Text/image: erratic
Recently, a virus named "avterminator" has been raging on the Internet. According to statistics, about 0.1 million of Chinese computer users have been attacked by the virus. "AV" in "avterminator" is the abbreviation of Antivirus, which means anti-virus s
Jiang Min's August 11 virus broadcast: Beware of the star lock virus stealing the login password of Web Pages browsed by users
Jiang min reminds you today that in today's virus, I-Worm/Locksky. ax star lock variants ax and Trojan/PSW. Moshou. aef "Warcraft" variants aef are worth noting.
Virus name: I-Worm/Locksky. ax
Software Introduction:
Chenoe Anit-virus Tools (short: C-AV) to restore the virus destroyed by the file and suppress the virus-oriented professional anti-virus software, the killing of some Trojan virus is also quite effective. Wi
In the security defense of E-mail, we can also use the strategy of "false ignorance, it creates a security line for E-mail from the system, anti-virus, anti-Black, and other aspects.
Analysis on security risks of E-mail
E-mail is the most widely used communication tool in interpersonal communication on the network. Its security issues have attracted attention fro
time)Suddenly a host went online! Another host went online! How can I launch a host before it is ready?Probably 3 or 4! I think ip Germany! It reminds me of little red umbrella! Open his hard drive now!Only one disk c:500) {this. resized = true; this. style. width = 500;} "border = 0>Debugging tools they use500) {this. resized = true; this. style. width = 500;} "border = 0>Their debugging interface is linked to my computer.500) {this. resized = true;
At present, the mainstream computers are using 64-bit CPU, the operating system gradually from 32 to 64, most of the new factory PC installed 64-bit Windows 7. When people think that 16-bit programs (mostly DOS programs) will disappear, the virus breaks the peace. October 25, Jinshan poison PA Safety Center monitoring found a 16-bit DOS virus resurrection, easy to cross the mainstream
360 Antivirus virus library How to upgrade? Many people are using the 360 antivirus software. But many people do not know, 360 anti-virus software virus library by default does not install the local engine virus library, namely 360 antivirus
Free anti-virus software is becoming more and more popular. I have discovered several free anti-virus software in the past few days. The younger brother did not dare to enjoy the free anti-virus software. I have listed them and sh
Six Free anti-virus and anti-malware scanning tools for Windows
Introduction
Is your system infected with viruses?
Is anti-virus software outdated?
Is it necessary to get a secure software with high performance but free performance for friends and family members who feel tha
Vbprogram anti-virus features and Virus Infection
Author: Fu Bo Lanzhou University of Technology International Trade Major QQ: 1151639935
Today, when I was studying the process of virus infection with PE executable files, I occasionally found that programs compiled by the VB6.0 compiler have a feature, that is, it can
The form of computer virus and the way of transmission is becoming more and more diverse, network anti-virus work is no longer a simple single computer virus detection and removal, the need to establish multi-level, three-dimensio
tricky. In order not to let users easily detect them, they all try their best to disguise themselves as deceiving users. The most common one is that the virus copies itself to the system directory (for example, the file name of Windows or Windows \ users, which cannot be separated without careful consideration ). Of course, another situation may be that the virus infected the EXE file, so it is not surpris
will set the BIND input directory IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT to 0, indicating that we do not need to bind the input, and then Add a new section to run it.
In this example, my program test1.exe finally runs into an attack after a new section is inserted.
Now I add a jmp command in the newly inserted section that directly returns the entry point of the original program:
Modify the program entry point to start RVA for the new section, and insert the jmp command in the new section to jum
Anti-virus attack and defense: Adding virus infection marks1. preface if the same target file is infected for multiple times, the target file may be corrupted and cannot be executed. Therefore, virus programs often write an infection mark to the target file when the first infection occurs. In this way, when the file is
Old Deng said well: No matter white cat black cat, can catch the mouse is a good cat! Antivirus software is not good or bad, can antivirus is the best. Antivirus software all exist false positives, this can not be avoided.
We can according to their own actual situation and computer configuration to install the appropriate anti-virus software. If your love machin
If we use a PC, we have to deal with the virus that will never become extinct. They will not only cause computer Rock hosts or crashes, but also damage our network. They can delete files from shared folders on the network, infect other computers, and occupy all network bandwidth. Therefore, we must use some anti-virus
Now the virus is really very powerful, so that anti-virus software can not start the normal has been very flattering. Recently I ghost.pif is this kind of virus, it in the antivirus software installation directory to forge a malicious ws2_32.dll file, resulting in anti-
, and the domestic known 360 anti-virus, QQ computer Butler has integrated its killing engine. In addition to blocking all types of malware, you can prevent advertising companies from tracking your Internet activities!
At present, foreign mainstream anti-virus software supp
, Kaspersky also has many disadvantages, such as resource occupation, easy to kill by mistake, and can only delete Trojans. If you Run Kaspersky on a low-configuration computer, it becomes a "crash ".
2. Monitoring
NOD32 and McAfee both performed well in monitoring. The former has "real-time security defense monitoring" and "professional master-controlled individual firewall ". The latter's VShield automatic monitoring System will be resident in Syste
1. Principles of Viruses
First of all, it seems that we should introduce what is virus, because many people are always confused with viruses and Trojans. No-this cannot blame them, because many Trojans now use virus-related technologies, there is no trojan virus. A virus is a group of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.