Security knowledge: Computer virus preference for six types of software

Source: Internet
Author: User
Tags mail virus scan microsoft website

How do viruses like the software? Below we have listed six kinds of software that virus likes.

Windows operating system

The Windows family of operating systems are vulnerable to virus attacks primarily because of the complexity of the operating system design and the large number of security vulnerabilities that can occur. such as the August 2003 global proliferation of "shock wave (Worm.blaster)" Virus is the use of the system RPC buffer vulnerabilities to large areas of transmission and flooding.

A vulnerability is the existence of some man-made logic errors in some programs in the operating system. These errors are hidden deep, usually by some programmers or programming enthusiasts in the process of studying the system by accident, these findings are likely to be exploited by some hackers, so these can be exploited logic error is a loophole.

In addition to RPC vulnerabilities, there are many other vulnerabilities in the operating system, such as the "Worm King" Virus that exploited SQL Server 2000 buffer vulnerabilities at the beginning of the year. According to incomplete statistics, there are already thousands of known security vulnerabilities in Windows NT series operating systems. And with the introduction of the new operating system, new vulnerabilities will be found more.

Security recommendations: For our ordinary users, we should first be to fill the loophole, operating system loopholes like an illegal channel, through this channel virus can enter the user's computer at will, so to make the operating system security must periodically upgrade the system to the system security patches. It is recommended that you frequently go to the Microsoft website to download patch packs to upgrade your system, such as the latest server PACK 4 patches to patch over 600 security vulnerabilities.

When the user fills out the system loophole, the author recommends that you choose a professional anti-virus software to comprehensively protect the system. Often upgraded anti-virus software will be able to maximize the protection of the computer, free from hidden dangers.

Instant Messaging Software

QQ, MSN, NetEase bubble These instant chat software appears to bring closer the distance between people. QQ Software is said to have more than 100 million users in China, and hundreds of thousands of of users are online every day. However, as the number of such software users increases, such software is also a new target for viruses.

There are two main types of viruses that attack instant messaging software. One is to steal the user's number. It will deceive users by disguising themselves as Instant Messenger login pages, and when users enter their username and password in the login box, the virus automatically sends that information to the designated mailbox, which loses the network identity of the instant Messenger software. The other is to use the live link function of instant messaging software to spread, the live link function namely when the user receives the friend to send a website, only then clicks the website to be able to enter the webpage directly. Because of the convenience of this function, is used by many viruses, the virus will use the Chat window to all online friends to send a live link to a virus URL, when friends mistakenly think it is useful URL Click will be poisoned, so that the virus is widely disseminated. For example, in the last year's large-scale flooding of the "QQ Tail (TROJAN.QQ3344.S)" virus, the virus will be chatting to the QQ users to send messages, received the message of QQ friends if clicked on the link address, it will be poisoned, and then continue to infect other QQ chatting QQ friends.

Safety advice: This kind of software design is relatively simple, so I estimate in 2004 years, similar to "QQ Tail (TROJAN.QQ3344.S)" Virus will also appear in large numbers. Users can download specialized virus killing tools to regularly remove hidden viruses in the computer, users who know more about the computer can also use a firewall to prevent some illegal programs to access the network. In addition, users can use some special Instant messaging protection software to prevent the destruction of unknown viruses, because several domestic anti-virus companies are active in the development of real-time communication software protection products, like rising company in the company and Tencent actively carry out deep technical cooperation, I believe that soon after, Users will be able to use these instant messaging protection products.

Network game Software

At present, the popular online games in the market has reached dozens of kinds. Network game hot Let attack network game virus also breed massively. Their main feature is the stolen number, after the successful virus release will be stolen online game users and valuable virtual property stolen, attacks on network game software most of the virus will be scanned through the network or send a large number of viral mail to infect the user's computer, after successful infection, The virus steals the password information for a particular network game and sends it to the designated mailbox when the computer is networked. such as "Password Hunter (Worm.PSW.CqSys)" Virus is such a virus, the virus runs through the LAN spread and steal the "legendary" game password, so that the user's game identity and virtual property lost.

Security recommendations: As a result of attacks on the network game a lot of viruses, and the rapid production of virus variants, the author recommends that players to play the game when the real-time monitoring program to prevent virus attacks. In addition, users can also use the Network Game protection products to protect some online games, as long as the configuration properly, you can prevent the network game by any virus attack.

Outlook class Software

Outlook and Outlook Express are the most commonly used mail client software and are very vulnerable to mail virus attacks. There are two important vulnerabilities to this type of software: Previewing vulnerabilities and executing vulnerabilities, resulting in a large number of viruses that exploit these two vulnerabilities. A virus that is written with a preview vulnerability will automatically execute the corrupted code as soon as a user clicks on the virus message, making it impossible for the user. The virus that is written with the execution of the vulnerability has a feature of its poison mail the message is very large but the user can not see the attachment, because the virus uses the message encoding function of its own media form hidden in the body of the message, as long as the user opened the message, the virus will automatically revert to the virus, and then the user's computer to destroy. such as "Happy Time" (VBS). HappyTime) "The virus will disguise itself as stationery, and then attach to the body of the message to spread around, while the" cover letter (Worm.klez) virus is using the message Preview vulnerability to spread.

Security advice: The best way to protect this type of software is to use the email monitoring function of antivirus software. Almost every anti-virus software provides a message monitoring function, the monitoring program will monitor the formation of the message, send, receive the entire process, in the receiving or sending the message at the same time the virus scan the message, the discovery of viruses will remind users to take appropriate measures.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.