[Abstract] based on analyzing the virus mechanism, a small virus is written in C language as an example, which is implemented using turboc2.0.[Abstract] This paper introduce the charateristic of the computer virus, then show a simple example written by turboc2.0.1. What is a virus?Malware may be the first computer security problem that affects us. Therefore, viruses are very important in information security.We need to understand the virus to deal wit
, the loading of the operating system are quite large and complex, this kind of virus is difficult to operate in such a complex boot situation. Most of the current viruses, most of which are selected in the operating system this piece of destruction.The possibility of not booting is ...Whether it's windows, Mac OS, Linux or BSD, the start-up of the operating system is made up of sophisticated sequential steps, one ring after another. The operating sys
The CIH virus has put everyone in fear and caused great waves. In the past, various viruses could only damage hard disk data, but CIH could intrude into Flash BIOS on the main board and destroy its content to decommission the main board. The CIH Lesson tells us not to underestimate the damage to hardware caused by viruses. Many people are beginning to worry: CIH is becoming increasingly fierce, and will the
9 Ways to WINDOWS8 systems from viruses:
1. Do not open e-mail messages from unfamiliar senders or e-mail attachments that are not recognized. Many viruses are attached to e-mail messages and are propagated when you open attachments. Therefore, it is best not to open any attachments unless the attachment is the desired content. Www.xitonghome.com
Use the Pop-up blocker in an Internet browser. A pop-up win
the virus successfully infected a program owned by the user, the task that it further spreads will be very difficult due to the limited permissions of the user (of course, this argument may not apply to new Linux users running a single-user system. Such users may be careless with the root account ).
Linux network programs are built conservatively, and there is no advanced macro tool that can make the current Windows virus so quickly spread. This is not an inherent feature of Linux; it is only a
phone situations at any time to detect viruses in a timely manner.
1. Monitoring garbled characters.
When the other party calls the phone, the screen usually displays the incoming call number. If other words or special characters are displayed, they may be attacked by viruses. In this case, the user should not answer or immediately close the phone. If you receive a call, the system will be infected with
viruses. Run OE6.0 and click "Tools", "options", and "security" in sequence ", click the check box before the "Do Not Allow save or open attachments with viruses" tab on the settings page to enable the OE self-protection function.
3. modify program Association
Some worms pass. to reduce the risks caused by such virus, an easy way is to modify the file's association attributes so that when opening the scrip
Author: arrows in the demon worldIf you are using Windows 2 K or Windows XP, you will be able to die all viruses with one gram! From now on, the Internet can be at ease, no longer afraid of poisoning!
If you are a newly installed system (or you can confirm that your system is currently non-toxic), it would be better to open it now:
"Start> program> Management Tools> Computer Management> local users and grou
1. remove viruses from the directoryFirst, we need to start with the directory where the virus is located. If the virus has its own directory like a normal software, we can smile a little-the virus is weak. Check the Directory Creation Time to know when the virus was infected and where the virus was discovered. If it does not have its own directory, but exists in the system directory, it is easy to do. The damage of this virus is generally not very la
While the network brings great convenience to our work and study, viruses, Trojans, backdoors, and hacker programs also seriously affect information security. One common characteristic of computer infection is that these programs write information in the Registry to achieve such purposes as automatic operation, destruction, and dissemination. To prevent viruses, Trojans, backdoors, and hacker intrusions, yo
opening of the virus by exploiting the vulnerability. Using the mail firewall to filter emails is also a good choice.
Instant chat and point-to-point tools
Chat tools QQ, ICQ, and MSN are the favorites for instant communication among netizens. The "Hunters" trojan uses QQ to publish messages so that your chatbots can become popular. The Application of P2P transmission tools makes it very easy for users to communicate with document software, but it hides a large number of security risks. The lat
then enter the command line that allows the program to run in the corresponding text box, click OK to add it to the list of the displayed content dialog box.
After the configuration is complete, all programs except the programs specified in the list in WinXP will be banned from running, let alone viruses trying to add themselves to the auto-running ranks, and cannot run at system startup.
A place where vir
, other virus processes will immediately create the terminated process.Solution: scan and kill in security mode.
2) use the virus code injected into the system process as mentioned above to protect the virus process.Solution: Same as 3.
3) the virus is started as a system service, so we cannot terminate it through the task manager.
Solution: stop the virus service first, and then completely scan and kill the virus.If you cannot see or stop the virus service, you need to handle it in securi
As we all know, there are a lot of Internet resources, including viruses, Trojans, plug-ins or malware, which pose a great threat to our network life. In Internet behaviors of netizens, downloading accounts for nearly half of the total number of users. Downloading has become an indispensable part of the daily online life of Internet users. As the most popular download tool, Xunlei, has been paying close att
Computer viruses are widely transmitted and often concealed. Therefore, we should first improve the awareness of computer viruses. During the use of computers, we should pay attention to the following points:
1. Regular backup. Back up data in the hard drive and primary boot sectors, and often back up important data.2. Try not to use pirated or unknown software.3. Install genuine anti-virus software.4. dev
The CIH virus has put everyone in fear and caused great waves. In the past, various viruses could only damage hard disk data, but CIH could intrude into Flash BIOS on the main board and destroy its content to decommission the main board. The CIH Lesson tells us not to underestimate the damage to hardware caused by viruses. Many people are beginning to worry: CIH is becoming increasingly fierce, and will the
With the popularization of computer and the development of information technology, the word "computer virus" is no longer unfamiliar to everyone, and nowadays computer viruses are emerging, even the vast majority of users have almost to "talk about poison color change" degree. Jiangmin's technical engineers have found that many users are not so knowledgeable about the files under the operating system that they have
", "options", and "security" in sequence ", click the check box before the "Do Not Allow save or open attachments with viruses" tab on the settings page to enable the OE self-protection function.
3. Modify Association
Some worms pass. to reduce the risks caused by such virus, an easy way is to modify the file's association attributes so that when opening the script file (for example, double-click an attachment) it does not run automatically. Open "Con
is the RPCSS (remoteprocedurecall) service process, the other is a svchost.exe shared by many services, and in Windows XP, There are generally more than 4 Svchost.exe service processes. If the number of svchost.exe processes is more than 5, be careful, most likely the virus is fake, the detection method is also very simple, using some process management tools, such as the Windows Optimizer master's process management capabilities, to view the Svchost.exe executable path, if the "C: WINDOWSsyste
...
Address Offset: Segment + offset
Match byte
Feature length
Characteristics
Dedicated process: Obj_link
Processing offset addresses
Processing byte length: generally less than 10
Fix bytes
Second, search methods:
There can be seen above, AVP can ensure rapid processing, a key factor is the AVP search method, in fact, AVP built a number of search methods, these methods apply to Msdos, Win9x, WINNT/2000/XP and other systems. AVP can use a variety of memory search methods to deal with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.