Anti-virus has long been a headache for computer users. Many people have the above questions and misunderstandings. In recent years, the virus has started to develop from a traditional form to a network worm and a hidden trojan virus. In this article, I will start with these two evils and talk to you step by step about virus removal and prevention.
1. Let's take a look at worms.
With the explosive development of China's broadband, the harm caused by the worm began to quickly show up! A worm is a virus that is spread over the Internet. It has some common characteristics of viruses, such as propagation, concealment, and destructiveness. It also has its own characteristics, if you do not use file parasitic (some only exist in the memory), you can quickly copy and infect yourself through the network, and combine it with hacker technology! In terms of destructive production, worms are not comparable to common viruses. The development of the network allows worms to spread throughout the network in a short period of time, resulting in network paralysis. I believe that the previous shock wave and shock wave have never been forgotten.
1. Differences between worms and common viruses
Common virus and Worm
Independent program for storing files in the form
Infectious mechanism host program running Active attacks
Infect the target local file Network Computer
2. Propagation Features
Generally, worms replicate themselves at abnormal speeds and spread in the Internet environment. The goal is to target all computers on the Internet. In this way, shared folders, emails, and malicious web pages in the LAN, a large number of servers installed with vulnerable operating systems have become a good way for worms to spread, this allows worms to spread around the world in just a few hours! In addition, the active and sudden outbreaks of worms will make people helpless! Among them, operating system vulnerabilities or Internet Explorer attacks are the most common.
3. worm prevention
Different from common viruses, worms often exploit vulnerabilities. vulnerabilities or defects here are classified into two types: software and human.
Software defects, such as system vulnerabilities, Microsoft IE and outlook Automatic Execution Vulnerabilities, need to be updated frequently or new versions of software. Artificial defects mainly refer to computer users' negligence. For example, when you receive photos from QQ friends and games, most people will click with curiosity, which is infected with viruses.
2. Individual user's preventive measures against the Worm
Through the above analysis, we understand the characteristics of the worm and the transmission path. Therefore, we need to pay attention to the following points for prevention:
1. Select the appropriate anti-virus software
Anti-virus software must provide real-time memory monitoring, real-time mail monitoring, and real-time webpage monitoring! Domestic software has good performance in terms of functions, response speed, and virus update frequency. Compared with foreign anti-virus software, they have obvious advantages for domestic viruses such as QQ, at the same time, the consumption of system resources is relatively small, so you can rest assured to use it.
2. frequent updates to the virus Database
Anti-virus software without the latest virus database is like a sniper rifle without a sight. viruses emerge one after another every day. In addition, in today's Internet era, the worm virus is spreading fast and has many variants. Therefore, you must update the virus database at any time, in order to detect and kill the latest virus!
3. Improve awareness of risk prevention
Do not accept any emails from strangers, attachments, pictures or software sent from QQ. It must be confirmed by the other party (because once the other party is poisoned, his QQ will automatically send a virus to his friends, and he does not know it at all. In this case, you only need to ask him a question, and he will be clear !), Or you can trust this person! In addition, for sending and receiving emails, I strongly recommend that you open the mailbox to send and receive emails through the WEB (that is, log on to the mailbox webpage) (this is safer than using Outlook and foxmail ). Although anti-virus software can be monitored in real time, it not only consumes memory, but also affects network speed!
4. Necessary Security Settings
When running IE, click "Tools> Internet Options> Security" to increase the security level. Disabling ActiveX plug-ins, controls, and Java scripts in iesettings can greatly reduce the chance of malicious code infection on webpages. Click "Tools"> "Internet Options" in the IE window, select the "Security" tab in the pop-up dialog box, and then click "Custom Level, the "Security Settings" dialog box is displayed. Select "Disable" for all ActiveX plug-ins and controls and all options related to Java ". However, in the future Web page browsing process, some websites that normally use ActiveX may not be able to browse.
5. Install System Patches immediately
Although it looks terrible, but careful friends pay attention to the ways in which Worms attack the system. We can see that the most important way is to take advantage of system vulnerabilities. Therefore, Microsoft's Security Department has increased the frequency of introducing system patches, you must develop good habits. You often go to the Microsoft website to Update system patches to eliminate vulnerabilities (by clicking "windows Update" at the top ")
Finally, we recommend that you often go online to see the latest virus information, in advance to prepare, here we recommend you go to The Rising anti-virus website http://www.rising.com.cn/