Introduction of Rising Full-featured Security Software 2009

Rising Full-featured Security Software 2009 was officially released. Based on the development of Rising's "cloud security" technology, it has achieved complete internetization and is an epoch-making security product that transcends the traditional "antivirus software". This product integrates multiple protection functions of interception, defense, killing and protection, and seamlessly integrates antivirus software and firewall into one product, realizing mutual cooperation and overall linkage, greatly reducing the occupation of computer resources. Rising 2009 has three interception and two defense functions: Trojan intrusion interception (website interception +U disk interception), malicious urls interception and network attack interception; The five functions of Trojan behavior defense and outbound attack defense are all designed for the rampant vicious Trojan virus, which can combat Trojan invasion from multiple links and protect users' safety.

Through the in-depth analysis of the data obtained by the "cloud security" system, Rising R&D team has made a number of major improvements to the "intelligent active defense" function, and monitored common malicious behaviors such as "using the camera remotely", "modifying the date and time of the system" and "accessing the underlying disk" to completely prevent hackers from peeping through the remote camera and better protect users' privacy.

A New Generation of Internet Security Software Based on "Cloud Security" Strategy

Rising Cloud Security: Connect the computers of global Rising users with the Rising Cloud security platform in real time through the Internet, and form a Trojan horse and malicious urls monitoring network covering the Internet, which can find, intercept and deal with massive latest Trojan viruses and malicious urls in the shortest time, and deliver solutions to all users in time to prevent various emerging network threats in advance. Every user of "Rising Full-featured Security Software 2009" can enjoy the "cloud security" achievements of hundreds of millions of Rising users.

Three major interceptions:

1, Trojan intrusion interception (U disk interception): through intelligent analysis of Trojan behavior, the U disk virus is prevented from running.

By analyzing the spreading behavior of Trojan virus, we can prevent it from invading users' computers through USB flash drives and mobile hard disks, and block its spreading channels by using storage media. Trojan horse intrusion interception (U disk interception) replaces the original U disk monitoring, which has a wider control range and can better control the execution area. When programs within the range of Trojan intrusion interception (U disk interception) try to run automatically or directly, intercept them and prompt the user.

2. Trojan horse intrusion interception (website interception): By analyzing the behavior characteristics of webpage scripts, prevent webpages from hanging on horses.

More than 90% of viruses spread through web pages. On the basis of analyzing the behavioral characteristics of web scripts, Rising 2009 specially added Trojan intrusion interception technology, which can analyze all encrypted and deformed web scripts and directly detect the malicious characteristics of these scripts, thus achieving better interception effect than the original feature code. At the same time, users can set a unique behavior detection range according to their own needs, so that Trojan intrusion interception (website interception) can protect the system to the maximum extent.

Trojan intrusion interception (URL interception) breaks through the technical barrier that the original webpage script scanning can only pass the feature killing. It solves the problem that the original webpage script monitoring can't handle encrypted deformed virus scripts. Due to the adoption of behavior detection and killing, it has good defense and processing ability against trojans such as hanging horses on web pages. This function is one of the main technologies supporting Rising's "Cloud Security" plan.

3. Network attack interception: intercepting dangerous attack packets in the network outside the computer.

The intrusion detection rule base is updated at any time every day to intercept hackers and virus attacks from the Internet, including Trojan attacks, backdoor attacks, remote overflow attacks, browser attacks, botnet attacks and so on. As an active security protection technology, network attack interception can intercept the intrusion before the system is harmed and monitor the network without affecting the network performance.

Network attack interception is also a basic function of network monitoring, which can prevent hackers/viruses from taking advantage of loopholes in local systems or programs to control local computers. Using this function, you can avoid being attacked by hackers/viruses because of system vulnerabilities and other problems to the maximum extent.

3. malicious urls Interception: According to Rising's "Cloud Security" achievement, malicious urls was intercepted.

Relying on Rising's "cloud security" plan, update the malicious address database at any time every day to prevent the invasion of Trojans and phishing websites on computers. Users can screen websites that are not suitable for teenagers to browse through this function, and create a green and healthy online environment for children. Because URL filtering contains blacklists and whitelists of websites. Users can set suspicious or inappropriate network addresses to the website blacklist and trusted network addresses to the website whitelist. In addition, malicious urls blocking function can also monitor specific port numbers, agents and suspicious programs.

