Abstract: This article describes the differences between computer viruses on the network, such as the characteristics of mail viruses, worms, and Trojans, as well as common mail viruses. At the same time, according to the current development trend of computer viruses, some prevention and control suggestions are put forward.
Keyword network virus program
With the rapid development of the Internet, email has become the most common tool for people to communicate with each other, so it has become an important carrier of email virus. In recent years, many Mail viruses have emerged, such as the "love you" virus, the "kurnicova" virus, the "Homepage" virus, and the "cover letter" virus, these viruses mainly use email as the transmission channel, and generally use Microsoft Outlook to intrude, and use the programmable features of Outlook to attack and destroy them. When the recipient uses OutlookRS to open a virus-infected email or attachment, the virus in the email will be automatically activated and the email with the virus attachment will be sent to the person in the "book, it is similar to worms, which are infected from one machine to multiple machines. These viruses are highly infectious and destructive. in a short period of time, virus emails will be replicated and transmitted on a large scale, which may cause the mail server to run out of resources and paralyze the network. Some viruses may even damage data and files on users' local hard disks ." Moushanxia website
Mail viruses have typical characteristics of viruses: the "I LOVEYOU" virus can be used to understand the general characteristics of mail viruses; self-replication and transmission, it is characterized by the spread of media or channels through email, so it is called "mail virus ". Because attachments to emails can contain files in any format, most viruses are sent in the form of attachments. When a user opens a infected attachment, the virus is activated and infected with the user's system. It sends an "I LOVE YOU" email with no address in the user's address book through Microsoft Outlook. the email content is "kindly check the attached LOVELET2TER coming from me ", with the name "love letter foryoutxt. vbs. Once the user opens the attachment, the virus program hidden in it is activated, so the email client program Out look is started to send Out the virus-infected mail, causing a chain reaction.
It can also be spread through a. htm file or a MIRC script. After the virus is infected, it automatically finds the local drive and the mapped network drive, and searches for the target that can be infected in all directories and subdirectories, for example, JSE, CSSWSH, SCT, HTA, JPEG, MP2, and MP3 files use the virus code to overwrite the original content and change the extension to VBS to make your email system slow, then destroy the original file. By analyzing special computer programs such as worms and Trojan viruses, you can gain a deeper understanding of the characteristics of mail viruses so as to actively take preventive measures. Worm is a program that can spread between different hosts on the network without modifying other files on the target host. Its Propagation relies on the running of the host or network, and relies only on itself, without the need for other object programs to breed. It constantly uses system resources and network bandwidth for self-replication between hosts. Computer viruses are parasitic and often spread using other programs, affecting the normal operation of computer systems, and finally paralyzing the network system. It is also troublesome to clear worms. Www.st35.com
In the network environment, as long as the worm in a host is not killed, it will be revived. Currently, computer worms and computer viruses are not differentiated. This is because their implementation technologies are different, but they have similar functions. In particular, some viruses now use the worm technology, which can damage the network. A Trojan Horse is a general term for hacking tools. It performs normal operations on the surface, but executes some functions without the user's knowledge, and is often used by hackers to steal information on the user's machine. It features at least some features and is often used by hackers to steal information on users' machines. It features at least two programs: a client program and a server program. Once a server program runs on a computer on the internet, hackers can use the client program to manipulate the host. The trojan program itself cannot be self-copied and must be installed by running other programs. This is also the difference between it and computer viruses. Hackers often put trojan programs in some file servers on the Internet, allowing people to download them, or hide them in attachments in emails, and send them to users, use some tempting reasons to entice users to execute the program. Some new users are fooled. The trojan program is based on the TCP/IP protocol and adopts the "customer/Server" working mode.
First, the hacker must install the server program of the Trojan to the user's machine and seduce the user to execute the program containing the Trojan. When a server program is installed on a user's machine, the installer generally needs to modify the system settings file to ensure that the trojan program runs automatically after the computer restarts. After that, hackers can use the client program to search for the network, find the host running the server program, and monitor the host. All the functions of the program can be implemented, data theft, user behavior monitoring, remote control, etc. The damage that a hacker can perform depends on the functions of the tools it uses. The Trojan program is very hidden. It is difficult for general users to discover it without being attacked by hackers. The common Trojan program is the hacker tool BO (Back Orfice2000 ). Its Host Program is Bogui. exe, the client program is Bogui. exe, and the running environment is Win98. It can monitor any computer that accesses the Internet under the TCP/IP protocol. The server program runs automatically through the registry. With the continuous development of network technology, global network is quickly realized. Based on the characteristics and hazards of Network viruses, software that does not have real-time network Anti-Virus is very dangerous for our computers. It will bring devastating disasters to our computers. Therefore, we must take effective management measures and technical measures to prevent virus infections and damages, and strive to minimize the loss. Of course, the prevention and control of computer viruses should also improve the legal system construction and strengthen management measures. According to the characteristics of network viruses, major websites should strengthen the prevention and control of viruses and use the latest technical means, fight against computer viruses. The prevention of email viruses is an example of Trojan prevention. After learning about the trojan program, it is easy to prevent.
First, do not download software from your personal website. Software downloading is usually safe for well-known and reputable sites. Secondly, do not trust or run the software given by others. Always check your system files, registries, ports, and so on. Pay more attention to security information. In addition, you should change the default settings of Windows for hiding file extensions, in this way, we can see the real extension of the file. Currently, many anti-virus software have the function of killing "Trojan" or "backdoor" programs, but they still need to be updated and advanced anti-virus software. Note: If you suddenly find that your computer's hard disk is working inexplicably, or if you haven't enabled any connection, the Modem will immediately disconnect the network while blinking, search for Trojans. Email viruses are mainly transmitted through emails, and most of them are carried by attachments. This is a clear and easy way to prevent such viruses:
(1) do not open attachments from strangers, especially executable files of some EXE classes.
(2) For emails sent from familiar friends, do not open the attachments if they contain attachments but are not described in the text, because the system may have been infected. Www.st35.com
(3) do not blindly forward emails. When sending program files or even e-cards to others, you can first try it on your computer and then send it again after confirming there is no problem, so as not to become a virus transmitter inadvertently.
(4) If YOU delete an email with the subject "I LOVE YOU" immediately, do not open the attachment.
(5) Pay attention to anti-virus alerts and promptly update the virus code base of anti-virus software. Technically, you can install an Anti-Virus Real-time Monitoring Program that monitors the mail system to monitor system behavior at any time. For example, you can use the latest anti-virus real-time software to kill files in the attachment.