Recognizing the true nature of a virus-hazards and Prevention

Source: Internet
Author: User

Step 5: Hazards of Viruses

The harm of viruses is as small as that of individuals and the whole world. No one who is using computers is troubled by them. For those who are lucky to be immune from virus harassment, I want to give you a warning in advance, hoping not to scare you. Advise you that it is best to prevent computer viruses from happening before they happen!

The idea of virus theory can be traced back to science fiction. In his book "The youth of P1" published by American writer Rennes in 1970s, he conceived a computer program capable of self-replication and communication. It is also called a computer virus.

Let's see what the virus has done!

Since the birth of the first von noriman computer ENIAC in 1946, computers have been applied to various fields of human society. However, the "worm" incident that occurred in the United States in 1988 gave a shadow to the development of computer technology. The worm is written by Morris, a graduate student at CORNELL University in the United States. Although it was not malicious, at that time, the "worm" spread on the INTERNET, making thousands of connected computers stop running, causing huge losses, and became the focus of public opinion. The details are as follows:

At 05:01:59 P.M. on July 22, November 2, 1988, a 23-Year-Old graduate student from the Computer Science Department at Cornell University, Morris, wrote the worm program into the computer network. The Internet was congested within hours. The network is connected to 155000 computers in universities and research institutions, blocking the network and slowing down its operation. This event is like a huge earthquake in the computer industry, which has caused a huge response, shocked the world, and caused people to panic about computer viruses, it also makes more computer experts focus on computer virus research.

In the second half of 1988, China discovered the "small ball" virus for the first time in the Bureau of Statistics System, which has a great impact on the statistical system. The recent CIH virus, the beautiful virus, and so on, have caused great economic and social losses all over the world.

In China, the first virus that attracted attention was the "Black Friday", "mishi virus", and "ball virus" that appeared at the end of 1980s. Because there were not many types of software at that time, software exchanges between users were frequent and anti-virus software was not widely used, resulting in a wide spread of viruses. Later, the word macro virus and the cih virus in win95 made people have a deeper understanding of the virus.

As we can see, with the increasing popularity of computers and the Internet, computer viruses and crashes, the destruction and loss of important data will cause a great waste of social wealth, and even a disaster for all mankind.

Step 6 virus symptoms

What are the symptoms of computer virus attacks?

After a computer is infected with a virus, it is hard to detect it if it does not have an attack. However, when a virus attack occurs, it is easy to feel:

Sometimes the computer is abnormal;

Sometimes it will be inexplicably crashed;

Sometimes it will suddenly restart;

Sometimes the program cannot run;

Some screens may rain when a virus attack is full, some screens may contain caterpillars, and even a dialog box appears on the screen; when Ping drops to raise less than a shallow model together with the gray resentment Xiao emblem # Tuo zinc Yu Qiao old narrow instant "do 2" blow Nai: Ω lie far from the epimum?

In addition, people used to think that viruses can only destroy software and there is no solution to hardware. But CIH breaks this myth because it can damage hardware in some way!

[Iduba_page] computer viruses are compiled by people like other programs. Since the virus is also a human program, there will be a way to deal with it. The most important thing is to take various security measures to prevent viruses. In addition, various anti-virus programs are used. They can kill viruses and clear them from the computer.

Step 7 virus prevention policy

The prevention and control of computer viruses should be carried out from three aspects: anti-virus, virus detection, and detoxification; the system's actual prevention and control capabilities and effects of computer viruses should also be judged in terms of anti-virus, anti-virus, and detoxification capabilities.

"Anti-Virus" refers to taking appropriate system security measures based on system characteristics to prevent viruses from intruding into the computer.

"Virus detection" refers to the ability to accurately report the virus name for a specific environment, including memory, files, boot area (including the dominant area), and network.

"Detoxification"-refers to the modification of infected objects based on different types of viruses and the recovery of infected Objects Based on the virus infection characteristics. The restoration process cannot destroy the content that has not been modified by the virus. Infected objects include memory, boot area (including Master Boot area), executable files, document files, and networks.

Anti-Virus capability refers to the ability to prevent viruses from intruding into computer systems. Through anti-virus measures, accurate and real-time monitoring and warning should be performed between different directories on the optical disk, floppy disk, hard disk, lan, and Internet (including FTP, email, and HTTP) or other forms of file downloads or other means of transmission; the virus can intrude into the system by issuing an alarm, Recording files carrying viruses, and immediately clearing the virus; for the network, A workstation that can send information about virus intrusion to the network administrator and record the virus intrusion. If necessary, it must be able to log off the workstation to isolate the virus source.

Virus detection capability: the ability to discover and track virus sources. The virus detection should be able to accurately detect whether the computer system is infected with viruses, find out the sources of viruses accurately, and provide statistical reports; the virus detection capability should be determined by the virus detection rate and false positive rate.

Detoxification capability: indicates the ability to clear viruses from infected objects and restore original information before virus infection. The detoxification capability is determined by the detoxification rate.

Step 8 virus detection

To check whether a computer is infected with a virus, you can use a newer anti-virus software to thoroughly check the disk. However, anti-virus software always comes after the virus. How can we detect new viruses as soon as possible?

The user can make the following simple judgment: No matter how clever the virus is, it will always leave some "clues" after it intrude into the system ".

First, pay attention to the memory. Most viruses need to reside in the memory. For DOS users, use the C drive to start the machine and then run the "MEM" command?

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.