Jinshan anti-Virus 20050117_ daily _ Internet surfing

Source: Internet
Author: User
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 17, 2005 popular virus.

Today, users are reminded to pay special attention to the following viruses: "Dedler" (worm.dedler.u) and "Apple Bugs" (Worm.apler).

"Dedler" worm, the worm spread through the network, the virus will modify the user's machine settings, and stop the deletion of some network monitoring services, anti-virus software services, resulting in the user's computer security can be greatly reduced.
"Apple Worm" worm, the virus through the sharing of transmission, in the virus, the user's machine is very likely to be controlled by hackers, and will lead to the disclosure of user information, tens of thousands of users adversely affected.

First, "Dedler" (worm.dedler.u) Threat Level: ★

According to Jinshan Poison PA Anti-Virus engineer Introduction, after the virus is run, it copies itself to the system directory and loads it into the registry key, deleting some startup items; The virus stops and deletes some network monitoring services, anti-virus software services, resulting in a significant reduction in user's computer security, and modifies the system's "hosts", Cause poisoning users can not normally access a large number of web sites, so that some anti-virus software can not upgrade the virus library, through the ICQ server to receive the attacker's control instructions, such as downloading the specified network files and run.
Jinshan Poison Bully Anti-Virus experts recommend users: Establish a good security habits. Do not open a number of dubious messages and attachments, do not have some of the sites do not understand, do not perform the download from the Internet without anti-virus software processing files, these can ensure that your computer is more secure.

Second, "Apple Bugs" (Worm.apler) Threat Level: ★

According to Jinshan Poison PA Anti-Virus engineer analysis, this is a spread through the sharing of worm virus. The virus first copies itself to the system directory of the Local machine, and downloading the virus from the network to run on the local machine; the virus automatically generates IP addresses and attempts to connect to these machines by enumerating the names of the corresponding machines in the IP address, and then attempting to attach to them using a null password; Copy the virus to the system directory of the remote machine and implement the virus startup by adding a registry startup entry.
Jinshan Poison bully Anti-Virus experts to remind users: when the operator control the user's computer, can directly cause the user's information is leaked, for your system and personal information security, experts recommend that users open a strange file, please use the latest virus database to scan the soft.

Jinshan Poison PA Anti-Virus engineer reminds you: Please upgrade the poison PA to January 17, 2005 the virus library can completely handle the virus. If you do not install Jinshan poison PA, you can login to http://online.kingsoft.com/use Jinshan poison pa online search virus or Jinshan poison PA download version to prevent the virus intrusion.
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.