I want to ask what people do most in their work or spare time, without a doubt, they must be surfing the Internet, but only surfing the internet will inevitably result in virus intrusion, therefore, how to effectively prevent viruses is very important, because only by understanding the characteristics of viruses can we effectively reject them from the Internet, let's talk about the five "invisible viruses" in the webpage code to ensure the security of the Internet.
Stealth viruses are roughly divided into the following types:
Webpage virus 1: CPU usage
By constantly consuming the system resources of the local machine, the CPU usage is as high as 100%, so that the computer can no longer process other users.
The typical prank of the "stealth killer 1" code is to generate an endless loop through JavaScript. This type of code may appear on a malicious website or be sent to you as an email attachment. Currently, most mail client programs can automatically call browsers to open htm/html files. As soon as you open the attachment, there will be countless new browser windows on the screen. Finally, you have to restart the computer.
Method To avoid: attachment of lifecycle
Webpage Virus 2: Illegal reading of local files
A typical practice of this type of code is to read local files by calling ActiveX, JavaScript, and webbrowser control on a webpage.
Compared with "invisible killer 1", "invisible killer 2" code is characterized by a relatively hidden expression. Generally, it is difficult for people to find that the invisible code is reading files on their hard disks. "Invisible killer 2" can also use browser vulnerabilities to kill it, such as IE 5.0 IFRAME vulnerability. A few lines of code can read any files that can be opened by IE on your local hard disk.
Solution: Disable Javascript and pay attention to Microsoft's security patches at any time.
Webpage virus 3: Web Spoofing
Attackers first break into the DNS server responsible for domain name resolution of the target machine, and then reset the DNS-IP address to a laptop host that he has taken the superuser permission.
These attacks are rare in China at present, but if they are successful, they are very harmful and may suffer heavy losses. The attack method is: forge an environment identical to that of the target machine on the host that has won the superuser permission to trick you into handing over your username and password, for example, our email or even the bank account and password on the Internet. Because you are faced with the same environment as yesterday, when you carefully typed the user name and password, you did not think of the real host.
XP system home is a professional system download website, and we have classified the system, win7 system and XP system, not only that, in order to facilitate users to encounter problems when installing the system, we also specially sorted out common system problems to help you solve the problem. We also divided the version into an installed version system and a pure version system, so that you can find a suitable system, if you need to download the system, go to the XP system and download www.7gyy.com.