-virus manufacturers have invested a lot of energy in the intelligent detection and removal of viruses. However, the core of virus detection and removal still fails to be intelligent, and the core is still relying on virus signatures and sample libraries. From one perspective, this may be the attitude of being responsible to users. This article will try to make full use of what kingju knows to discuss how to intelligently prevent
directly.
Fourth, let the mail monitoring function work
After buying anti-virus software, many users do not enable the real-time monitoring firewall for some reasons. Because anti-virus software occupies some system resources during operation, this is inevitable, it depends on how the user adjusts and uses it. If you do not enable the real-time monitoring function, the mail virus and other viruses will be able to bypass the computer's loopholes. comp
the hard drive, so that the hidden virus escaped detection.
Detection of viruses in the hard drive can be divided into detecting boot zone viruses and detecting file-type viruses. The principles of the two Tests are the same, but the detection method is different because of the way the virus is stored. It is mainly based on the following four methods: Comparing
When webpage viruses are getting worse and worse, such as malicious code on webpages, webpage Trojans, worms, bad bombs, happy times, extreme girls, and other viruses, engineers have to focus more on Webpage viruses when spreading and damaging computers through countless fixed or temporary malicious websites. How can such a short virus statement intrude into the
language. Simply put, it has programming functions. Therefore, many people with ulterior motives use this function to create a macro virus. Although the damage of the macro virus is not great, it is indeed a burden for people who rely on the pen to make a living. For this reason, I hereby tell you some ways to detect and prevent the macro virus.
I. macro virus detection
Macro virus detection is actually very simple. You only need to click [tools] → [macros] → [macros] in the menu bar on the Wor
virus is very rapid. Like Code Red, it resides only in the memory of the attacked server.
10.MyDoom (2004)
Another worm Mydoom (also known as Novarg) left a backdoor in the user's operating system in February 2004. The virus uses a combination of viruses and spam tactics that can quickly spread through the corporate e-mail system, causing a surge in the number of messages and blocking the network. Like other vi
"Software Restriction Policy", "Security Level" and "other rules" are added. Right-click "other rules, select "New Path rule" in the shortcut menu, as shown in 1.
3. in the "New Path rule" window, enter "C: Windowsavserve.exe" in the "path", or click "Browse" to specify the file, select "Not Allowed" in the "Security Level" drop-down list. If necessary, enter some comments about the rule in the "Description" area, and click "OK", as shown in figure
; "Folder Options ", you can find the hidden Trojan program. For Windows 9x users, you can easily find any third-party process management tool, such as the process management component of "Windows optimization master.
Continued development: dll Trojans using thread Injection Technology
Although Trojan viruses and rogue software using "thread injection" have blossomed everywhere, however, those who have gone through the chaos era will not forget the
The preparation of the virus is a kind of advanced technology, the real virus generally have: infectious, hidden (also known as latent), destructive. Now there are many kinds of viruses, such as the usual infection of executable files of viruses, macro viruses and so on. But the original, most destructive viruses are
VBScript (JScript) program that automatically performs the preceding operations to complete quick configuration on all clients (others are the intention of Microsoft to develop WSH ).
4. Prevent "spread" after a virus attack"
Almost all mail viruses are implemented by sending a large number of infected emails. Therefore, it is critical to prevent virus scripts from obtaining the "Contact" list (Communicati
majority of viruses "parasitic" the main goal.
The so-called executable file, is what we call "program", "Software", usually this kind of software is also a (or several) files constitute. As has been said before, software is loaded into memory to be executed and used by the user, so the author of the software uses development tools to compile "original program" into "executable file" and then ship it to the user so that the user can execute it.
Pre
-type worm. On the one hand, its outbreak will completely paralyze the whole school network, and on the other hand, it is very difficult to scan and kill such viruses. Vulnerability Viruses need to install system patches or software updates for each computer in the school. Worms need to detect each computer in the school to find the root cause of the virus, in reality, multiple computers often become source
1. frequent crashes: viruses open many files or occupy a large amount of memory; unstable (such as poor memory quality and poor hardware overclocking performance ); software running with large capacity occupies a large amount of memory and disk space. Some testing software (with many bugs) is used, and hard disk space is insufficient; when running software on the network, it may be because the network speed is too slow, the program running is too larg
Often hear some "comparative professional" IT staff, said, "Users installed anti-virus software also forget, but a little anti-virus concept is not, thought this will not be poisoned?"If you want to not poison, more importantly, to learn more about how the virus works, as well as the preservation of antivirus software. Here, hope for the general Enterprise computer users, can provide some adequate "anti-virus concept." You may not be able to "guarantee" anything, but at least you can have a summ
then enter the command line that allows the program to run in the corresponding text box, click OK to add it to the list of the displayed content dialog box.
After the configuration is complete, all programs except the programs specified in the list in WinXP will be banned from running, let alone viruses trying to add themselves to the auto-running ranks, and ca
still waiting for us. It is the most terrible thing to know that the enemy is the enemy of the stubborn fight. Where is the last position of the virus? It is undoubtedly the legendary registry. Because the system service information is stored in the registry, I will classify the service content in this section. The first thing you should do is to carefully check your service list, carefully check every service that is not described, and check whether
, other virus processes will immediately create the terminated process.Solution: scan and kill in security mode.
2) use the virus code injected into the system process as mentioned above to protect the virus process.Solution: Same as 3.
3) the virus is started as a system service, so we cannot terminate it through the task manager.
Solution: stop the virus service first, and then completely scan and kill the virus.If you cannot see or stop the virus service, you need to handle it in securi
Reprinted from: http://zhigang0909.blog.163.com/blog/static/582896532007921142520/
Manual elimination of new viruses (1)The most terrible thing about surfing the internet is when new viruses come out. Although we have installed various powerful anti-virus software on our computers, we also configured regular and automatic updates to the virus database, however, the virus is always updated before the vi
waiting for us. It is the most terrible thing to know that the enemy is the enemy of the stubborn fight. Where is the last position of the virus? It is undoubtedly the legendary registry. Because the system service information is stored in the registry, I will classify the service content in this section. The first thing you should do is to carefully check your service list, carefully check every service that is not described, and check whether it is
This article introduces the scientific, systematic, and rigorous classification methods of computer viruses.
As we all know, viruses are actually human-prepared malignant programs. Computer viruses have scientific, systematic, and rigorous classification methods. We will introduce them to you:
Based on the damage ability of the virus, it can be divided into the f
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.