Clamav AntiVirus software source code analysis notes [8]
Hedgehog @ http://blog.csdn.net/littlehedgehog
[Command]
The last time we talked about the main loop (accept_th), this is an endless loop, because Clamd is stuck and waiting for a client to send a request without any special circumstances, then we arrange thread dispatch, and then our attention is focused on thread operations. Here the command is our key research object.
The command functi
Stick the following strings to the notebook, and then save them as a text example. If Norton and other anti-virus components are immediately controlled, will be immediately transferred out and separated, or deleted, this section of the generation can be used to determine whether the monitoring is normal immediately.
X5o! P % @ AP [4 \ pzx54 (P ^) 7cc) 7 }$ EICAR-STANDARD-ANTIVIRUS-TEST-FILE! $ H + H *
This generation segment is not a virus. This gen
ClamAVAntiVirus introduced in Wiki is not very powerful. Here I will introduce you to a free anti-virus software avast, and a free anti-virus software antivir is also famous, but my mailbox failed to receive the registration key. Well, let's get down to the truth and share my notes below. Step 1: download and install. Code: wget-chttp: // files.avast.com/files/linux/avast4workstation_1.0.6
ClamAV AntiVirus introduced in Wiki is not very powerful. Here
Although there are not many Linux viruses, there are still some. Why don't we install anti-virus software for it? There is always better than none. Let's take a look at my operation process below. The first installation program: 1. Install AVGAntivirus open the browser and enter "ghost"
Although there are not many Linux viruses, there are still some. Why don't we install anti-virus software for it? There is always better than none. Let's take a look at my operation process below.
The first ins
Personal free version of the small red umbrella antivirus effect:
Free small red umbrella anti-virus ability is strong, killing fierce, but monitoring has a lot of deficiencies, including the protection of their own process, it is easy to terminate the virus, even if the fee version, monitoring system is not satisfactory.
Little Red umbrella is killing, not defense, recommended to use Comodo firewall, or PCTools firewall (the latter set simple, the
In the 360 antivirus software 6.0 preemptive version, without the software operating interface has changed, even some of the functional settings are different from the traditional operation, many users in the use of 360 anti-virus software, will have encountered the anti-virus software false positives, want to avoid anti-virus software on a file caused by manslaughter, we need to set it as a white list, but many users Do not know 360 anti-virus softwa
Today, small series will recommend a computer with the antivirus software: McAfee, I believe most people are using some of the mainstream of domestic anti-virus software, and the computer itself with the software is very unfamiliar to everyone. Below, follow the footsteps of small, together to understand today's anti-virus software McAfee's use of tutorials, I hope you will like!
Mcafee
1, directly in the Desktop task bar, click "Show Hi
necessarily digital certificate. Digital certificates are purchased, and digital certificates used in the example are purchased from this antivirus company (no way). Here is just a simple reminder to everyone that it is not necessarily safe to detect the file it is a virus. Virus information is detected because the file is not added to the whitelist of the security software company.
The rate of false positives has increased dramatically, which is a
First download Kaspersky 6 portable version, unzip, put inside the AVP6 and Kav6 (USB). EXE copy to u disk root directory.
Then create a new text document in the root directory of the U disk and write the following code:
[Autorun]
SHELLEXECUTE=KAV6 (USB). Exe
Icon=avp6avp.exe
(Note: Shellexecute= behind is to kill the soft path, icon= is the icon path can be modified according to their actual path) and then save, the document name changed to Autorun.inf (extension also want to change), and
1, open 360 anti-virus software, in the main interface of the lower left there will be the number of isolated threats, we click "View Quarantine" into 360 antivirus quarantine area.
2, to add, recently some students said that the above steps can still not find the Blue isolation hint shown above, in fact, is hidden, need to point the mouse to this area will pop-up prompts.
3, in the quarantine content to find the file you need to recov
, big talk, legends, and so on, the most popular games all have, the other is the advertising plug-in, regular window, 6, every 1 hours pop-up. The rest is stolen QQ, steal Q coins, there are some hooks, such as keyboard input records, bank plug-in monitoring, and so I was surprised. According to the records found in this page loaded a section of code, and then traced down, found that the acquisition of traffic code, which QQ number I do not say, in the 51yes there are ads. I used to know it was
If you are connected to the Internet via a router, is it safe to not install anti-virus software? Should you install antivirus software?
Even if you use a router to access the Internet, you must also install anti-virus software. The router has the function of address translation and opening and closing TCP/IP communication ports. While these features prevent some attacks from the internet, such as virus propagation, there are still attacks that can n
Step one: Get in and out.
Enter DOS: There are two ways: 1. Click "Start", "Turn off System", select "reboot system and switch to MS-DOS mode"2. Start the computer when holding down the CTRL key, and so select the interface, press the keyboard up and down direction keys, select command Prompt only, enter. Description: If you are using Win2000 and Win XP, you must first enter the Win98.
The best way is when the system clean, make a DOS boot disk, use it to start the system, you can guarantee th
At present, many popular network virus once started, will automatically in the computer system registry Startup items left behind the repair options, pending the system reboot after the virus can be restored to the state before the change. In order to "deny" network virus restart, we can start with some details to manually remove the virus legacy options in the registry to ensure that the computer system is no longer vulnerable to virus attacks.
Block startup by Web page form
Many computer syste
analyzing the process can help us manually remove viruses or trojans when anti-virus software does not work.Look at the processHow do I know what processes are currently in the system? In Windows 98/Me/2000/XP/2003, press Ctrl + Alt + Delete to view the process directly, or open the "process" option of "Windows Task Manager" to view the process. Generally, the system paths include winlogon.exe, services.ex
360 antivirus scan to the virus, will first try to clear the file infected with the virus, if you cannot clear, you will be prompted to delete the infected file. Trojans and spyware are deleted directly because they are not in the form of infecting other files, but as malicious software. during processing, some infected files cannot be processed due to different circumstances, see the following instructions for handling these files in other ways:
Today, a beautiful mm handed me a file and told me it was a recent photo. Out of trust in beautiful mm, I received and opened the file. Unfortunately, this happened, I am poisoned. The mouse is not obedient, and the virus files are frantically sent to online MSN friends. Some friends are also infected with this virus.
Then I checked the virus information on the Internet and thought it was similar to the MSN "Sexy album" virus, but the virus used Chinese when sending files, I used pinyin to sea
, expand "HKEY_CURRENT_USER Software Microsoft Windows CurrentVersionExplorerMountPoints2, right click on the MountPoints2 key, select the permissions, the Administrators group and the system group Full control is set to reject.
Description: Prevents MountPoints2 writes from adding new right-click menu items after Windows reads Autorun.inf, preventing virus menu items from appearing so that they cannot act
Internet. In addition, after the system is started, the system will be stuck there, and the right-click or win key will not work. After the system enters the system desktop, the system will be stuck.
Happy to wait for avast7, hope it can improve, unfortunately, you know. After avast7 is installed, the phenomenon is basically the same as that of avast6. In addition, I found that this phenomenon exists in both Windows 7 and XP operating systems.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.