Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the December 22, 2004 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Elves" (Win32.Troj.Casper) and "Heaven Fire" (Win32.Troj.T2yuhuo).
"Wizard" Trojan virus, the virus spread through the mail, the message content for Japanese text,
Jinshan 09.16 virus Broadcast
"Virus parasitic Player" (win32.troj.geralt.kb.190962), this is a reliance on the transmission of a Trojan horse program, it will carry out the bomb ads, download Trojan and other acts. The virus is mainly spread by bundling with popular players, such as the recently popular Qvod.
"IE Directory Intruder" (win32.troj.hrupt.xm.352256
In the anti-virus software industry in China, after being "mistaken" by Norton and Kaspersky and the "verbal War" by antivirus software vendors at home and abroad, how to judge and choose anti-virus software makes users feel at a loss.
In view of Chinese users' questions about anti-virus software, after a series of practical comparison tests, we can find several
Why the network virus with stand-alone version can not be completely eliminated? Mainly because the network virus has its unique network characteristics. At present, the network virus does not have a standard concept, but for the LAN can be transmitted in the virus, collectively known as the Network
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 03, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Marsteck" (Win32.Hack.Masteseq.ge) and "Pswmir" (Win32.Troj.PSWMir.ya).
"Marsteck" hacker tool, the virus is automatically connected to the designated site by the hacker to download the
Why the network virus with stand-alone version can not be completely eliminated? Mainly because the network virus has its unique network characteristic. At present, the network virus does not have a standard concept, but for the LAN can be transmitted in the virus, collectively known as the Network
Core tips:This article describes how anti-virus software judges a file that is toxic and how to scan and kill it, including: pattern, checksum, behavior, and software simulation. Based on different principles, these methods have different overhead and different detection ranges ....
Anti-Virus Software killing Principle
What is anti-virus software based on? Befor
Using VB to write viruses needs to consider the following points:
* Infected host
First of the infected file to determine whether the host to infect the virus, that is, to determine whether the virus principal file exists, if it does not exist, the virus will be copied to the designated location (such as: Copy the virus
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the December 23, 2004 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Yever" (WORM.YEVER.A) and "Soft Killer" (Win32.Troj.Killav.ak).
"Yever" worm, the virus spread through the mail, the virus icon is very strong deceptive, users are t
The occurrence of the virus outbreak of the disk drive
Disk drive virus first appeared last February, Jinshan poison bully anti-virus expert Li Tiejun said, At that time, the virus is only in the Windows directory to generate Lsass.exe and Smss.exe files, and modify the system time for 1980, when the
Step 5: Hazards of Viruses
The harm of viruses is as small as that of individuals and the whole world. No one who is using computers is troubled by them. For those who are lucky to be immune from virus harassment, I want to give you a warning in advance, hoping not to scare you. Advise you that it is best to prevent computer viruses from happening before they happen!
The idea of virus theory can be traced b
Situation
All the keys on the right run, and the 8-bit xxxxxx.exe and autorun. inf files appear under each disk.
Virus attacks such as viruses and Trojans are disabled on the Internet, and nod32 and other antivirus methods cannot be enabled.
Software
You cannot view hidden files. solution:
Method 1: Modify the Registry File (Save the following file in OK. reg) and run it.
Copy codeThe Code is as follows: Windows Registry Editor Version 5.00
[HKEY_LOC
Virus description
The macro virus is propagated through an Excel document. The virus consists of a hidden form named "(M1) _ (m2) _ (m3)" and a macro module. When the macro module executes, it takes data from the (M1) _ (m2) _ (M3) Form to generate a temporary file named Cab.cab C: (72606 bytes). Cab.cab contains 5 vi
"Virus specifically kill VBS module. vbs" This file you can directly execute, there will be no damage ^ ^.
By providing a template, you can write your own virus killing tools based on your analysis of the virus behavior.
Very convenient, very efficient!
As an anti-virus person should not only be able to analyze the
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 25, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Agent" (Win32.Troj.Agent.sc) and "Spelac" (Win32.spelac).
"Agent" Trojan virus, the Trojan will open the back door, Trojan growers can be left behind the virus thro
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the December 27, 2004 popular virus.
Today remind users to pay special attention to the following viruses: "Fake QQ" (WIN32.TROJ.STARTPAGE.SN) and "180Solutions" (win32.troj.180solutions).
"Counterfeit QQ" Trojan virus, the virus will itself and three pages of the link to the sys
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 19, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Wuhan Boys" (WIN32.TROJ.WHBOY2005.J) and "Ddoser" (WIN32.HACK.DDOSER.C).
"Wuhan Boy 2005" Trojan virus, the virus will be through QQ, MSN, UC, POPO2004 to friends to
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 10, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Small" (Win32.Troj.Small.ad) and "Lovey" (Win32.Troj.Lovey).
"Small" Trojan virus, the virus is a trojan download, download a variety of Trojan
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 05, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Squirrel" (WIN32.SQUIRREL.A) and "Starter" (VBS.STARTER.A).
"Squirrel" infection virus, the virus spread through the local area network, resulting in small user machi
; This program is compiled by TASM
; CIH file-type virus detection and elimination program
Gofirst MACRO
XOR CX,CX
XOR DX,DX
MOV ax,4200h
INT 21H; file pointer to top of file
Endm
Alterline MACRO
MOV DL,0DH
MOV ah,02h
INT 21H; carriage return
MOV dl,0ah
MOV ah,02h
INT 21H; line Wrap
Endm
Copyhandle MACRO
PUSH BX
MOV ah,45h
INT 21H; copy file handle
MOV Bx,ax
MOV Ah,3eh
INT 21H; turning off copying files
POP BX
Endm
Data SEGMENT PARA Public ' data '
Ex
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.