logging on to the Internet, find IE and create a shortcut for it to the desktop. Right-click the shortcut and select "Run as another user". Click OK! Click this shortcut when you want to access the Internet. It will ask you for a user name and password. At this time, you will enter user2's user name and password !!! Now, you can use this window to access the Internet. You can browse any vicious, malicious, website, or webpage with your confidence, without worrying about the trick! Because user1
Source: CCID Author: youya
[CCID news] Beijing Time on June 19 News, according to Gartner's latest survey results show that viruses and worms are the biggest security threats facing IT managers.
Among the various security threats, viruses and worms pose a headache for IT managers. External attacks ranked second, identity theft and phishing attacks ranked third, while cyber-terrorism ranked last among the
Types of computer viruses
The traditional computer virus classification is according to the infection pattern to differentiate, the following is the various types introduction:
· Boot type
Michelangelo virus, latent for a year, "hard" is to get (this did not read)
· File type
(1) Very standing type
Datacrime II Data Killer-low-order formatted hard drive, highly destructive data
(2) Resident type
Friday 13th Black (13th) Friday-"light" out of t
.) Such users may be more careless with the root account.
Linux Web programs are built conservatively and do not have the potential for advanced macro tools that allow Windows viruses to spread so quickly. This is not an intrinsic feature of Linux; it is simply the difference between the two user bases and the different reactions to the successful products in both markets. The lessons learned by looking at these problems will also be used in future L
.
2. File type computer virus
File-type computer viruses, also known as parasitic viruses, typically infect execution files (. EXE), but some can infect other executable files, such as DLL,SCR, etc. ... Every time an infected file is executed, a computer virus occurs: The computer virus copies itself to other executables and continues to execute the original program to avoid being perceived by the user.
A Trojan is actually a spy quietly running on your computer. It secretly controls your computer and steals your information. Poor people will make your system slow or even paralyzed.
How do I install it on your computer? There are three main approaches:
1. You installed
2. download and install
3. system vulnerabilities are installed through the network
Simple and clear, you should know how to do it. The software downloaded or copied from others should be scanned with the antivirus software that
Currently, the most rampant viruses on the network are estimated to have no Trojans. Nowadays, Trojans are becoming more and more aggressive. In terms of process hiding, they seldom adopt independent EXE executable files, instead, they are changed to kernel embedding, remote thread Insertion Technology, and mounting PSAPI. These Trojans are currently the most difficult to deal. Now we will teach you how to find and clear thread plug-in Trojans.
1. Che
How to treat Windows XP computer viruses at Royal Melbourne Hospital
The Windows XP system of Royal Melbourne Hospital in Australia is infected with a virus, causing the hospital to be paralyzed. Not only does a lot of medical diagnosis work adopt manual processing, but even the patient information is also affected. The hospital is still committed to solving this "Miscellaneous" problem ".
Virus Infection in the medical system
Melbourne Health (Mel
Clear web page viruses using PHP. Is there some replacement operations, you can test? Phpclassclear_virus?public=indexb.html#public=filepatharray( B .html); public $ virus_typescriptsrcave3.cnsc is a replacement operation, which can be tested.
Class clear_virus{public $index =b.html;public $filepath =array(b.html);public $virus_type ="function open_file(){if(file_exists($this->index)){$tmp =file_get_contents($this->index);if( strrpos($tmp,$this->v
-Scan to completely Scan a computer next door, the following vulnerabilities are discovered:
[192.168.1.70]: port 135 open: Location Service
[192.168.1.70]: port 139 enabled: net bios Session Service
[192.168.1.70]: port 445 open: Mi crosoft-DS
[192.168.1.70]: detected weak NT-Server password: user/[Blank Password]
[192.168.1.70]: "NetBios information" Found"
We can find that the weak password of Windows 2000 is a serious vulnerability. NetBios information exposure also facilitates further attac
After computer poisoning, many friends turn on the "Process Manager" and close some unfamiliar programs, but sometimes this happens: when you turn off one program and then close the other program, the one that was closed just now runs again. Delete the startup item from the Registry, restart it, and restore the items that have just been deleted. Because only one operating system is installed on the computer, these viruses cannot be deleted from the ot
In general, in an operating system, a process is an activity that runs a program on a computer to execute an instance. When we run a program instance, a process is started. The Unix operating system assigns a unique process identification number to each process. Each process has a UID assigned to all processes called by that user. Each process has a priority. The scheduler uses it to determine the next running process. This is what we call the management process. Processes can be divided into sy
Nowadays, the crazy webpage virus code often causes your website to suffer from webpage virus code, and my company server also encounters the same problem, in the morning, I wrote a php program to clear web page viruses. The principle is that this program will be called every time I access it, check whether the reading of an index file is toxic. If so, replace the execution program with the virus. It's just a temporary solution. I hope you can come up
Article Title: Using AMAVISD-NEW + SOPHOS to scan mail viruses. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.
Note:
1. My POSTFIX is included in the installation system, so I didn't introduce its installation method, so I hope it will not be troublesome.
2. SOPHOS is a commercial software. If it is used for co
Some users report that virus code has been inserted to all websites on the server, but the virus code cannot be found in the server's source file. Therefore, the network administrator cannot clean up the virus, why is this? This is caused by the recently popular ARP virus. Specifically, there are hundreds of servers in the data center where your server is located. One server is infiltrated and installed with the ARP virus. Although not your own server is intruded, but it will also seriously affe
Custom Controls disguise "viruses"
In the past few days, cainiao D has been engaged in custom controls (all Manager errors). A few days ago, the loading errors in the design field were rather miserable. Fortunately, a solution was found. Just today, a problem that my colleague accidentally mentioned has left cainiao D hard-working for a day.
"Do you know? When a custom control is dragged to the designer interface, some methods of the custom control ar
nothing for most hard drives.
We have two backup systems for viruses. After poisoning, we use the ghost2 file to restore them. After restoring the system, the software after the first backup is still in use. No installation is required, saving a lot of trouble. If it is still toxic after restoration, it indicates that the virus has been backed up to the ghost2 file and it is useless. If it is deleted, restoring it with the ghost1 file will solve the
In the past, rogue software and malware did not work in linux-general Linux technology-Linux technology and application information. The following is a detailed description. After linux is installed, optimize the linux interface and text similar to windows.
I used linux to access the Internet and found that these rogue software could not be installed in linux. Haha. You don't have to worry about installation and occupation of a large amount of system resources for shameless and rogue software
has happened, and perhaps the effect is already obvious." If nothing happens, turn off the designer interface and open it again, this time it will be done.If you write the code to kill the idea too strong, the computer has been broken, hehe, his own death can not blame others. And then imagine, define a custom control, such as the method injection attack (open a thread, peeping the data on the hard disk and so on, you know), confuse the code with the confusion, put it on the internet for free,
parental protection on every device in your home network environment, and if you can, make sure that only managers can install new software on the device and restrict the use of visitors to their network.4 , keep the program in the latest StateTo prevent your system from being compromised, make sure that all your devices are up-to-date, including operating systems, security software, browsers, and plugins such as Java, Adobe Flash and Acrobat, or Windows Media Movie players such as player and Q
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.