|
What about boobs?
Jeremy Falcon
|
|
|
|
|
Just to chime in here... I have also thought about making my own OS. Not so much anti-virus, but the OS. Mainly for learning. Times have changed now though and I'm more like Munchies Mat where I just think about boobs now.
Jeremy Falcon
|
|
|
|
|
You forgot to dream about people using it as well. So dream on.
|
|
|
|
|
I wouldn't use/trust code I wrote for these and many more:
Operating System
Antivirus
Encryption
Compression
|
|
|
|
|
Sir, Can I know the reason why?
|
|
|
|
|
First,
If you are interested in a job, contacted me privately via email.
What you did should be COMMENDED. It is something I have "dreamed" of but I already wrote a compiler, and a run-time system (a lightweight OS type shell on old computers), excel-like embedded spreadsheet.
You show gumption, and potentially core skills that are solid, and useful.
Second,
You miss the point some are making. There are those of us with enough experience to tell you this will end badly. You need an update server, new virus definitions, etc. And I have personally seen viruses that attack Norton/others. Literally preventing them from loading!
Catching viruses is a moving target, requiring a fair amount of resources. Dealing with False Positives, etc. etc. The potential for slowing a machine down.
And the OG makes the point that you could literally hit an update server, grab an update, that turns out to be RANSOM WARE (because they hacked your update server), and now every client has ransom ware installed. Huge risks, low reward.
Third,
Completing a project like this is a great sign. You should go far in your career.
Try writing a CP article on pieces of this, like that FS Machine that scans multiple viruses in a single pass. How this is built/maintained/updated.
Fourth,
Pass on trying to monetize this, other than adding to your street cred, or assisting you in getting a better position, including working for one of the existing Anti-virus companies. Or being the basis of some articles, etc.
Fifth,
Reach back to me privately, I know someone who is interested in a person of your apparent skills.
|
|
|
|
|
Yes sir, you have right it needs solid database,man-power and through monitoring of the product server itself. and I cannot make this much set-up on my own at present situation. So I made my product as open-source. With millions of open-sorce software developers I think it would be soon be an alternative to commercial solution.
Thank you sir for your job offer! I am shy to work under a company since I am a student. Kindly excuse me
|
|
|
|
|
I looked at your GitHub code. If you wrote half of that you're clearly very talented as a student.
Although m understanding is you're checking the hash of files. so you now need a known list of viruses.
Do you happen to know MVC and HTML. I could do with teaming up with someone for my web app with some coding skill.
|
|
|
|
|
Thank you sir for your kind encouragement. The DOS engine is itself self-documented code and it is commented throughly for better understanding of some one is willing to imporve/modify and make it fit for their use.
Sorry sir, I am a student actually, I will feel shy working in a company! Thank you for this opportunity!
|
|
|
|
|
"Shying" away from a company might make sense from the standpoint of wanting to finish your education before starting a career; however, continually backing away from all legitimate work is not encouraging anyone to actually utilize your product. Humans are not attracted to that which lurks in the shadows.
|
|
|
|
|
Sir, how could a person who is in the mid of his bachelor's degree could skip his education and join in a company? I could be surrounded by a person's who might hold masters. Anyone in this situation could shy. It is impractical to skip my education i.e if some unexpected things happened then I can't go back and continue studies. I am not backing off, the job of the student is to study
|
|
|
|
|
|
To get some payment out of it, you might try asking for a donation. In the about box, you can ask the user if he would consider making a donation toward improving the product. This is a form of shareware.
Then again, since you have made a product, you can add it to your portfolio and scout the jobs at companies the making anti-virus software. Your new software creation will help you getting that job.
|
|
|
|
|
Thank you sir for your kind suggestion, the webpage do have a donation link.
|
|
|
|
|
You have very specific dreams, which I suppose could go either way as far as increasing your chances of accidentally becoming a billionaire (like Bill Gates, Zuckerberg, etc....don't think any of those on this kind of list had a particular dream other than to play with computers and somehow make money at it).
I would like to see what you developed, but am scary about visiting any links that don't meet security checks, which these days amounts to a reputation check (that is a Catch-22 of course). If you put it up at github, let me know (please don't use sourceforge.net---those people still scare the hell out of me...never know if something is going to pop up from an install and scurry across the room to infect the denizens of earth).
...and that segues to to my own thoughts on anti-malware lately, which is that it would be nice to have access to a massive database of reputation scan information and code hashes. VirusTotal does make their database API available, but unless you provide information to them you are limited to 4 queries per minute (so on my machine with tens of thousands of files someone will have proven NP == P by the time the scan completes, at which time the Universe will evaporate).
|
|
|
|
|
|
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers).
I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?).
I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
|
|
|
|
|
|
I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet).
Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index).
As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again).
I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read).
After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compile them from Haardt's c source or port to Python (so won't be starting a github project on that for now).
As far as doxing folks, all of the major search engines do point at me if you
follow ancientzygote music trail (but I am indeed ancient and largely irrelevant to this present world, where I fear Vishnu will be replaced by Shiva soon).
|
|
|
|
|
|
No, I have not lived in India for a while. I will try to make this reply brief since I believe codeproject would prefer I just connect a blog here rather than write lengthy articles in this venue. There is an excellent article from 1982 describing the persistent paradox of psychic phenomena from an engineering perspective (Proceedings of the IEEE, Vol 70, No 2, February 1982 by Robert G Jahn). Perhaps that is incidentally relevant to my quick study on India, or I simply have an effective neural search facility in my "meat computer," grin.
Regarding my reference to file entropy, I did not use the Dr. Fu article, but rather one written by Rob VandenBrink, a consultant at Compugen writing for SANS Technology Institute ("Using File Entropy to Identify Ransomwared File").
|
|
|
|
|
VISWESWARAN1998 wrote: Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it
When I was 18 ... I dreamt of distributed system architectures (and I was good at it )
I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.
Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas.
Carl von Clausewitz
Source
|
|
|
|
|
Sir, I know about ClamAV it is not too much for windows, It primarily concentrates on *nix operating systems. Yes,there is Windows specific ClamWin but is it not drawing too much of attention. Another free products will perform very well than that!
I don't know what to do so I made my project as open-source. I made a mistake, I've have concentrated only on how the project can be implemented and totally forgetting what I am going to do for the resources.
But the project is not dead yet! I dont know why I can't move away from this. I thought I would start my career by creating an AV company of my own at-least I expect to get job in some other AV company
|
|
|
|
|
I don't know what did you make or is it any good, but I admire hard work.
Making your own program(s) is good attitude for a 18 years old student.
Just keep on practicing and some day some people will pay you for it. 
|
|
|
|
|
Thank you sir for your kind encouragement!
|
|
|
|