Why do linux systems have fewer viruses?
By fire555fire
Linux is an operating system with strong self-development. For example, although it is the same as the five cores of the red flag, the preference and needs of each user are different, therefore, different user management methods, permission settings, software packages, software compilation commands, and software running modes may be formed under it, the environment has almost no chance to have tw
A few days ago, rising released a report: a total of 83119 Trojan viruses were intercepted in the first half of this year, accounting for 62% of the total number of viruses during the same period. Viruses with Trojan Behavior Characteristics, it accounts for more than 80% of the total current viruses. Trojan
First, the question of the proposed
Most of the Trojan and part of the virus is through the registry from the start or file association or through the system services to achieve since the start, see the "Windows from the start", that there is a way to prevent Trojans or viruses to modify registry entries and increase service?
Ii. solution to the problem
The Windows2000/xp/2003 registry can set permissions, but we use less. Set permissions for the foll
Have experience in Internet cafes or computer room management friends must know, if the virus in the machine is a very annoying thing, now most of the virus has a strong ability to replicate, can be spread through the LAN, a large number of resources to consume systems and other characteristics, a local area network as long as there is a computer virus, if not timely anti-virus and isolation words , other machines will soon become infected with the virus, how to prevent the virus, and rapid anti
How to quickly discover Windows viruses without external tools
After several years of emergency response work, I think it is very useful to summarize a "methodology" to quickly determine whether a computer is infected with Trojans and viruses. This is obviously not that simple, but I found that the infection exists in almost all non-Complex attacks. If you perform the following detection, you can find th
window, click "enabled", select "All Drives" in the list below, and click "OK ".
2. manually set the USB flash drive for virus immunity
Click "start"> "run"> enter "cmd"> enter "I:" in the window :", press enter (here "I" is the disk drive letter you want to immune) and enter "md autorun. inf ", press enter, and enter" cd autorun. inf ", Press enter, and enter" md aa .. \ "\ here cannot be omitted!
Now, you can open your drive letter with an autor
modify the registry:(1) Use the reg command to add and modify the registry:To use the reg command, enter REG /? And use Windows Command help to viewMain format:Reg operation [parameter list]
Operation [query | add | Delete | copy |Save | load | unload | restore |Compare | export | import]For example, add the svchost key value to HKLM \ Software \ Microsoft \ Windows \ CurrentVersion \ Run. The key value is C: \ WINDOWS \ SYSTEM \ svchost.exe.
Reg Add
After the operating system is re-installed, some necessary supplementary measures are critical because of problems such as security settings and delayed patch installation, "North Network" provides 10 suggestions in the article "the new system is the most prone to poisoning and ten major events will be taken after the system is reinstalled", which is worth your reference.
1st important events: Do not rush to access the network
After windows is installed, do not immediately connect the ser
Linux users may have heard of or even encountered some Linux viruses. The principles and symptoms of these Linux viruses are different, so the preventive methods are different. To better prevent Linux viruses, we first classify known Linux viruses.
From the current Linux virus, we can summarize it into the following vi
I think there may be problems in the article. I hope you can give me more advice. I will update the article before the Spring Festival and publish the full version. There will be some processes, services, and other things that need experience to be explained. They are all for beginners and persons who want to learn. I hope these experiences can help you, you can communicate with me in the forum or send emails. Thank you.To answer this question, no matter what the virus is, paste the log to let e
No virus or Trojan exists in the system and cannot be completely isolated from the process. Even if the hidden technology is used, it can still find clues from the process. Therefore, viewing active processes in the system is the most direct method for detecting viruses and Trojans. However, there are so many processes running simultaneously in the system, which are normal system processes and Trojan processes, what role does a system process that is
With the rapid popularization of smartphones such as iPhone and Android and their increasingly powerful functions, the topic about mobile phone viruses is also getting hotter and hotter, and various anti-virus software for mobile phones are emerging one after another. But Will a small mobile phone be poisoned like a computer?
What kind of mobile phone may be poisoned?
Before verifying the rumors about "mobile phone
the circle on the left to indicate that the operation has been activated. Click "close" to close the dialog box; return to the "new IP Security Policy attributes" dialog box, tick the left side of the "new IP Filter list", and click "OK" to close the dialog box. In the "Local Security Policy" window, right-click the newly added IP Security Policy and select "Assign ".
After the restart, the above network ports on the computer are closed, and
ports and create corresponding filters for them.
Repeat the preceding steps to add a blocking policy for TCP ports 1025, 2745, 3127, 6129, and 3389, create a filter for the preceding port, and click OK.
Step 4: In the "new rule attributes" dialog box, select "new IP Filter list" and click a dot in the circle on the left to indicate that the IP address has been activated, click the filter action tab. On the "Filter Operations" tab, remove the hooks on
the appropriate filters for them.
Repeat the above steps to add TCP 1025, 2745, 3127, 6129, 3389 port shielding policy, set up the above port filter, and finally click the "OK" button.
Step fourth, in the New Rule Properties dialog box, select New IP filter list and click on the circle to the left to add a point indicating that it has been activated, and then click the Filter Action tab. In the Filter Actions tab, remove the hook to the left of the
Any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. But the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often by virus Trojan fake system proces
Access this article describes the techniques for using Access's security features and good habits to control access macro viruses.
Anti-virus common skills
It is important to keep your antivirus software updated at all times. New viruses appear every day, anti-virus vendors also through the network, BBS and other carriers to constantly introduce the latest virus database and software, so a focus on security
Any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. But the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often by virus Trojan fake system proces
When surfing the internet, you do not need to open a website. When you are unaware of the website, viruses may have been quietly installed on your computer. These viruses will bring up pop-up windows for IE and modify the IE homepage, serious impacts on system performance will also be very large. It is easier to clear the IE virus.What is webpage virus?Webpage viruses
In the history of virus development, the emergence of viruses is regular. Generally, after the emergence of a new virus technology, the virus rapidly develops, followed by the anti-virus technology.Development will suppress its spread. When the operating system is upgraded, the virus is changed to a new method to generate a new virus technology. It can be divided:1. DOS boot phase 127; 127; in 1987, computer viru
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.