Several dangerous documents that must be noted

Source: Internet
Author: User

We know that. bat is a DOS batch processing command file. We can use NotePad to edit and add some commands. After running the command, the system will automatically execute the command one by one. Therefore, some dangerous commands will be written into the batch processing file by some ulterior motives and spread around the Internet for destruction, such as writing in hello. bat:
Deltree-y c :\*.*
The next thing you need is to take a towel to wipe your tears. In this sense, it is more vicious than a virus.
In addition, the Registry file. reg can also be written into similar code. For example, we edit a hello. reg:
REGEDIT4
HKEY_CLASSES_ROOT \ CLSID \ 20D04FE0-3AEA-1069-A2D8-08002B30309D \ Alibaba \ open \ command @ = "rcommand/c deltree"
Double-click to execute it to guide the Registry. I am timid and dare not try it. Please give me the answer ^ _ ^ (Note: Do not try it, it is very dangerous ).
Similarly. hlp (Help file), pif (shortcut to DOS ),. dangerous commands can also be written to files such as lnk (Windows shortcuts). It is dangerous to accidentally execute these commands. To prevent the above files from being damaged by calling the DOS command, the passive method is to change the name of a file such as format and deltree.
HTML webpage files are no longer familiar to everyone. HTML itself is harmless, but HTML has the function of calling scripts for external objects, attackers can call external objects that can read and write other files. Therefore, attackers can exploit this vulnerability to embed malicious scripts into HTML, when you open a webpage that contains such scripts and ActiveX controls, the executable program in the HTML application file runs automatically. The next step is ...... So sometimes when IE prompts "some software on this page may be insecure and it is recommended not to run", it is best not to click "OK ".
However, script files such as. VBS and. JS are more toxic and malicious, because they are almost silent during the destruction process and there is no prompt when running them. This virus is the most popular last year. Recently, the famous "HAPPYTIME" even requires you to move your mouse over its email name. The IE preview function can activate this virus, good interests! For example, there are still .wsc0000.wsf1_vbedomainjse, which is commonly executed using wscript.exe, that is, Windows "batch processing"-Windows scripting host.
To prevent such viruses, uninstall the Windows scripting host. The specific method is as follows: my computer control panel → Add/delete programs → install Windows → accessories → details → Windows scripting host → OK. In fact, there is another method that is simpler. type the following two commands in sequence: regsvr32/u wshom. ocx press enter, regsvr32/uwshext. dll press enter to go to the Registry. delete the registration value of the wsh object. In this way, viruses that must rely on objects cannot run because they cannot find objects.
In addition, these viruses are basically spread using Outlook. They often automatically send their own attachments to the e-mail address in the address book. Therefore, you can disable the interface objects provided by Outlook to external scripts. The specific method is regsvr32/u msoe. dll. To resume use, remove/u from the preceding command and run it again.
We recommend that you set the security level of IE to advanced when Browsing unfamiliar websites, disable ActiveX controls and plug-ins, and disable Active scripting. The method is: Run IE → tools → Internet Options → Security → Custom Level, select "disable" for all ActiveX related options, and select "disable" for all JS scripts. Do not open emails with unknown origins, especially emails containing attachments, or execute files in attachments.
Installing a network firewall is also very necessary (especially for users who access the Internet by dialing numbers). At least you can build a line of defense between your computer and the network. We recommend that you use the domestic "Skynet Personal Firewall" for firewall software ", it is free of charge and does not occupy much system resources. In addition, you need to enable real-time monitoring of anti-virus software to prevent virus infection and damage. For downloading software that is frequently downloaded, check several anti-virus software in turn after each download, in case of no toxicity, you can use Trojan Horse scanning and removal software, such as TheCleaner and wooden mark star, to perform the scan. Finally, update the virus database of these software in time. Otherwise, the defense against new viruses and Trojans is almost zero.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.