In the popularity of PC today, computer viruses have made people talk about the color change. But the computer virus is artificial development after all, so can always find a big way to clear. Most viruses have their trigger conditions, so the editor speaks of triggering conditions for computer viruses.
First, the time for the trigger conditions: early viruses usually choose a specific date or a time for the trigger mechanism, once the date and virus preset date, the virus began to attack. Typical CIH viruses, which occur on the 26th of each month.
Second, the use of system vulnerabilities trigger: Some viruses use operating system vulnerabilities as an attack mechanism. If the application of the letter virus, as long as the user's computer has an IFRAME vulnerability, you do not need to run the attachment, just preview the mail virus can attack. For example, the ANI virus, which is popular today, is spread by loopholes in the computer itself.
Third, to persuade users to click on the trigger: Today most network viruses have not been triggered by time, most of the worm by sending some deceptive mail, hide itself in the attachment, disguised as a picture or a document form, luring computer users to click to run. Once clicked the virus immediately attacks.
Four, web browsing triggers: Today the most annoying is not a Trojan horse, and the Nets play an important role in it. By adding a script language to a Web page and hanging a horse, the user will automatically run the virus program when they visit the horse page.
Five, keystrokes and mouse triggers: Some viruses monitor the user's keystroke action, and when a particular key is detected, the virus is activated. The keyboard trigger includes keystroke number trigger, key combination trigger, hot start trigger, etc. In addition, some Trojan virus using operating system vulnerabilities, monitoring mouse action, once found that the mouse has a drag-and-drop operation, the virus is downloaded to the local and attack.
Start the system trigger. Some viruses are downloaded locally and do not attack immediately. When the user starts the computer again, it runs with the operating system.
VII. access to disk triggers: The number of disk I/O accesses by the virus is counted as a trigger condition.
Call Interrupt function Trigger: Count the number of interrupt calls as a trigger condition.
Nine, CPU model/motherboard model trigger: Virus can identify the operating environment of the CPU model/motherboard model, to the scheduled CPU model/board model to do the triggering conditions, the virus is the trigger is very rare.
Of course, the trigger condition of computer virus is far more than that, the development of science and technology has also provided more reference for the development of virus technology, many viruses are often synthesized several triggering mechanisms, but never ignore the trigger conditions of unknown virus, a seemingly casual neglect, it may be impossible to guard against.