General clearing technology for computer virusesHttp://www.williamlong.info/archives/456.html
This is the second article I wrote in a magazine 10 years ago. Published in the third phase of the 1997 microcomputer world.
At that time, I was very interested in computer viruses. When I first went to college in year 92, I didn't actually have any idea about computer viruses. I just thought it was mysterious and
Time (Vbs.happytime), 14th (JS.FORTNIGHT.C.S).
5, Macro virus
In fact, the macro virus is also a script virus, because of its particularity, so here alone into a class. Macro virus prefix is: Macro, the second prefix is: Word, WORD97,
Excel, Excel97 (and perhaps other) one of them. Viruses that only infect WORD97 and previous versions of Word documents use WORD97 as the second prefix, in the form of: macro.word97
A virus that infects only WORD97
All kinds of viruses have been put together today. Once you find that your computer is abnormal, it is regarded as a virus, and anti-virus software is everywhere, in a word, it seems that we cannot find the "culprit". As a result, the virus software has been used one after another. Maybe the RMB has been used one after another, or no trace of "culprit" has been found, in fact, this is not necessarily a virus.
Such examples are not uncommon, especi
Note: Applicable to Windows and later Systems
In the Internet era, viruses are everywhere. In the case of endless and changing virus attacks, it is basically inevitable. In this case, how can we solve the problem? (of course, it must be handled. Otherwise, the computer cannot work for you )? Format the system and reinstall Windows, or ask for help ....... Because of my career, I had to fight against such annoying things and gradually accumulated some
A variety of viruses today can be regarded as a blossoming, make a panic, once found that their computer is a bit abnormal to identify the virus in the mischief, everywhere looking for anti-virus software, a no, and then one, in short, it seems not to find "culprit" just like, the result of virus software is used one after another Perhaps for this the renminbi is used one after another, or not see the "culprit" traces, in fact this is not necessarily
1. frequent crashes: viruses open many files or occupy a large amount of memory; unstable (such as poor memory quality and poor hardware overclocking performance ); software running with large capacity occupies a large amount of memory and disk space. Some testing software (with many bugs) is used, and hard disk space is insufficient; when running software on the network, it may be because the network speed is too slow, the program running is too larg
Although the network virus is amazing, if you have mastered the following techniques, you can keep your computer away from the virus.
Regular backup
Are you hesitant to purchase a backup system, such as a zip drive or a CD recorder, for a few hundred dollars? Don't hesitate. The value of your data is far more than that. Every time you log on to the Internet, you put data in danger.
Install anti-virus software
There are more than 20 anti-virus software packages worldwide. In the United St
Virus writing is a kind of advanced technology. Real viruses are generally contagious, hidden (also known as latent), and destructive. There are also many types of viruses, such as viruses that infect executable files and macro viruses. However, the most destructive virus is the executable file virus (such as the CIH v
[News collection on the IT168 Forum] There are many ways to detect viruses. Today we will teach you four tips!
Search Method
This method scans the specific strings contained in each virus. If a specific byte string is found in the detected object, the virus represented by the byte string is found. Foreign countries refer to this virus scanning software working by search method as "virus ". This virus scanning software consists of two parts: a virus co
Viruses must be infected, leaving traces. The same is true for biomedical viruses. To detect computer viruses, you need to go to the virus parasitic site to check for abnormal conditions, and then identify "health" to confirm the existence of computer viruses. Computer viruses
Let's talk about the reason for more windows viruses-general Linux technology-Linux technology and application information. The following is a detailed description. Linux is so few. I am a newbie. I 'd better talk about the principle.
WINDOWS is a standard factory production with a uniform combat mode. LINUX is a typical guerrilla tactic. If WINDOWS is open-source, there will be a variety of tricks. Of course, it does not mean that there is no viru
When ravmone.exe "...... The mysterious ghost in the root directory, the killer of system security, is called the "USB flash drive virus ". Countless Windows users are focusing on them. This article is a summary of your research on the USB flash drive virus and lessons learned from the fight against the USB flash drive virus.
All systems after Windows 95 have an "Auto Run" function. Read the Autorun. inf file to get the custom icons of the volume in Explorer, modify the context menu of the volum
This article introduces the scientific, systematic, and rigorous classification methods of computer viruses.
As we all know, viruses are actually human-prepared malignant programs. Computer viruses have scientific, systematic, and rigorous classification methods. We will introduce them to you:
Based on the damage ability of the virus, it can be divided into the f
. TheseVirusWindows can be infected.Operating System*. EXE and *. DLL files, and spread through these files, such as the famous CIHVirusIt belongs to the system.Virus.
4. MacroVirus
MacroVirusOr a script.VirusBecause of its particularity, it is considered as a class. MacroVirusThe prefix is macro. The second prefix is word, word97, Excel, and excel97. Select the second prefix Based on the infected document type. This classVirusIs infected with doc
In today's network society, computer viruses, Trojans, and rogue software pose a great threat to the security and stability of computer systems. How to effectively detect and remove viruses, Trojans, and rogue software from our computers has always been an important topic in the anti-virus field.The general methods of Virus Detection and antivirus are dependent on professional virus detection and removal so
Why cannot I completely clear Network viruses with a single-host version? This is mainly because the network virus has its unique network characteristics. Currently, there is no standard concept for network viruses, but for viruses that can be transmitted within the LAN, they are collectively referred to as network viruses
Content directory:1, C + + each big well-known library introduction--c++ standard library2. Introduction of the famous library of C + +--quasi-standard library boost3, C + + each big well-known library introduction--gui4. Introduction of the famous library of C + +--network communication5, C + + each big well-known library introduction--xml6. Introduction of the famous
Reprint Source: http://www.acejoy.com/ace/thread-3777-1-1.html1, C + + each big well-known library introduction--c++ standard library2. Introduction of the famous library of C + +--quasi-standard library boost3, C + + each big well-known library introduction--gui4. Introduction of the famous library of C + +--network communication5, C + + each big well-known library introduction--xml6. Introduction of the
Post transferred from the original Forum jakee:
Recently, many netizens have reported that their machines contain a trojan virus called the gray pigeon, which is very stubborn and has different names on different soft targets, such as Gpigeon, Huigezi, and Feutel, it is very troublesome to clear it in the computer, especially the 2005 that it just developed. By Intercepting windows System APIs, program file hiding, process hiding, and service hiding are realized, generally, no virus files can be
items. Windows XP run Msconfig also play the same role. With the accumulation of experience, you can easily judge the start of a virus.
4, in the browser to determine the Internet. A burst of Gaobot virus, can be on yahoo.com,sony.com and other sites, but can not visit such as www.symantec.com,www.ca.com such a well-known security manufacturer's website, installed symantecNorton2004 anti-virus software can not upgrade the Internet.
5, unhide the properties, view the System folder Winnt (Windo
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.