First: What is the process
The process is a running instance of the application and is a dynamic execution of the application. Seemingly profound, we can simply understand that it is the operating system currently running the execution program. In the execution program that the system is running, it includes: The system manages the individual of the computer and the programs necessary to complete various operations, and the additional programs that the user opens and executes, including, of course, the illegal programs that the user does not know, and those that run automatically (they may be virus programs).
The more dangerous executable virus also appears as a "process" in the system (some viruses may not be listed in the process list, such as "macro virus"), so timely viewing and accurate killing of illegal processes is a key role in manual anti-virus.
Second: What is a Trojan horse
Trojan virus source of the ancient Greek Trojan War in the famous "Trojan Horse" and the name, as the name implies is a disguised latent network virus, waiting for the opportunity to come out to harm.
Mode of infection: sent by email attachment, bundled in other programs.
Virus characteristics: Will modify the registry, resident memory, in the system to install backdoor programs, boot load shipped with the Trojan.
Trojan Virus's destructive: Trojan Virus attack to run the client program in the user's machine, once the attack, you can set up the back door, regularly send the user's secret to the Trojan program designated address, generally built-in access to the user's computer port, and can arbitrarily control this computer, file deletion, copy, Illegal operation such as password change.
Preventive measures: Users are vigilant, not to download and run unknown procedures, for the unknown origin of the mail attachment also do not open.
Third: What is a computer virus
A computer virus is a program, a piece of executable code. Like biological viruses, computer viruses have a unique ability to reproduce. Computer viruses can spread quickly and often hard to eradicate. They can attach themselves to various types of files. When files are copied or transferred from one user to another, they are spread along with the file.
In addition to replication capabilities, some computer viruses have other common features: a contaminated program can transmit viral vectors. When you see viral vectors that appear to be just words and images, they may also have corrupted files, reformatted your hard drive, or triggered other types of disasters. If the virus is not parasitic on a polluting program, it can still cause you trouble by taking up storage space and reducing the overall performance of your computer. The definition of a computer virus can be given from different angles. One definition is the process of "infecting" other programs through the diffusion of media, such as disks, tapes and networks. The other is a latent, contagious and destructive procedure capable of reproducing itself and relying on a certain carrier. It is also defined as a human-made program that lurks or is parasitic in storage media (such as disk, memory) or programs in different ways. When a condition or time is ripe, it will reproduce and propagate itself, causing the computer's resources to be corrupted by different programs and so on. In a sense, these statements borrow the concept of biological viruses, computer viruses and biological viruses are similar to the ability to invade computer systems and networks, harmful to the normal work of the "pathogen." It can make a variety of damage to the computer system, simultaneously can reproduce itself, is contagious.
Therefore, computer viruses are able to lurk in a certain way in the computer storage media (or programs), when a certain condition is activated to have the computer resources to destroy the role of a set of programs or instructions set.
Four: What is worm virus
Worm virus is a kind of computer virus. Its transmission mechanism is the use of the network for replication and transmission, transmission through the network and e-mail.
For example, in recent years, the most harmful "Nimda" virus is a worm. This virus exploits the Microsoft Windows operating system loophole, the computer infects this virus, will continuously automatically dial-up the Internet, and uses the file the address information or the network share carries on the dissemination, eventually destroys the user most important data.
The general control method of worm is to use anti-virus software with real-time monitoring function, and do not open the unfamiliar mail attachment easily.
V: What is advertising software adware
Adware (Adware) is a program that downloads and installs or bundles with other software via pop-up advertising or other forms of commercial advertising without the user's permission. After installing adware, it often causes the system to run slowly or system abnormal.
To prevent advertising software, attention should be paid to the following aspects:
1, do not easily install shareware or "free software", these software often contain adware, spyware and other undesirable software, may bring security risks.
2, some advertising software through malicious Web site installation, so, do not browse bad websites.
3, the use of better security Network browser, and pay attention to make up the system loopholes.