparing a special independent memory that these programs deal with Processing operations are delegated to the input and output processor. The process also requires that there is software running across the network. What is in effect on the Internet is the monitoring operations carried out by Symantce, as this company owns many sites and has a special department called the MSS Security Operations Department, where the work of this company focuses on monitoring many of its sites and addressing all breaches that occur through firewalls Where the company has prepared software that possesses geographical maps through which the location that was attacked is determined, and therefore it cannot be said that the aforementioned company and through all its branches can control all offensive operations, and if so, where do these destructive viruses come from. Accordingly, it must be said that the work of Symantec is a central work to monitor the sites of danger that appear across the network, where the monitoring sites begin to address hundreds of thousands of intrusions per day after the destructive programs cause damage to many sites. Computer operating systems and international network programs, so that the response to virus programs is local through a system or program included in the operating system, before these destructive programs cause damage. They are confronted and destroyed.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
حقوق النشر والترخيص
تطبق مجلة الفتح للبحوث التربوية والنفسية ترخيص CC BY (ترخيص Creative Commons Attribution 4.0 International). يسمح هذا الترخيص للمؤلفين بالاحتفاظ بملكية حقوق الطبع والنشر لأوراقهم. لكن هذا الترخيص يسمح لأي مستخدم بتنزيل المقالة وطباعتها واستخراجها وإعادة استخدامها وأرشفتها وتوزيعها ، طالما تم منح الائتمان المناسب للمؤلفين ومصدر العمل. يضمن الترخيص أن المقالة ستكون متاحة على نطاق واسع بقدر الإمكان وأن المقالة يمكن تضمينها في أي أرشيف علمي.
لمزيد من المعلومات، يرجى متابعة الرابط: https://creativecommons.org/licenses/by/4.0/.