In the process of eliminating computer viruses, some computer viruses are caused by computer hardware or software faults, and some virus outbreaks are similar to hardware or software faults, such as Boot viruses. This causes a lot of trouble for users. Many users often format the hard disk when they can't find the virus by using various virus scanning software, w
Almost everyone who uses computers has ever experienced computer viruses and antivirus software. however, many people still have misunderstandings about viruses and anti-virus software. anti-virus software is not omnipotent, but it is never a waste. the purpose of this article is to allow more people to have a correct
Access this article describes the techniques for using Access's security features and good habits to control access macro viruses.
Anti-virus common skills
It is important to keep your antivirus software updated at all times. New viruses appear every day, anti-virus vendors also through the network, BBS and other carri
According to rising global anti-virus monitoring network, two viruses are worth noting today: "The gray pigeon variant ZFP (Backdoor. win32.Gpigeon. zfp) "and" Porter Backdoor Variant N (Backdoor. win32.Sdbot. n) "virus. The "grey pigeon variant ZFP" is a backdoor program that allows hackers to remotely control computer viruses, such as recording keyboards, downl
1. Establish good safety habits such as: do not open a number of unknown e-mails and attachments, do not have a few sites do not understand, do not perform the download from the Internet without anti-virus processing software, etc., these necessary habits will make your computer more secure.
2. Turn off or remove unwanted services from the system by default, many operating systems install some ancillary services, such as FTP clients, Telnet, and WEB
Many times we have used anti-virus software to find their own machines such as backdoor. rmtbomb.12, trojan.win32.sendip.15 and so on these a string of English also with digital virus name, at this time some people on the Meng, so long a string of names, how do I know what the virus ah?
In fact, as long as we know some of the virus naming rules, we can use the anti-virus software report in the virus name t
On June 16, January 23, rising global anti-virus monitoring network intercepted a new virus, Win32.Ditex, and named it "system backdoor"-a system virus carrying Backdoor programs. According to analysis by rising anti-virus experts, the virus can spread system "backdoors" through infected files, posing a great security risk.The virus browses all the storage devices connected to the system, including the loca
Email is so hard for Internet users to leave, but virus, this hateful guy, is so rampant after putting on the coat of Email, we have a bit of doubt about the cute Email: Is she still cute? Now I will tell you that we can distinguish our Email in this way.
First: software help
Select a reliable anti-virus software. To prevent mail viruses, it is very effective to scan and filter Emails during the mail rece
Today's digital products are becoming more and more popular, which will gradually attract the attention of more virus makers. Maybe they will be infected with a lot of viruses while singing. If they develop good anti-virus habits, the virus will not spread wildly.When we use an MP3 player, we often need to connect the MP3 player to a computer and then copy the file. In this way, the MP3 player is vulnerable
sneaked through iexplore.exe to do bad things. In this case, we recommend that you use anti-virus software to scan and kill the virus.
Rundll32.exe
The process name that is often impersonated by viruses is rundl132.exe1_rundl32.exe. The number of DLL files started by worker. User32.dll, LockWorkStation ". After you press enter, the system will quickly switch to the logon interface. The path of rundll32.exe
Computer viruses are widely transmitted and often concealed. Therefore, we should first improve the awareness of computer viruses. During the use of computers, we should pay attention to the following points:
1. Regular backup. Back up data in the hard drive and primary boot sectors, and often back up important data.2. Try not to use pirated or unknown software.3. Install genuine
Source:
Http://www.hacker57.cn/article.asp? Id = 252
Friends who suffer from ARP attacks and Trojan-related web page automatic downloading Trojans come to see that the trojan is so powerful as a tiger. This sentence is used by current Internet users (including old cainiao like me) the body is really more appropriate, often found that a program will automatically download viruses and Trojans, but helpless, or often encounter ARP attacks also helpless.
The Security Channel reminds you today that July 22, April 26 (this Thursday) is the day when CIH broke out. In particular, it reminds the majority of computer users to do a good job of anti-virus and immediately scan and kill viruses. Do not take CIH viruses lightly. First, do not use pirated software. Stick to genuine software, enable
All kinds of viruses have been put together today. Once you find that your computer is abnormal, it is regarded as a virus, and anti-virus software is everywhere, in a word, it seems that the "culprit" is not the same. As a result, the virus software is used one after another. Maybe the RMB is used one after another, or there is no trace of the "culprit, in fact, this is not necessarily a virus.
In the history of virus development, the emergence of viruses is regular. Generally, after the emergence of a new virus technology, the virus rapidly develops, followed by the anti-virus technology.Development will suppress its spread. When the operating system is upgraded, the virus is changed to a new method to generate a new virus technology. It can be divided:1. DOS boot phase 127; 127; in 1987, comput
version. You will be notified every time you update the mcafee.com version. The frequency is as high as Wednesday. It also allows you to choose to download the latest version immediately or later, but remember that the latest version of anti-virus software is valid. Since the number of stealth programs (stealth program) released on the Internet each month is between 300 and 500, including viruses, worms, a
single virus to completely break out in the internal network of the school. Even if the outbreak only affects one computer and two computers, in most cases, the network administrator can recover the system directly.
Therefore, in general, the virus infected by schools is mostly network-type, especially worm-type, which is very powerful in transmission. Although each public school has bought genuine anti-virus software according to the requirements of
cases, we may find that the iee.exe process still exists in the system, which involves two situations: 1. The virus impersonates the iexplore.exe process name. 2. Virus sneaked through iexplore.exe to do bad things. In this case, we recommend that you use anti-virus software to scan and kill the virus.
Rundll32.exe
The process name that is often impersonated by viruses is rundl132.exe1_rundl32.exe. The nu
9 Ways to WINDOWS8 systems from viruses:
1. Do not open e-mail messages from unfamiliar senders or e-mail attachments that are not recognized. Many viruses are attached to e-mail messages and are propagated when you open attachments. Therefore, it is best not to open any attachments unless the attachment is the desired content. Www.xitonghome.com
Use the Pop-up blocker in an Internet browser. A pop-up win
computer's security factor.
5. Quickly isolate infected computers. When your computer detects viruses or exceptions, the network should be cut off immediately to prevent the computer from being infected more, or become a source of transmission, and infect other computers again.
6. Learn about viruses so that you can discover new viruses and take appropriate me
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.