Finally..... Antivirus........ :)
-
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:
To get some payment out of it, you might try asking for a donation. In the about box, you can ask the user if he would consider making a donation toward improving the product. This is a form of shareware. Then again, since you have made a product, you can add it to your portfolio and scout the jobs at companies the making anti-virus software. Your new software creation will help you getting that job.
-
I just let my Kaspersky expire, since all members of my family got tired of their computer being unacceptably slow and just accepted Windows Defender as a default. Kaspersky had options to not scan if you are playing games or are on battery power, but that is no help if you are merely doing web or email stuff. I routinely had to unplug my laptop to stop the scanning so I could get work done, but working without power only goes so far.
Strange - I moved to Kaspersky because Defender slugged the computer for several hours every afternoon, despite being told to scan between midnight and 05:00. Kaspersky does nothing slow on my PC at all - and it's only a dual core with 4GB of RAM! Just goes to show that PC are far too different for their own good sometimes! :laugh:
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
-
I looked at your GitHub code. If you wrote half of that you're clearly very talented as a student. Although m understanding is you're checking the hash of files. so you now need a known list of viruses. Do you happen to know MVC and HTML. I could do with teaming up with someone for my web app with some coding skill.
Thank you sir for your kind encouragement. The DOS engine is itself self-documented code and it is commented throughly for better understanding of some one is willing to imporve/modify and make it fit for their use. Sorry sir, I am a student actually, I will feel shy working in a company! Thank you for this opportunity!
-
To get some payment out of it, you might try asking for a donation. In the about box, you can ask the user if he would consider making a donation toward improving the product. This is a form of shareware. Then again, since you have made a product, you can add it to your portfolio and scout the jobs at companies the making anti-virus software. Your new software creation will help you getting that job.
-
First, If you are interested in a job, contacted me privately via email. What you did should be COMMENDED. It is something I have "dreamed" of but I already wrote a compiler, and a run-time system (a lightweight OS type shell on old computers), excel-like embedded spreadsheet. You show gumption, and potentially core skills that are solid, and useful. Second, You miss the point some are making. There are those of us with enough experience to tell you this will end badly. You need an update server, new virus definitions, etc. And I have personally seen viruses that attack Norton/others. Literally preventing them from loading! Catching viruses is a moving target, requiring a fair amount of resources. Dealing with False Positives, etc. etc. The potential for slowing a machine down. And the OG makes the point that you could literally hit an update server, grab an update, that turns out to be RANSOM WARE (because they hacked your update server), and now every client has ransom ware installed. Huge risks, low reward. Third, Completing a project like this is a great sign. You should go far in your career. Try writing a CP article on pieces of this, like that FS Machine that scans multiple viruses in a single pass. How this is built/maintained/updated. Fourth, Pass on trying to monetize this, other than adding to your street cred, or assisting you in getting a better position, including working for one of the existing Anti-virus companies. Or being the basis of some articles, etc. Fifth, Reach back to me privately, I know someone who is interested in a person of your apparent skills.
Yes sir, you have right it needs solid database,man-power and through monitoring of the product server itself. and I cannot make this much set-up on my own at present situation. So I made my product as open-source. With millions of open-sorce software developers I think it would be soon be an alternative to commercial solution. Thank you sir for your job offer! I am shy to work under a company since I am a student. Kindly excuse me
-
I wouldn't use/trust code I wrote for these and many more: Operating System Antivirus Encryption Compression
-
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:
You have very specific dreams, which I suppose could go either way as far as increasing your chances of accidentally becoming a billionaire (like Bill Gates, Zuckerberg, etc....don't think any of those on this kind of list had a particular dream other than to play with computers and somehow make money at it). I would like to see what you developed, but am scary about visiting any links that don't meet security checks, which these days amounts to a reputation check (that is a Catch-22 of course). If you put it up at github, let me know (please don't use sourceforge.net---those people still scare the hell out of me...never know if something is going to pop up from an install and scurry across the room to infect the denizens of earth). ...and that segues to to my own thoughts on anti-malware lately, which is that it would be nice to have access to a massive database of reputation scan information and code hashes. VirusTotal does make their database API available, but unless you provide information to them you are limited to 4 queries per minute (so on my machine with tens of thousands of files someone will have proven NP == P by the time the scan completes, at which time the Universe will evaporate).
