On servers with low computer configuration, it is much more efficient to install anti-virus software (no matter which anti-virus software occupies a lot of system resources ). I have not used anti-virus software for more than two years and have no virus. To put it bluntly, y
Definition of computer virus
Computer virus is a destructive and infectious ability of the program, and other normal procedures, when a computer virus from a certain way into the person, it will automatically enter the relevant p
destruction. Viruses have predefined trigger conditions, which may be time, date, file type, or certain data. When a virus is running, the trigger mechanism checks whether the specified conditions are met. If the conditions are met, the system starts the infection or damage action to infect or attack the virus. If the conditions are not met, the virus continues
that the virus is a MS Word macro virus, copy the "normal. dot" file in the C: Program FilesMicrosoft OfficeTemplates directory and all the files in the C: Program FilesMicrosoft OfficeOfficeStartup directory to the floppy disk.
If you suspect that the virus is a Microsoft Excel macro virus, copy all files in the XLST
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next let's take a look at some of the mistakes we encounter when dealing with computer viruses.1. the DIR operation on t
several anti-virus software on the same computer. Most of them are unnecessary, and there may be problems such as mutual resource preemption, misjudgment, and crashes.
Virus found in CMOS
CMOS is a special memory in a microcomputer. It records the hardware setting parameters of the microcomputer and the system date and time. Power-on password and other important
enters the memory, first find the target object that can be attacked and determine whether the object can be infected (some viruses are infected unconditionally );
(3) Infectious: when the virus finds the infected object and determines that the virus can be infected, the disk will interrupt the service program through INT 13H to infect the disk, and write it into the disk system;
Generally, viruses apply f
family. For example, the family names of the famous CIH virus are unified "CIH ", in addition, the family name of the recently popular wannacache worm is "Sasser ".
A virus suffix is a variant of a virus. It is used to distinguish a variant of a specific family of viruses. Generally, 26 letters are used for representation, such as Worm. sasser. B Refers to B, a
Liu Tianyi, rising senior anti-virus Engineer
Question 1: What will happen after computer poisoning?
A: Recently, all the stock speculators have begun to pay attention to network security issues. If the computer is poisoned, it is often seen that the computer is slow and some operation functions cannot be used, such
basically the case with families at that time. This means that the system can only allow one person to log on at the same time, and only pay more to increase the phone line.At that time, the computer underground organization in many aspects are covered, and software piracy most attracted me. 17-year-olds have little money to buy software. At that time there were some people who stole the phone line, they like to find ways to
statistics, there are already thousands of known security vulnerabilities in Windows NT series operating systems. And with the introduction of the new operating system, new vulnerabilities will be found more.
Security recommendations: For our ordinary users, we should first be to fill the loophole, operating system loopholes like an illegal channel, through this channel virus can enter the user's computer
, resulting in system crash and data loss in severe cases. The phenotype of virus programs reflects the true intention of virus designers.Features: infection, concealment, destruction, DerivationComputer Virus vigilanceBecause computer viruses are a file (Program) that can be executed by a
problem. Haha, I like it, this is not a good thing!
Ii. Initial Diagnosis
After arriving at the site, we will first make a preliminary diagnosis of the computer and learn the details of the computer's problems. By asking the staff, we can make the following judgments:
(1) the computer is definitely infected with virus
relies on itself without the need of other object programs to reproduce, and constantly replicate between the host system resources and network bandwidth. Computer viruses are parasitic, often using other programs to spread, affect the normal operation of computer systems, and finally make the network system overloaded and paralyzed.The removal of worms is also
The easiest way to check a computer virus is to use newer anti-virus software to fully detect the disk. The following is a small compilation of computer virus inspection methods for everyone to reference, I hope we can have some harvest!
How to discover new viru
and virus-free problems. In general, antivirus threads can be set to scan the system every time the computer starts up or run on a regular schedule basis. Some programs can also scan the system in the background when you connect to the Internet. Regularly scan the system for infection with viruses, preferably become your habit.
4, update your antivirus software now that you have the
releases an update to deal with the new virus.
Scan your computer again to eliminate the virus.
Schedule antivirus programs to check the system while you are sleeping.
If one or more of the following conditions is true, you may have to format your computer's hard disk and reinstall Windows and all your computer progra
in a flash to thousands of miles away.
3, the spread of the form of complex and diverse: computer Viruses in the network is generally through the "workstation-server-Workstation" approach to spread, but the form of communication is complex and diverse.
4, it is difficult to completely clear: computer viruses on a single machine can sometimes be deleted with poison files. Low-level formatted hard drives and
According to rising global anti-virus monitoring network, there are two viruses worth noting today: "Trojan. PSW. win32.XYOnline. jg) "and" QQ pass variant YRH (Trojan. PSW. win32.QQPass. yrh) "virus. The JG virus of xiyou Trojan is used to steal the account of the Online game "Fantasy xiyou Online", which may cause a variety of Chinese antivirus software to fail
Viruses will always find ways to invade our computer to sabotage, although you can use anti-virus and other software, but also must not ignore the usual prevention work. "Resist outside the country" is the most ideal, so we suggest that we should use the "prevent first" principle to deal with the virus. The following anti-vir
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.