Virus identification criteria

Source: Internet
Author: User

Source: Legion Forum

Under normal circumstances, normal computer users cannot tell whether "malicious programs" that affect their system work are viruses or Trojans. It is helpful to clear viruses smoothly if you can identify the types of viruses.

Virus programs are "active and contagious ". Viruses can intrude into the entire system to infect them, and each infected program may become a virus and continue to infect other programs. The biggest feature of a virus program is that it can infect other programs and be passed. This makes it different from logic bombs and Trojan horses that are also concealed, stimulating, and attacking. Compared with "prank mail", this kind of contagious is active, while prank mail deceives the recipient and allows the recipient to send it using the mail tool. The program itself does not have the characteristic of active transmission, therefore, it is not a virus. Therefore, it is a sufficient condition to determine whether a program is a virus. Some viruses spread widely, but do not cause any damage to the host machine, such as the SARS virus found some time ago.

Virus transmission methods are diverse. Traditional viruses are generally transmitted by infecting executable programs, which are usually known as file-type viruses. These viruses are generally named Win32 and Win95. After a virus file is infected, the virus code is added to the Code of the normal program. Antivirus software clears the inserted code to fix the file, but some viruses use virus code to overwrite normal code of executable programs, it is difficult to know the code before the program is infected after antivirus software clears the virus, which means that after the virus is cleared, the program cannot be completely repaired, generally, you need to find a normal backup file for recovery. Therefore, we know that clearing viruses is not equivalent to fixing files. It is usually difficult to fix files damaged by viruses, especially executable programs.

Trojans do not usually infect files. Trojans generally modify the startup Item of the Registry, or modify the association of opened files to obtain the running opportunity. It is precisely because of this feature that we can easily clear a trojan by hand after learning about its intrusion characteristics. Anti-Virus Software generally deletes the files generated by the trojan. Therefore, you can use anti-virus software to scan and find that the file is deleted. This program is not a normal file of the system. Deleting it will not have any adverse impact on the system.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.