Recognize the weakest link in network security
Before talking about the invisible virus, let's first know what a computer virus is? It is a program with an executable code that damages the normal use of the computer, so that the computer cannot be used normally or even the entire operating system or hard disk is damaged. Attach an executable file or hide it in the system data zone. after starting the instance or executing some programs, it quietly enters the memory and then transmits other files to spread the file, then, damage the system or harass users under specific conditions. Just like biological viruses, computer viruses have unique replication capabilities. Computer viruses can spread quickly and are often hard to eradicate. Most computer viruses are parasitic, contagious, latent, and concealed.
If you know what a computer virus is, you can talk about the "invisible killer" virus in the general webpage Code. It is generally divided into five categories.
1. cpu usage: by constantly consuming the system resources of the local machine, the cpu usage reaches 100%, so that the computer cannot process other users' processes.
Virus principle: javascript generates an endless loop.
Channels of transmission: Malicious websites and email attachments
Consequence: as long as you access a malicious website or open an email attachment, there will be countless new browser windows on the screen. Finally, you have to restart the computer.
Anti-Virus method: for such problems, you can only avoid opening attachments to emails sent by strangers. You may wish to ask unfamiliar websites.
2. Illegal reading of local files:
Virus principle: reads local files by calling activex, javascript, and webbrowser control on a webpage.
Virus features: the performance is relatively concealed. Generally, it is difficult for people to find that the invisible code is reading files on their hard disks.
Communication path: using browser vulnerabilities
Consequence: You can read any files that can be opened by ie on your local hard disk.
Anti-virus solution: you can disable javascript and pay attention to Microsoft's security patches at any time.
3. web Spoofing
Virus principle: attackers first attack the dns server responsible for domain name resolution on the target machine, and then reset the dns-IP address to a host that has the superuser permission.
Attack method: forge an environment identical to that of the target host on the host that has the superuser permission to trick you into handing over your username and password. For example, our email or even the bank account and password on the Internet. Because you are faced with the same environment as yesterday, when you are skilled in typing the user name and password. I didn't even think of a real host.
Anti-Virus method: when surfing the Internet, it is best to turn off the javascript of the browser so that attackers can not hide the signs of attacks. Only when visiting a familiar website can open it, although this will reduce the functionality of the browser, but I think it is worthwhile. Also, do not link to other websites from websites you are not familiar with, especially those websites that need to enter the personal account name and password.
4. Control User Machines
Virus principle: the use of actives by ie is used.
Attack method: Your ie Security Settings. For "Download Signed activex control", the current option is "prompt ". However, ie still has the privilege to download and execute programs without prompt. This is a serious security problem, and we may be completely controlled by others without knowledge.
Method To avoid evil: in the Registry hkey-local-machinesoftwaremicrosoftinternet assumeractivex compatiblity, create a clsid-based New {rjb6015c} for "active setup controls" and create a regdword type value under the new one: compatibility flags 0x00000400.
5. Illegal formatting of the local hard disk
Virus principle: the hard disk can be formatted by executing activex.
Attack method: This type of code is very harmful. If you browse a Web page containing such code, the browser will only give a warning: "the current page contains incomplete activex, which may cause harm to you." Ask if you want to execute it. If you choose "yes", your local hard disk will be quickly formatted, and because the window is minimized during formatting, you may not pay attention to it at all, and it will be too late to find it.
Anti-Virus method: when there is a similar warning, "the current page contains incomplete activex, which may cause harm to you". Please do not execute it.
For individual users, they already know about viruses and Trojans, but little about invisible code on webpages. The invisible code in the web page has begun to seriously threaten our security now. I hope this article can be, but most people have a sense of self-protection in this regard.