-
Thank you sir for your kind encouragement. The DOS engine is itself self-documented code and it is commented throughly for better understanding of some one is willing to imporve/modify and make it fit for their use. Sorry sir, I am a student actually, I will feel shy working in a company! Thank you for this opportunity!
"Shying" away from a company might make sense from the standpoint of wanting to finish your education before starting a career; however, continually backing away from all legitimate work is not encouraging anyone to actually utilize your product. Humans are not attracted to that which lurks in the shadows.
-
"Shying" away from a company might make sense from the standpoint of wanting to finish your education before starting a career; however, continually backing away from all legitimate work is not encouraging anyone to actually utilize your product. Humans are not attracted to that which lurks in the shadows.
Sir, how could a person who is in the mid of his bachelor's degree could skip his education and join in a company? I could be surrounded by a person's who might hold masters. Anyone in this situation could shy. It is impractical to skip my education i.e if some unexpected things happened then I can't go back and continue studies. I am not backing off, the job of the student is to study
-
You have very specific dreams, which I suppose could go either way as far as increasing your chances of accidentally becoming a billionaire (like Bill Gates, Zuckerberg, etc....don't think any of those on this kind of list had a particular dream other than to play with computers and somehow make money at it). I would like to see what you developed, but am scary about visiting any links that don't meet security checks, which these days amounts to a reputation check (that is a Catch-22 of course). If you put it up at github, let me know (please don't use sourceforge.net---those people still scare the hell out of me...never know if something is going to pop up from an install and scurry across the room to infect the denizens of earth). ...and that segues to to my own thoughts on anti-malware lately, which is that it would be nice to have access to a massive database of reputation scan information and code hashes. VirusTotal does make their database API available, but unless you provide information to them you are limited to 4 queries per minute (so on my machine with tens of thousands of files someone will have proven NP == P by the time the scan completes, at which time the Universe will evaporate).
-
Yes, Sir the project is hosted on Github GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^]
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
-
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]
-
Nice work, particularly for an 18 year old way down there in Madurai (rural I guess from reference to Karuppu Sami in the .h headers). I just looked over your code and see that you are (1) looking for a known malware hash in your local database ksgmprh.db SQLite file (2) looking for any upx packed exe's (3) looking for any suspicious strings in the executable, but I couldn't find what database of strings you are using for that (and didn't see an obvious reference in your unit-tests.cpp (I thought maybe you had your custom strings in the SQLite database, but didn't see where else you had the known file hashes--maybe you haven't fully implemented the suspicous string database yet?). I see you are proficient in Python. I might need your help porting the old Unix diction and style c code to Python 2.7 (if I can't compile it locally with MSVC scraps).
Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. Sir, is your project hosted on Github so that I could help you if I can? P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]
-
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused:
VISWESWARAN1998 wrote:
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it
When I was 18 ... I dreamt of distributed system architectures (and I was good at it ;P ) I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.
Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas. Carl von Clausewitz Source
-
VISWESWARAN1998 wrote:
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it
When I was 18 ... I dreamt of distributed system architectures (and I was good at it ;P ) I think instead of creating your own wild product, I would suggest to contribute your effort to an existing open-source product, called ClamAV. We use it in Postfix installations, so do a million others.
Beauty cannot be defined by abscissas and ordinates; neither are circles and ellipses created by their geometrical formulas. Carl von Clausewitz Source
Sir, I know about ClamAV it is not too much for windows, It primarily concentrates on *nix operating systems. Yes,there is Windows specific ClamWin but is it not drawing too much of attention. Another free products will perform very well than that! I don't know what to do so I made my project as open-source. I made a mistake, I've have concentrated only on how the project can be implemented and totally forgetting what I am going to do for the resources. But the project is not dead yet! I dont know why I can't move away from this. I thought I would start my career by creating an AV company of my own at-least I expect to get job in some other AV company
-
Wow, sir I didn't add any information about the place I live. Have you Doxed it? Doxing - Wikipedia[^] or used some kind of reconnaissance tools to gather private info about me? :) The strings database functionality is completed but I currently analysed a very less of malware which is not more than 20 so I have not added any database for that since it may not be useful. However @ line no: 27 in CyberGod-KSGMPRH/Malware.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] you will find a function call (which is exported from the .dll) here CyberGod-KSGMPRH/export.cpp at master · VISWESWARAN1998/CyberGod-KSGMPRH · GitHub[^] it will create a fresh database, and you may add the proper strings if you wish for detections. This book @ Amazon [^] will give you the brief read on how to extract proper strings from a binary. Sir, is your project hosted on Github so that I could help you if I can? P.S Madurai is not a rural it is a Metropolitan City and is a one of the important tourist spot where people from all over the world come to Madurai to see this place, File:An aerial view of Madurai city from atop of Meenakshi Amman temple.jpg - Wikipedia[^]
I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet). Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index). As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again). I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read). After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compi
-
Sir, It will work fine along with your primary antivirus and will not slow down your system. Kindly have a look at it GitHub - VISWESWARAN1998/CyberGod-KSGMPRH: An open-source antivirus for windows[^] I am quiet sure there is no open-source ransomware or any-other threats. :cool: It has various other bunch of tools too...
