Completely wipe out the Web virus and sever all security risks

Source: Internet
Author: User
Tags modify

When the internet does not pay attention to open a Web site, in the case of unconsciousness, the virus may have been quietly stationed in the computer, these viruses will make IE non-stop pop-up windows, IE homepage was modified, and so on, serious on the system can also cause a very large impact. IE virus removal is still relatively easy.

what is a Web virus

Web virus is the use of Web pages to destroy the virus, it uses some script language written in some malicious code using IE's vulnerabilities to achieve virus implantation. When users log on to certain Web sites that contain web viruses, web viruses are silently activated, and once activated, they can be exploited by some of the system's resources. Light to modify the user's registry, so that the user's home page, browser title changes, heavy can turn off many of the functions of the system, loaded Trojan, infected with the virus, so that users can not use the computer system, the serious person may be the user's system format. And this kind of webpage virus is easy to write and revise, make the user guard against.

The current web viruses are using Js.activex, WSH work together to achieve the client computer, local write operations, such as rewriting your registry, on your local computer hard disk to add, delete, change folders or files and other operations. But this function just makes the webpage virus, the webpage Trojan has the opportunity.

the nature and characteristics of Web virus

This kind of illegal malicious program can be executed automatically because it is completely out of the control of the user. Once you browse the Web page that contains the virus, you will be able to recruit the user's system in a way that is common, mild, serious and vicious. Make you miserable, even a heavy loss can not make up. The type of Web virus. According to the current Internet popular web virus, the role of the object and performance characteristics, summed up in the following two categories:

how the Web virus attacks

Since it is a web virus, it is very simple to say that it is a Web page, however, when the Web page is run and local, it does not only download and read after the operation, along with the former operations, there is the virus of the original software download, or Trojan download, and then execute, quietly modify your registry, and so on ... So what are the characteristics of this kind of Web page?

(1) Beautiful web name, and the use of the viewer's ignorance

(2) using the curiosity of the visitor

(3) The unconscious viewer

Web virus Basic prevention Methods

(1) The internet now almost all have their own QQ number, and now a lot of web viruses are spread through QQ, so when your QQ friends sent you a section of the Web site, you must confirm to open. It is very likely that the other person infected with the virus, in the uninformed case the virus automatically sent information.

(2) to avoid being infected by the Web page malicious code, the key is not to easily go to some of their own not very aware of the site, especially some looks very beautiful attractive URLs do not easily enter, otherwise often without easy will be mistakenly entered the Web page code trap.

(3) Upgrade your IE to the highest version and install all the security vulnerabilities.

(4) Because this type of Web page is a malicious code of the ActiveX Web page file, so in IE settings, ActiveX Plug-ins and controls, Java script, and so on are all prohibited to avoid the recruit.

The specific methods are: Click the "Tools →internet option" in the IE window, select "Security" tab in the pop-up dialog box, and click on the "Custom Level" button, the "Security Settings" dialog box will pop up, and all ActiveX Plug-ins and controls and Java related All can be selected "disabled". However, doing so may cause some Web sites that normally use ActiveX to be unable to browse in the future Web browsing process.

(5) Notice the function of the letter preview

The virus is known to be automatically executed if the letter is smuggled into a vicious html/script language. Therefore, even if we receive a poisonous email that does not carry a file, it is still possible to infect the virus. If you are a high-risk group that collects virus letters or files from time to time, consider closing the message preview function.

(6) Download Microsoft's latest Microsoft Windows Script

(7) Install virus firewall, open web page monitor and script monitor

(8) Please update your anti-virus software virus database frequently, so that they can detect the virus residue hidden in your computer in time. Regular scanning for the whole machine.

(9) Beware of letters of dubious origin

At ordinary times will inevitably receive a lot of letters; for example, greeting cards, advertising letters, and so on, virus letters may also be included, if you receive the letter theme is "HI", "How to Are You" and other basic greetings, and the letter content is a short message, even if the sender is your well-known friends or colleagues must be particularly careful. Because it is possible that they were poisoned, the virus message sent to you without knowing.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.