U disk virus Intelligence: The format of the reload system is not valid

Source: Internet
Author: User
Tags valid

Format by many users is considered to deal with the "ultimate trump card" virus, no matter how you infected, I will be formatted after the system to reinstall, it is not a completely healthy system, this method despite some trouble, but many people think it is an effective poison coup. However, the recent emergence of a new type of u disk virus has broken people's conventional thinking mode, become more intelligent, real-time format system disk, can not completely kill these viruses, but will be in their Ganji.

U disk is widely used to bring convenience to people, most of the computer users through the U disk for file exchange, but also because of the huge number of U disk Social Holdings, deeply attracted the eyes of hackers. Into the 2007, "Panda Incense", "AV Terminator" and other viruses have the U disk as the main means of transmission. u disk type virus vector is more extensive, in addition to U disk, MP3, MP4, mobile hard disk, digital cameras and other mobile storage devices to become the carrier of this kind of virus, and this kind of virus is more destructive, so that hackers on this kind of virus "love" has added, constantly "new".

According to anti-virus experts, today's U disk virus, has appeared "humanization" of the new characteristics, accurate prediction of the user after poisoning reaction and operation steps. Before the user for the U disk virus is not normal use of the computer, often choose to format a C-disk reload system to completely solve the problem, but according to micro-point anti-virus experts said that the recent micro-point active defense software automatically capture a series of new Trojan Horse program is targeted at users of this type of virus processing habits, The use of more sophisticated methods to deceive users, the user one but the virus, if the adoption of the format of the Reload C disk is precisely in this kind of new Trojan virus Ganji. This kind of new Trojan virus in addition to the traditional Trojan horse behavior, but also the use of image hijacking technology makes up to hundreds of kinds of security software hijacked, unable to run, the system anti-virus software can not run, reload kill soft also invalid. Most of the time, users will naturally choose to format a C-disk reload system. And this kind of new Trojan precisely here set the trap carefully. The Trojan is intentionally not written to the C disk while traversing the disk write AutoPlay file, while all disks outside C disk are written to the virus. That is to say, even if the user formats the reload system is useless, the virus has been infected with the rest of the hard disk partitions, resulting in users to reload the system is still repeatedly poisoned.

According to anti-virus experts, the virus this abnormal infection strategy is very intriguing, the virus writers know that the Trojan, the user will obviously feel the system is abnormal, so a large degree will choose to reload system to solve the problem. After the user has reinstalled the system, they will double-click the disk to the other partition to find the backup software installer to install the common software. At this point, the hacker's conspiracy reached, just reload system because accidentally double-click the disk through the automatic playback function successfully virus activation.

Industry experts say that hackers use part of the theory of "social engineering" to write the virus is gradually becoming a trend of technology trends, more and more virus-makers in order to enable the virus to play the most "effective", usually the user's use of the habit of deep research, with only one goal, to maximize the black gold.

And for this kind of virus how to do better prevention, industry experts remind customers: this kind of Trojan is through the automatic playback function to activate. For the example mentioned in the automatic play class Trojan, active defense software is automatic play virus-like nemesis. The installation uses the active defensive function the security software, does not have to deliberate other settings (for example, turns off automatically plays) can protect the computer and the U disk safely very well. With the collective efforts of the entire anti-virus industry, 2008 will be the new generation of anti-virus technology-"active defense" of the comprehensive year of popularization, when such "Automatic Playback" (autorun) virus will be effectively curbed. The majority of users do not need to worry about the shutdown settings, can be the active defense technology to obtain reliable security assurances.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.