-
Strange - I moved to Kaspersky because Defender slugged the computer for several hours every afternoon, despite being told to scan between midnight and 05:00. Kaspersky does nothing slow on my PC at all - and it's only a dual core with 4GB of RAM! Just goes to show that PC are far too different for their own good sometimes! :laugh:
Bad command or file name. Bad, bad command! Sit! Stay! Staaaay...
Odd. I run Defender. Never had it slow down anything. This computer runs quite well. McAfee on the other hand was a killer. I had another computer that had to turn on the fan every time there was a scan. And the scan NEVER finished. It kept running until it used up all the memory.
-
I am pleased you were impressed with my "Doxing tool," which is merely my ancient brain, grin. I'm a retired engineer (among other things) and do research in various fields as my interest leads me. I note that it is becoming more difficult to do research since some of the major search engines are using more "artificial intelligence," which is about the level of a Family Feud (a banal television show in the US that rewards people for mentally recalling phrases used in daily life) query-response engine, so effectively impairs my ability to construct and pursue relatively unique queries (except at Google Scholar, which fortunately has not been impaired yet). Thanks for the specific target in your code where I can look at your internal exe string pursuit (and the explanation of where you are currently in that regard). I forgot to add in my last communication that you might find it useful to calculate the file entropy rather than (or as an additional tactic) simply look for the upx packing signature, since malware compression may use different methods of compression but they all tend to cause a high file entropy (typically malware lacks the magic byte identifier and is high entropy as a general suspicion index). As far as extracting strings from binary, I expect looking at your own string method (which you kindly point out can be general purpose if the malware search portion is omitted) will be a nice tutorial (I did software development with assembly and C in the early 1980's so find myself having to brush up on technique when I actually jump into development or analysis again). I did look at Madurai more closely than my guess about which areas were more likely to find Karuppu Sami attractive/familiar. It indeed appears to be a local hub of activity, though there does seem to be some need for more employment to raise the standard of living for everyone there. The layout around the central temple is really cool. I am familiar with the Gita and many of the Upanishads (and enjoyed a cinematic enactment of the Mahābhārata, it being a little too lengthy to read). After I responded yesterday I decided to analyze the sourceforge binaries for the unix diction and style independently reproduced by Michael Haardt in 2007 and they had the proper dates and contents (in the zips) and the file reputation was good (you can use virustotal and general search to verify) so I went ahead and unpacked them and set up a directory on my Windows machine and tested them on some text. They worked so I am pleased not to have to compi
There is only two things reamaning sire one is my address and phone no :-\ you analyzed our languages and cultures which I have not even revealed a single info anywhere here. I doubt that you lived in India for a while. You are saying about this? Dr. Fu's Security Blog: Malware Analysis Tutorial 8: PE Header and Export Table[^]
-
Many of the programmers will have either one of the dreams i.e creating an antivirus or creating their own operating system. Well, I had the former dream that creating an anti-virus of my own. After many months of hard work, I finally made an antivirus which meets most of the standard requirements for an anti-virus., It is a portable solution and it has many features included along with it see the screenshot here : [^] Okay, I wanted an antivirus, I created one! and I would like to distribute it. But I dont know whether I am a man or a boy., I am just 18 and a half years old and do not have too much of money and time to promote and supporting so I decided to make this as an open-source one. Is there any way to get some kind of revenue from open-source products? Can you give some suggestion on what to do after this stage? making it open source or doing anything.... :^) :^) :confused::confused: