Computers are connected to the network every day. Nowadays, there are countless Trojan viruses on the network, and viruses will inevitably happen one day. So what should we do after the virus? The correct solution can avoid greater losses and minimize the damage caused by viruses. Let's take a look.
I. MediumVirusSymptom
When your computer is infected with viruses, the
, enters the human memory, then is in the dynamic, under certain condition, will carry on the destruction, the infection and so on behavior
(1) Destructive
Destructive refers to the characteristics of a computer virus that destroys files or data and disrupts the normal functioning of the system. After computer virus
Computer viruses generally have the following features:1. computer Virus procedural (executable) computer viruses, like other legal programs, are executable programs, but they are not a complete program, but parasitic on other exe
1 computer virus Overview
Computer Virus (CV. It is a special program, and the problems caused by viruses are software faults. This program can infect itself to other programs and disrupt the normal operation of the computer syste
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next let's take a look at some of the mistakes we encounter when dealing with computer viruses.1. the DIR operation on t
that the virus is a MS Word macro virus, copy the "normal. dot" file in the C: Program FilesMicrosoft OfficeTemplates directory and all the files in the C: Program FilesMicrosoft OfficeOfficeStartup directory to the floppy disk.
If you suspect that the virus is a Microsoft Excel macro virus, copy all files in the XLST
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next, let's take a look at the top 15 mistakes we made in the face of computer viruses.
The DIR operation on the infecte
, resulting in system crash and data loss in severe cases. The phenotype of virus programs reflects the true intention of virus designers.Features: infection, concealment, destruction, DerivationComputer Virus vigilanceBecause computer viruses are a file (Program) that can b
family. For example, the family names of the famous CIH virus are unified "CIH ", in addition, the family name of the recently popular wannacache worm is "Sasser ".
A virus suffix is a variant of a virus. It is used to distinguish a variant of a specific family of viruses. Generally, 26 letters are used for representation, such as Worm. sasser. B Refers to B, a
relies on itself without the need of other object programs to reproduce, and constantly replicate between the host system resources and network bandwidth. Computer viruses are parasitic, often using other programs to spread, affect the normal operation of computer systems, and finally make the network system overloade
network security, mainly to prevent hacker intrusion and malicious attacks. Especially for online transactions, it is best to use anti-virus software with the firewall. At the same time, it is best to Upgrade anti-virus software once a day. Rising now provides at least three versions of virus database updates every week. The rising fire wall has a dedicated pass
In the network life, the computer virus has brought the big threat to us, how to prevent the virus is we very concerned about a topic. In fact, the prevention of computer viruses is not a simple word, in the understanding of some of us there is a big mistake, the following we take a look at the
Programmer's Guide". Yes, "The book is like a pink T-shirt." "It tells me I need to know how to write a silent but annoying virus like AIDS.But I have an extra challenge. I think this program is very small, only 666 bytes. My C compiler, at that time Borland Turbo C, although it allows you to write programs of various storage models, even the smallest executable file, has some overhead because of the start
Determine if your computer is infected with a virus, worm, or Trojan, how to recover from the infection, and how to prevent future viruses.
A computer virus is an executable file that can copy itself and escape detection. Viruses may escape detection by disguising themselves as legitimate
protection system. Set the computer password.
With a system patch and a secure password, such a system is basically secure, but not 100% secure. Antivirus software is still to be installed, it can help you prevent those emails and web pages of viruses, as well as you download from the Internet or with friends of the files of the virus. At the same time, antivirus software can also early detection of virus
Author: Zhuang Xiaoli (liigo), 2010/7/5
This article first address: http://blog.csdn.net/liigo/archive/2010/07/04/5712547.aspx
Reprinted please indicate the source: http://blog.csdn.net/liigo
Since the release of the easy language 5.0 static compilation version, there are still some anti-virus software false positives. programs compiled in easy language are viruses or Trojans. During the past two weekends
it is useful URL Click will be poisoned, so that the virus is widely disseminated. For example, in the last year's large-scale flooding of the "QQ Tail (TROJAN.QQ3344.S)" virus, the virus will be chatting to the QQ users to send messages, received the message of QQ friends if clicked on the link address, it will be poisoned, and then continue to infect other QQ
The easiest way to check a computer virus is to use newer anti-virus software to fully detect the disk. The following is a small compilation of computer virus inspection methods for everyone to reference, I hope we can have some harvest!
How to discover new viru
Some days ago a classmate computer infected with a ferocious virus, looking for me to see, the scene is very solemn and tragic: the bottom right corner of the screen is constantly popping bad ads, the system icon part of the changes, more computers out of many programs, CPU occupancy rate 100%, the mouse keyboard is almost unusable.The process of antivirus is tim
permission to write, then determine whether it is a script program. If it is a cp $0 $ file, this code feels that all the script programs in the system are harmful.
if grep -s echo $file>/.mmm
This statement can also be written as follows:
If file $ file | grep-s 'Bourne shell script'>/dev/nul; then: determines whether the file is a shell script program. However, once the script virus is inf
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.