Analysis on various computer virus response methods

Source: Internet
Author: User

In the eyes of common users, viruses are mysterious and scary. If "Trojan" is added, it is like a myth in the computer world. Unfortunately, this myth is not beautiful ...... However, viruses and Trojans are not so "God", but only a small piece of code. For example, if PC is the human body, computer viruses are bio-viruses, as long as the "medicine" is symptomatic, the "medicine" is accurate to the disease. In the eyes of users, there seems to be only viruses. In fact, we often see (webpage) malicious code, advertisement spyware, and hacker programs. Let's take a look at them one by one.

Virus

This is the first BOSS. This is also the most common method, but in fact, the Division Methods of virus security are also divided into DOS, WINDOWS, boot virus, macro virus, etc. We will not discuss the virus here, so I am not here. Once you encounter a virus, you will not hesitate to use anti-virus software. But sometimes I will find it difficult to use.

1. You are the first infected user, and the anti-virus software is being updated.

At this time, the user will find some abnormal conditions in use, but the anti-virus software does not reflect it. At this time, it is the most difficult, because the user does not know the method to destroy the virus and the countermeasures. At this time, most users will think that their PC has something wrong and constantly "test" to solve it. In fact, this is very wrong!

Solution

Unless you have to, you should immediately shut down your computer. Immediately contact the manufacturer of your own security software to describe the symptoms and wait for the response from the relevant personnel. (In general, major manufacturers will upgrade within 24 hours, while dangerous viruses will be upgraded within several hours !)

2. viruses cannot be detected and killed in WINDOWS

This is because of virus infection and the files being used by the system. At this time, users will naturally not be able to use them in WINDOWS.

Solution

Use the software's DOS antivirus program to go To the DOS detection and removal page.

3. The virus killed after the restart is "Revived ".

Most of these viruses are infected with boot zone and other types of viruses. Because the boot zone is infected with viruses, the general anti-virus software cannot be completely solved.

Solution

Use the boot disk provided by anti-virus software or a self-made boot disk to reboot the boot and then scan and kill it normally.

4. The virus killed after surfing the internet is "Revived ".

This is because some viruses use system vulnerabilities to launch attacks. Because the system does not have relevant patches, the system is re-infected after accessing the Internet.

Solution

The simplest method is to install patches. You can also set a firewall (Some firewalls will upgrade) with relevant information. Users are advised to download the patches on a regular basis and do not make up for any problems. However, Microsoft patches always love to cause slow system speeds, crashes, and other new system faults. How do you choose between them?

In fact, some virus users will never be infected by simple settings. For example, disabling "macro" will avoid "macro virus ". If you are interested, please refer to the post posted by Mr. Piao :)

Trojan

In some cases, users hate Trojans. The idea of most users is that they are infected with viruses. As long as they are not CIH's big deal, they will "Get Involved", but if they are infected with Trojans, their own game accounts, bank accounts, QQ and other things that use passwords will not be guaranteed. This is silver, and some things cannot be changed with money.

Trojans and Trojan horses have become a social phenomenon of the network. In all aspects, it is unavoidable to rely solely on personal strength. Users are required to access the Internet safely, but their security settings can only be set at home, at the company, at school, and at Internet cafes. How can they ensure security? This is a huge challenge for users, vendors, and even our current security philosophy!

1. Can anti-virus software kill Trojans?

This is a question for many users. Even some internet cafe administrators insist that anti-virus software will not kill Trojans, so they would rather believe in some cracked Trojan killing tools.

Solution

Anti-virus software can kill Trojans! There is no doubt that users can purchase related shared software on their own if they have the necessary conditions or experience, but do not use cracking, because I cannot say what is wrong with cracking, but at least it is different from normal.

It should be pointed out that Trojans actually contain important information of the Wrangler. Experts can find this information through various methods (the vendor is even more difficult, but it is subject to legal restrictions ), once you have understood the trojan, you will have a clear clue. It is more difficult for the relevant authorities to verify the Trojan!

(Webpage) malicious code

When the iesettings are modified, malicious code of some websites is even bound with viruses/Trojans. This can be said that malicious websites use some means to increase their click rate by modifying users' IE at the beginning. But later, it became a virus/Trojan spreading media.

Solution

Use the IE repair software to modify the vulnerability, and use the security patch of IE to compensate for the vulnerability.

Advertising espionage

This is a blind spot in anti-virus software, and users cannot even notice it, because these plug-ins that peek at your privacy on the Internet are in some software (the terms in your software installation are that they become legitimate Trojans ), anti-virus software has no effect on them.

Solution

The advertisement cleanup software is used for scanning and removal, but some software cannot be started normally after scanning and removal.

Hacker program

This is not a real hacker, but a hacker who uses software. These programs will be used on so-called "bots" or "targets", including some special-purpose programs and Trojans (webshells are used, and Trojans are everywhere)

There is no technical difficulty in the above, just to share some of the most basic countermeasures. Do not let the computer take over you, but you must master the computer.

 


 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.