Five invisible dangerous viruses and Solutions

Source: Internet
Author: User
Tags superuser permission

Recognize the weakest link in network security

Before talking about the invisible virus, let's first know what a computer virus is? It is a program with an executable code that damages the normal use of the computer, so that the computer cannot be used normally or even the entire operating system or hard disk is damaged. Attach an executable file or hide it in the system data zone. after starting the instance or executing some programs, it quietly enters the memory and then transmits other files to spread the file, then, damage the system or harass users under specific conditions. Just like biological viruses, computer viruses have unique replication capabilities. Computer viruses can spread quickly and are often hard to eradicate. Most computer viruses are parasitic, contagious, latent, and concealed.

If you know what a computer virus is, you can talk about the "invisible killer" virus in the general webpage Code. It is generally divided into five categories.

1. cpu usage: by constantly consuming the system resources of the local machine, the cpu usage reaches 100%, so that the computer cannot process other users' processes.

Virus principle: javascript generates an endless loop.

Channels of transmission: Malicious websites and email attachments

Consequence: as long as you access a malicious website or open an email attachment, there will be countless new browser windows on the screen. Finally, you have to restart the computer.

Anti-Virus method: for such problems, you can only avoid opening attachments to emails sent by strangers. You may wish to ask unfamiliar websites.

2. Illegal reading of local files:

Virus principle: reads local files by calling activex, javascript, and webbrowser control on a webpage.

Virus features: the performance is relatively concealed. Generally, it is difficult for people to find that the invisible code is reading files on their hard disks.

Communication path: using browser vulnerabilities

Consequence: You can read any files that can be opened by ie on your local hard disk.

Anti-virus solution: you can disable javascript and pay attention to Microsoft's security patches at any time.

3. web Spoofing

Virus principle: attackers first attack the dns server responsible for domain name resolution on the target machine, and then reset the dns-IP address to a host that has the superuser permission.

Attack method: forge an environment identical to that of the target host on the host that has the superuser permission to trick you into handing over your username and password. For example, our email or even the bank account and password on the Internet. Because you are faced with the same environment as yesterday, when you are skilled in typing the user name and password. I didn't even think of a real host.

Anti-Virus method: when surfing the Internet, it is best to turn off the javascript of the browser so that attackers can not hide the signs of attacks. Only when visiting a familiar website can open it, although this will reduce the functionality of the browser, but I think it is worthwhile. Also, do not link to other websites from websites you are not familiar with, especially those websites that need to enter the personal account name and password.

4. Control User Machines

Virus principle: the use of actives by ie is used.

Attack method: Your ie Security Settings. For "Download Signed activex control", the current option is "prompt ". However, ie still has the privilege to download and execute programs without prompt. This is a serious security problem, and we may be completely controlled by others without knowledge.

Method To avoid evil: in the Registry hkey-local-machinesoftwaremicrosoftinternet assumeractivex compatiblity, create a clsid-based New {rjb6015c} for "active setup controls" and create a regdword type value under the new one: compatibility flags 0x00000400.

5. Illegal formatting of the local hard disk

Virus principle: the hard disk can be formatted by executing activex.

Attack method: This type of code is very harmful. If you browse a Web page containing such code, the browser will only give a warning: "the current page contains incomplete activex, which may cause harm to you." Ask if you want to execute it. If you choose "yes", your local hard disk will be quickly formatted, and because the window is minimized during formatting, you may not pay attention to it at all, and it will be too late to find it.

Anti-Virus method: when there is a similar warning, "the current page contains incomplete activex, which may cause harm to you". Please do not execute it.

For individual users, they already know about viruses and Trojans, but little about invisible code on webpages. The invisible code in the web page has begun to seriously threaten our security now. I hope this article can be, but most people have a sense of self-protection in this regard.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.