Computer viruses are always sudden and casual, and they are often accessed in a way that we are very familiar with and prepared. It seems that two years ago, in the era of the prevalence of macro virus, the Misha (melissa) virus was raging with the help of word Macro. When worms frequently make troubles, after the iloveyou virus finds a contact in the outlook Address Book, the "Love Letter" is everywhere, "I love you" is so exciting!
Outlook 2002 does not allow you to open special types of attachments such as macros. It also prevents malicious code from stealing your outlook Address Book to avoid sending a large number of emails containing viruses.
However, the virus authors seem to have predicted that this defense method will certainly appear in the e-mail field that was once fully open to them. However, they quickly got used to it and wrote many new-generation viruses in a new way. Fortunately, virus writers do not have much innovative practices. They just copy malicious code found on the internet and modify it according to their intentions.
Even so, some new techniques have been used on worms and viruses in recent years, which undoubtedly makes people see that the new generation of viruses are constantly being compiled. The following are the latest trends of new viruses and some suggestions on how to protect yourself:
I. Using the mail client
As outlook has become more secure, the new virus has to go through the mail client. For example, the shoho virus uses its own smtp engine to send a virus-infected email, which allows it to bypass any software protection at the mail client.
The tariprox. B virus uses different methods: It hijack your email, write down the email client, and write malicious code into the mail client. Fortunately, tariprox is not spread. In this case, the best way to prevent this virus is to install the firewall on your personal pc. If you haven't installed the firewall, please do it!
Ii. url and attachment
In the past, I had some kind of sacred trust in URLs and attachments. Then, the recent emergence of viruses will undoubtedly compromise this trust. Take the myparty virus as an example. When you click a link to connect to a webpage, you will not consciously seek help! When you click an email attachment named mmsn_offline.htm, giggervirus is "hit by the waist" in silence ". This is because outlook2002is not designed to block direct link or. HTM files.
We recommend that you do not open attachments first. Second, if you do not need windows script hosting, disable it. Gigger is a javascript worm that uses windows script hosting to infect users.
Iii. Targeting real-time information
Although there are few instant messaging viruses that attack msn messenger, they are completely away from emails and spread through instant chat tools. Recently, the coolnow virus can obtain the contact address from msn messenger, send its copy to these contacts, and in the sent information, entice a user into a webpage infected with malicious javascript. To address this issue, you 'd better browse the Microsoft update site or view the Microsoft technical service network to obtain the latest security patches for Microsoft products.
4. Dual attacks by viruses and hackers
We shouldn't have been shocked by the Nimda virus last summer, but the dual attacks between the virus and hackers did surprise us. It exploits several common vulnerabilities on servers and computers. For the server, it will attack Microsoft's iis and create an infected webpage for you to download. On a desktop computer, it creates a virus-infected email and sends it to all contacts in the address book, or transmits it through a shared network.
Looking at the full text, we know how the next generation of virus works? Judging from the latest trend of writing viruses, they may be entirely through outlook or infected with instant messaging clients. Either way, you don't need to be alarmed when you encounter a virus. We may have been familiar with the virus, so I hope we can prepare for the new virus ERA!