| With the rapid development of Internet technology, network security has become Increasingly important .Trojan horse is an important part of offensive and defensive warfare and computer network technology in evidence .Only penetration of the file system filter ,the Trojan program can be installed into the system which is installed with the file system filter driver, and to ensure that the Trojans were not restore the System Restore . The research of the file system filter pass-through technology has important practical value in the network offensive and defensive warfare and computer forensics technology.Based on the related technologies, build a FSFLP System which can penetrate the Restore system and virus firewall .FSFLP is designed around the goals and principles.stated FSFLP system's overall structure and function modules of the major design idea .The driver of the release of documents and loading; module on the system of the basic ideas and gives the system of the basic module processes; driver of the design was discussed.FSFLP use a driver to work into ring0;According to the data resources of the organiza–tion ,search resources data; through direct read and write disk documents to evade the windows file protection; combined with other technologies, such as network file download -ing and execute executable files .Then complete a file system filter layer Penetrating system which can be run effectively .Based on the overall design of FSFLP ,Discuss it focuses on the way to the realization of key technologies. including the physical location of disk documents and to release reso -urces in ring0, and gives the achievement details about in user mode to release resources document,loading driver, network file downloading and running an executable file.The results showed that the actual operation, FSFLP can penetrate file system filter layer, can successfully prevent some antivirus software controls, can be concealed cover the replacement of the system files and not be reverted System Restore. |