Jiangmin anti-virus pure DoS (floppy disk + CD + U disk + NTFS General) v20050805 free version
(The virus database version 9.00.607 is updated to 2005.07.29)
Usage:
KV. rar decompress the package and run kV. bat. The graphic selection menu is displayed. Use the "Rotate" and "Rotate" keys on the keyboard to switch between them.
1. Menu 1 hard disk anti-virus: Afte
To carry on the infection, must leave the trace. Biomedical viruses are the same, so are computer viruses. Detection of computer viruses, it is necessary to go to the site of the virus to check, find abnormal situation, and then identify "in", confirm the existence of computer viruses. The computer virus is stored in the hard disk while it is active and resides in memory, so the detection of computer
Recently, a colleague's notebook suffered from this virus. This semester, when I gave VBscript to computer students, I analyzed it by the way.
First, the virus samples are extracted from the computer infected with the virus. The virus samples are temporarily discovered and are not specially prepared, and are compressed
Purpleendurer NOTE: See the following in Sina:
Question 3: Has rising discovered a virus in the lab?(See: http://forum.tech.sina.com.cn/cgi-bin/viewone.cgi? Gid = 23 FID = 290 Itemid = 27156)Author: jinleiviva published on: 15:11:07
I think it is ridiculous that I wanted to refute the registration of Sina. Unfortunately, Sina cannot register the website. I would like to refute this point.
Such a superficial article has been refined, and it is actual
Diagnostic principle of comparative method:The comparison method is used to compare the original or normal file with the file being detected.Including length, content, memory, interrupt and other comparison methods.Diagnostic principle of checksum method:The contents of the normal file are computed for verification and saved in the checksum written to the file or written to another file. During the use of the file, the regular or each use of the file before, check the file is now the contents of
Many times we have used anti-virus software to find their own machines such as backdoor. rmtbomb.12, trojan.win32.sendip.15 and so on these a string of English also with digital virus name, at this time some people on the Meng, so long a string of names, how do I know what the virus ah?
In fact, as long as we know some of the
Computer, improve our work efficiency, enrich our life, but at the same time, computer virus also brought us endless trouble. Once the computer infected with the virus, if it is general, simply by virtue of the market anti-virus software can be 32 under the "smooth", but if you encounter those difficult to deal with the virus
Text/image: erratic
Recently, a virus named "avterminator" has been raging on the Internet. According to statistics, about 0.1 million of Chinese computer users have been attacked by the virus. "AV" in "avterminator" is the abbreviation of Antivirus, which means anti-virus software. Therefore, from the virus name, we c
I. History of the Linux virusThe STAOG, which appeared in 1996, was the first virus under the Linux system, and it originated in an Australian organization called Vlad. Staog virus is written in assembly language, specifically infected with the binary files, and in three ways to try to get root permissions. Staog virus does not have any material damage to the sys
Many times, you have used anti-virus software to find out your own machine, such as Backdoor. rmtBomb.12, Trojan. win32.SendIP. 15. Wait for a string of virus names with numbers in English, and some people will be disconnected. How can I know what the virus is like?In fact, as long as we master the naming rules of some viruses, we can determine some public charac
1. Computer Virus Definition and feature ● definition: compilation or insertion in computer programs damages computer functions or destroys data, affects computer use, and can
Self-replicationA group of computer commands or program code. ● Features: (1) parasitic. Legitimate programs infected with viruses are called
Virus Vector, Also known
Virus Host Program. (2
With the U disk, mobile hard disk, memory card and other mobile storage devices, USB disk virus also flooded up. U disk virus as its name implies is transmitted through U disk virus. Since the discovery of U disk Autorun.inf loophole, the number of U disk virus is increasing day by day.
1. USB Disk
Good anti-virus software is important in the excellent engine. The larger the virus database, the lower the anti-virus speed. Because the virus database antivirus process, the engine delivers the judgment capability to the virus database and compares and judges the
Recently a colleague of the laptop suffered from the virus, just this semester in the computer professional students on VBScript and then by the way analysis.
First from the virus-infected computer to extract the virus samples, because it is temporarily found, and there is no special preparation, the use of WinRAR compressed after saving.
On the experimental mach
One, beware the Linux virus
At the beginning of Linux, because of its original excellent design, seems to have innate virus immunity, so many people believe that there will be no virus for Linux to appear, but Linux is finally no exception. In the autumn of 1996, an Australian organization called Vlad in assembly language wrote the STAOG, supposedly the first
The idea of a Hyper script virus
Farewell to the past love of the limelight, love the era of bragging, learn some real skills is the hard truth. Study hard and make progress every day. Here's the idea for a hyper-scripting virus.
Scripting viruses are very easy to make, for a person who is ignorant of programming, as long as the Windows system and the registry have enough knowledge, on the network to downlo
In the anti-virus software industry in China, after being "mistaken" by Norton and Kaspersky and the "verbal War" by antivirus software vendors at home and abroad, how to judge and choose anti-virus software makes users feel at a loss.
In view of Chinese users' questions about anti-virus software, after a series of practical comparison tests, we can find several
>
Excerpt from: ClamAV virus scanner for Http://www.shangshuwu.cn/index.php/Linux security system
ClamAV is a typical anti-virus software with extensive and GPL-license open source code that supports a wide range of platforms, such as Windows, Linux, UNIX, and other applications, such as mail clients and servers, HTTP virus scanning agents, and so on. ClamAV s
Core tips:This article describes how anti-virus software judges a file that is toxic and how to scan and kill it, including: pattern, checksum, behavior, and software simulation. Based on different principles, these methods have different overhead and different detection ranges ....
Anti-Virus Software killing Principle
What is anti-virus software based on? Befor
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.