Easy language programming digital combination question?

Press the New, each line of the editor box 1 according to the parameters of the combination box, input to the editing box 2, and it is prompted how many groups in total

2 thoughts on “Easy language programming digital combination question?”

  1. Version 2

    . Program set window assembly 1

    . Program set variable array 1, text type, "0"
    n. Variable array 2, text type, "0"

    . Program set variable text, text type

    . n. Program set variable meter 1, integer type

    . Set the variable meter 2, integer type

    . n
    . Edit box 3. Whether it allows multiple lines = true

    . The first loop (3, count)

    To text (section),)

    . n Clear array (array 1)

    Clearing array (array 2)

    . r n
    In members (array 1, intermediate text (editor box 1. content, calculation, 1))

    . n. The first loop of the calculation (taking the text length (editing box 2. content), counting)

    In the members (array 2, the intermediate of the text (editor box 2. content, 1, 1, 1 )

    . Select the item = 0)

    combination 1 ()

    back ()

    . True (Combination Frame 1. The current selected item = 1)

    combination 2 ()

    returns ()

    . n
    . If the number of members (array 1) u003C3)

    returns ()

    . n. The first loop (number of members of the number of groups (array 1), order)

    . The variable loop first (counting 1, the number of members of the number of arrays (array 1), 1, secondary secondary, secondary secondary 1)

    . The variable cycle is the first (counting 1 1, the number of members of the array (array 1), 1, 2)
    n Two] Array 1 [Two 1] Array 1 [Two]

    Edit Box 3. Add text (text, "")

    . Variable circulation tail ()

    . Second cycle ()

    . Sub -program combination 1

    . rn .计次循环首(取数组成员数(数组2), 计次)rnrn .变量循环首(计次+ 1, 取数组成员数(数组2), 1, Section 2)

    Text = array 1 [Two 1] array 2 [counting] array 2 [calculate 2]
    n editor box 3. Add text (Text, "")

    . Variable circulation tail ()


    . Sub -program combination 2

    . The first cycle of the meter (number of members of the array (array 1), counting)
    n. Variable cycle The first (second 1, the number of members of the number of groups (array 1), 1, count 1)

    . R n
    Text = array 1 [r] array 1 [Two 1] array 2 [Time 2]

    Edit box 3. Add text (text, "" " )


  2. Recently, a number of cyber security teams have received users for help, saying that the computer has encountered a ransomware attack and the files in the computer have been encrypted. According to the above -mentioned security team analysis and confirmation, the virus is a new type of extortion virus. After the computer is invaded, user files will be encrypted. Different from the past, the virus does not charge Bitcoin, but requires the victim to scan the pop -up of WeChat QR code to pay 110 yuan ransom and get the decryption key. This is the first time that the ransom virus that requires WeChat to pay the ransom is the first time in China. At present, the attacker's WeChat account and the two -dimensional codes have been banned by Tencent.
    The revealed that as of December 6, more than 100,000 users had been infected with the virus and the number of computers infected was still increasing. In addition to encrypted user computer files, it also stole Alipay and other passwords. The virus is a module in the "Easy Language" used by attacking software developers to infection, resulting in the ransom virus that developers with "Easy Language" programming. After downloading these "poison" software, users will be infected with the extortion virus. The process of spreading is very simple, but the way to infect software after contaminating "easy language" is relatively rare.
    What is so easy to language? Easy language is a programming language with Chinese characters as a program code. It is known for its "easy" and facilitates the Chinese to write procedures with the Chinese thinking, which greatly reduces the threshold of programming and the difficulty of learning. Since 2000, the number of users of easy -to -language users has grown to a large scale.
    360 security experts were tracked and found that the source of the extortion virus came from a language -easy development module into a malicious code, and the software compiled by the program ape automatically installed the virus. At present, it has been confirmed that applications developed by third -party development such as plug -in tools, brushing software, coding software, and private server have been recruited.
    The virus code is called by the "white plus black" method. It is used to call the virus code. Therefore, the virus dynamic library named Libcef.dll is called and eventually executed a malicious code.
    It subsequently send these "high -risk" applications to the victims through QQ, QQ group sharing, network disk sharing, forum post bar and other forms. After the victim runs the machine, the downloader of the downloader will be infected, and then the downloader Trojan will install other malicious programs. Among them, there are "WeChat Pay" ransomware of the "WeChat Payment".
    The tools used by the gray industry practitioners. There are many tools used in these groups of tools to be killed by anti -virus software. They often ignore the intercepting prompts of anti -virus software. Therefore, the orientation of the ransom virus is very effective for the orientation of the gray production practitioners.
    It worth noting is that although the virus author lied that he was using the DES encryption algorithm, it was simply different or encrypted, and the related data of the decryption key was stored in%user%AppDataRoamingunname_1989datafileAppCFG.CFG. Therefore, even if you do not access the virus author server, you can successfully complete the data decryption. However, it is still recommended to use developers who use the "Easy Language" module to perform viruses as soon as possible. Ordinary users should download software from regular channels. Regular software developers conduct a comprehensive security inspection before the software release, and use the code signature certificate to sign the software to sign a digital signature to prevent the software from being ransom virus maliciously tampered with.
    The use of the GDCA code signature certificate in the Digital Security Times can prevent software from being tampered with malicious extortion of virus and protect website security. If the problems encountered by the user cannot be solved, you can seek help through the GDCA official website of the GDCA official website, and choose a website user who counts the GDCA SSL certificate in the Times of the Security Times. Later worries.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top
Scroll to Top