Two major defenses:

1, Trojan behavior defense:

Through the built-in rules and user-defined rules based on behavior analysis, the trojan horse's action of destroying the system is intercepted.

By analyzing the behavior of Trojan horses and other viruses, we can intelligently monitor unknown Trojan horses and other viruses to prevent their theft and destruction. This part is divided into Rising built-in rules and user-defined rules. Built-in rules are the summary of Rising's anti-virus experience for many years, and user-defined rules are edited by themselves according to the needs and actual conditions of different users. Users can upload their edited rules to Rising. If the rules are widely used, Rising can upgrade the custom rules to Rising content rules.

2, outbound attack defense:

Prevent computers from being manipulated by hackers and becoming "broilers" attacking the Internet, protect bandwidth and system resources from being maliciously occupied, and avoid becoming members of "botnets". With the Outbound Attack Prevention feature, you can detect SYN, ICMP and UDP messages sent and received by local and external connections.

Improvement of intelligent active defense

In Rising 2009, "intelligent active defense" is more open, intelligent and flexible. In particular, "security hardening" and "application control" can strengthen the vulnerability of the system and resist the invasion of malicious programs. In particular, it defends against the invasion of popular "camera control" and "virus installation driver", which can better protect the safety of users.

Security reinforcement: Monitor and reinforce the vulnerable points in the operating system that are easy to be used by malicious programs to resist the infringement of malicious programs on the system. Safely strengthen monitoring system actions, registry, key processes and system files to prevent malicious programs from modifying system processes, operating registry and destroying key processes and system files.

Through the study of mainstream viruses, Rising 09 security reinforcement has increased the monitoring of common malicious behaviors such as "modifying the system date and time", "turning off the computer", "controlling the camera", "installing drivers" and "accessing the underlying disk", and the virus will automatically alarm when doing these operations, greatly enhancing the security of the system.

Application control: provide personalized system-level program control for advanced users, add file access, registry access, system action settings, start-up programs and other operations, monitor the running state of programs, intercept abnormal behavior of processes, and provide personalized protection for users.

Trojan intrusion interception-website interception (antivirus software)

By monitoring the behavior of malicious web pages, Trojan virus can be prevented from invading users' computers through websites, and the threat of Trojan virus can be intercepted outside the computers.

Trojan intrusion interception -U disk interception (antivirus software)

By analyzing the spreading behavior of Trojan virus, it can be prevented from invading users' computers through USB flash drives and optical disks, and its spreading channel can be blocked by storage media.

Trojan behavior defense (antivirus software)

By analyzing the behavior of Trojan horses and other viruses, we can intelligently monitor unknown Trojan horses and other viruses to prevent them from being stolen and destroyed first.

Network attack interception (personal firewall)

The intrusion detection rule base is updated every day to intercept hacker and virus attacks from the Internet, including Trojan attacks, backdoor attacks, remote overflow attacks, browser attacks, botnet attacks and so on.

Malicious urls Interception (Personal Firewall)

Relying on Rising's "cloud security" plan, the malicious address database will be updated in time every day to intercept the infringement of Trojans and phishing websites.

Outbound attack defense (personal firewall)

Prevent computers from being manipulated by hackers and becoming "broilers" attacking the Internet, protect bandwidth and system resources from being maliciously occupied, and avoid becoming members of "botnets".

Microsoft Windows 2000 professional edition

(Service Pack 4 or later)

Microsoft Windows XP home edition

(Service Pack 2 or later)

Microsoft Windows XP professional edition

(Service Pack 2 or later)

Microsoft Windows XP Professional Edition x64 Edition

Intel Pentium 300 MHz or higher (or equivalent)

128 MB memory

Microsoft Windows Vista home basic edition

(32 or 64 bits)

Microsoft Windows Vista home premium edition

(32 or 64 bits)

Microsoft Windows Vista Business Edition

(32 or 64 bits)

Microsoft Windows Vista enterprise edition

(32 or 64 bits)

Microsoft Windows Vista Ultimate Edition