An alternative reason for high CPU usage by browsers

Source: Internet
Author: User
Tags high cpu usage superuser permission

When our computer is very slow, we often see that the CPU runs at a high load when we open the task manager, which is easy to habitually think that everything is a machine error. Hardware and equipment are only one of them. For individual users, there are also viruses that affect web browsing, and the invisibility in web pages.CodeIt also began to seriously threaten our security, but most people lack self-protection awareness and lack of awareness of the dangers of invisible code, others even steal important information without their knowledge.

Therefore, we should be highly aware of the potential impact of Web code. In general, the potential risks arising from Web code are roughly divided into the following categories:

1. CPU usage

By constantly consuming the system resources of the local machine, the CPU usage is as high as 100%, so that the computer can no longer process other users.

A typical prank of code is to generate an endless loop through JavaScript. This type of code may appear on a malicious website or in the form of email attachments. Most mail clientsProgramCan automatically call the browser to open htm/html files. As soon as you open the attachment, there will be countless new browser windows on the screen. Finally, you have to restart the computer. Attachment.

2. Illegal reading of local files

A typical practice of this type of code is to read local files by calling ActiveX, JavaScript, and webbrowser control on a webpage.

This code is more concealed than "The above features. Generally, it is difficult for people to find that the invisible code is reading files on their hard disks. Attackers can also exploit browser vulnerabilities to kill attacks, such as the IFRAME vulnerability of ie5.0. A few lines of code can read any files that can be opened by IE on your local hard disk.

You can disable javascript and pay attention to Microsoft's security patches at any time.

3. Web Spoofing

Attackers first break into the DNS server responsible for domain name resolution of the target machine, and then reset the DNS-IP address to a host that he has been given super user permissions. These attacks are rare in China at present, but they are very harmful if they are successful. In addition, it may cause heavy losses. The attack method is: forge an environment identical to that of the target machine on the host that has won the superuser permission to trick you into handing over your username and password. For example, our email or even the bank account and password on the Internet. Because you are faced with the same environment as yesterday, when you are skilled in typing the user name and password. I didn't even think of a real host. Therefore, when surfing the Internet, it is best to turn off the Javascript of the browser so that attackers cannot hide the signs of attacks. They only open the browser when they access a familiar website, although this reduces the functionality of the browser. Also, do not link to other websites from websites you are not familiar with, especially those websites that need to enter the personal account name and password.

4. Control User Machines

At present, this type of problem is mainly caused by the use of Actives by IE.

Now let's take a look at our IE Security Settings. For "Download Signed ActiveX controls", the current option is "prompt ". But you may not know that IE still has the privilege to download and execute programs without prompting. This is a serious security problem, and we may be completely controlled by others without knowledge. Create a CLSID-based New {partition b6015c} for Active Setup controls under Registry HKEY-LOCAL-MACHINESOFTWARE Microsoft Internet Explorer ActiveX compatiblity create a regdword type value under new: Compatibility Flags 0x00000400.

5. The local hard disk is incorrectly formatted.

This type of code is very harmful. Your hard disk will be formatted as long as you browse its webpage. This is not sensational. In fact, it is not a new vulnerability for IE to format the hard disk by executing ActiveX. If you browse a webpage containing such code, your local hard disk will be quickly formatted, in addition, because the window is minimized during formatting, you may not have to pay attention to it at all.

IT knowledge base (http://www.itkbase.net should prompt, the local format.com;deltree.exe and Other Dangerous commands should be renamed is also a way. Because there are not many cases where we really need to use these doscommands in windows, and many macro viruses or dangerous Code directly call these doscommands.

So the CPU is just a representation. We need to dig deeper into what causes the CPU to be so hard, find the problem and then break it apart. The CPU is still clean, and the network is still quiet. I hope this will help you.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.