Discover what is pup computer virus, include the articles, news, trends, analysis and practical advice about what is pup computer virus on alibabacloud.com
Computer virus is a kind of artificial or non-human circumstances, in the user without knowledge or approval, can reproduce or carry out the PC program, the virus can not be deleted how to do?
Computer virus running, resulting in
Chinese name: Roma
Virus type: Trojan Horse
Threat Level: ★
Impact System: Win 9x/me,win 2000/nt,win Xp,win 2003
Virus behavior:
The virus will cause a large number of security software to fail to run, will download a large number of Trojan horse to the user's computer to steal user account information.
Net-worm.win32.zorin.a This is a worm that infects executable files. The virus will terminate the Jinshan poison PA, Jinshan Network Dart, Skynet firewall and other security software, greatly reducing the security performance of the user's machine; The virus releases a worm from a DLL file and injects the DLL file into the EXPLORER.EXE process; The
The system is suspended due to the BUG of Trojan Horse stealing. the user's desktop is blank and icons and desktops cannot be displayed. This is a trojan virus designed to steal "Magic domain", "perfect world", and "haofang game platform". The virus
Iloveyou virus is a mainly mail-borne worm, the virus through the false cloak of iloveyou, deceive the relevant user to open their memory of the VBS attachment to infect the virus. After the infection, the virus will spread through the Outlook Address Book, and in this machi
Lpk.dll virus is one of the most popular viruses, and the normal system itself will have lpk.dll files, which is enough to explain the danger of such viruses. The Lpk.dll files of the system itself are located in the C:windowssystem32 and C:windowssystem32dllcache directories. The following small series to take you to understand
What is a worm.generic virus?
worm.generic.275401 from the name point of view, it should be a worm virus. Worm virus can be a big harm, such as our familiar panda incense is a worm, infected with this type of
The "Magic Wave" virus automatically searches the network for a system-compromised computer and directs these computers to download and execute the virus files directly. As long as these users ' computers do not have patches installed and are connected to the Internet, they may be infected. The computer that infects th
What is alg file?
The Alg.exe process file is a program from Microsoft's Windows operating system that handles Microsoft Windows network Connection Sharing and network connection firewalls. Application Gateway Service, which provides support for Third-party protocol plug-ins for Internet Connection Sharing and Windows Firewall. (Tip: This program
The infected virus runs and joins itself in other programs or dynamic library files (one of the DLLs) to perform the function of synchronizing with the infected program, thereby destroying and propagating the infected computer.
Characteristics
Infection virus because of its own characteristics, need to attach to other host programs to run, and in or
Explorer.exe items, if any, delete them.
After the completion of the above, restart the computer, if the desktop has not yet been loaded, you need to open Task Manager again → New task, enter Explorer.exe, click on the desktop, the icon sent to the desktop.
If the desktop has not yet been displayed, you can run the antivirus software with Task Manager to see if the log will isolate the Explorer.exe file, or restore i
Nat.exe is a program called "New Ghost virus" that can be used to achieve the illegal purpose of a virus, for example:
1, the operation can control some of the advertising program to achieve traffic profit; that is, the pop-up ad window that the user mentions
2, control the
"Death Quiz" (Sola) the Otaku virus will create (%sola%runtime.txt) files and record the number of executions at the first time. When the cumulative number of executions reached 50, the virus will deadlock the computer, delete system-critical files, causing users to restart the computer, you will not be able to re-ente
This Valentine's Day virus is Vbs/san by the author of the virus, because the virus is able to set IE's starting page as a Spanish site, which is much like Vbs/san.
The virus hides its
Many friends are not familiar with the svchost process, sometimes in the task Manager once see a number of this process (the following figure has 6), they think their computer in the virus or trojan, in fact, not so! Under normal circumstances, You can have multiple Svchost.exe processes running at the same time in Windows, such as Windows 2000 with at least 2 svchost processes, more than 4 in Windows XP, a
What is the reason for the computer card? Computer card how to deal with? The reason why computers are getting stuck here is summed up as the following main points:
One: computer
About _desktop.ini This file is also from the last time my computer was raped by the virus. After the last Viking virus, found in some directories have _ Desktop.ini file, at first and Desktop.ini confused, thought is Desktop.ini, today to upload things to the server when on
situation is the opposite, because this program is the system Idle process. What it means is that the CPU is 96% free, not 96%, and the more free it is, the lower the CPU usage of your comput
The 2003 Worm King "(worm.netkiller2003), whose harm far outweighs the once rampant red code virus.Network bandwidth is heavily occupied after the worm is infected, resulting in network paralysis, which exploits the buffer overflow vulnerability of SQL SERVER 2000, which resolves port 1434, to attack its network. As the "2003 Worm King" has a strong ability to spread, now in Asia, the Americas, Australia an
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.