Folder counterfeits are frequently hidden by Internet users

Source: Internet
Author: User

If you find that the USB flash drive is poisoned by anti-virus software and all the information is "missing" after virus removal, do you think the virus hides the normal folder? Recently, a type of USB flash drive named "folder imitators" is spreading like a USB flash drive, mobile hard drive, digital camera memory card, mobile phone memory card, and other mobile devices. To this end, the only "dual-core" anti-virus software 360 specifically targets "folder imitators", not only killing viruses, but also restoring normal files on mobile devices such as USB flash drives, save valuable information from the virus.

It is understood that "folder imitators" are mainly spread through mobile devices such as USB flash drives. They will hide normal files and folders in the USB flash drive and disguise themselves as hidden files/folders. It also changes its icon to a folder icon or a common software Icon (such as a piece or video ). If you are not vigilant, double-click the virus file to immediately run the virus. Then, you can download dozens of Trojan viruses to the computer connected to the USB flash drive, in this way, the USB flash drive causes cross-virus infection between different computers.

In view of the evil behavior of "folder counterfeits", the "dual-core" 360 anti-virus software has enhanced its protection and removal of such viruses: When the 360 anti-virus "real-time protection" function is enabled, when a user inserts a USB flash drive or other mobile devices into a computer, if a hidden file with the same name exists in the USB flash drive, the 360 antivirus service immediately generates a warning and recommends that the user scan a USB flash drive or other mobile devices. Under the "dual-core" 360 cloud scanning and removal engine scan, the "folder imitators" will naturally be easily cleared, the hidden files and folders will also be automatically restored to normal status by 360 antivirus. Even if your computer is disconnected from the network, the cloud detection and removal engine cannot work online. In addition, the 360 anti-virus service will add the suffix ". 360" to the suspicious file of the "folder imitator" to ensure that it cannot run.

Next, let's take a test to see how "dual-core" 360 anti-virus clears the "folder imitator" virus.

First, check the USB flash drive with the "folder imitator" virus in the computer that has not installed 360 antivirus software, as shown in:

Figure 1: The virus-infected USB flash disk does not look any different without displaying hidden files

Click "Tools"> "Folder Options" in order to display the hidden files and folders on the computer, and display the file type extension. The results are surprising, for example:

Figure 2: originally, the real folder is hidden by viruses, and the virus exe file is in front of the user!

Apparently, if users are not vigilant, once they double-click "image favorites" or "My Documents" with the mouse, the trojan virus will intrude into the computer from the USB flash drive.

Next, we inserted this dual-core USB flash drive into the computer with "dual-core" 360 anti-virus software, and the disguised virus tricks were instantly exposed, as shown in:

Figure 3: 360 anti-virus monitors files of the same name in mobile devices in real time

After you click "scan", even if the "folder impersonator" virus is not killed, the "dual-core" 360 anti-virus can be thoroughly scanned by its behavior features, as shown in Figure 4:

Figure 4: "folder imitators" virus files are easily identified by 360 Antivirus

After 360 of the urgent anti-virus processing, the disguised folder imitator virus was killed in one fell swoop. The hidden "pictures" and "My Documents" were saved, it is automatically restored to the user. With this mechanism, the user's data stored on a USB flash drive and other mobile devices will not be easily lost. 5:

Figure 5: 360 saving valuable data from a virus-infected USB flash drive

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.