The 2003 Worm King "(worm.netkiller2003), whose harm far outweighs the once rampant red code virus.
Network bandwidth is heavily occupied after the worm is infected, resulting in network paralysis, which exploits the buffer overflow vulnerability of SQL SERVER 2000, which resolves port 1434, to attack its network. As the "2003 Worm King" has a strong ability to
"Stalker" virus (known as Dsound.dll, Ddraw.dll virus). February 1, "stalkers" began to spread, firmly occupy the first place in the virus rankings. "Stalkers" to infect Windows system files Dsound.dll, Ddraw.dll as a springboard, bypassing anti-virus software and online gaming protection system. Once an infected syste
Author: Serdar yegulphosphatase
In the past few years, our computers have suffered unprecedented attacks, and malicious software has become increasingly intelligent and powerful. We can't help thinking, in the future Internet world, is anti-virus software still not part of the puzzle?
Security never exists in the PC World
For a long time in the past, the security issues we mentioned today did not exist in t
I. Introduction of APP hijacking virusApp hijacking refers to the execution process is redirected, but also can be divided into activity hijacking, installation hijacking, traffic hijacking, function execution hijacking and so on. This article will analyze the recent use of acticity hijacking and installation of hijacked viruses.two. Activity Hijacking virus Analysis2.1 Activity Hijacking
I. Introduction of APP hijacking virusApp hijacking refers to the execution process is redirected, but also can be divided into activity hijacking, installation hijacking, traffic hijacking, function execution hijacking and so on. This article will analyze the recent use of acticity hijacking and installation of hijacked viruses.two. Activity Hijacking virus Analysis2.1 Activity Hijacking
How your application is replaced, analysis of App hijacking virus, and app hijacking1. Introduction to App hijacking
App hijacking refers to the redirection of the execution process, which can be divided into Activity hijacking, installation hijacking, traffic hijacking, and function execution hijacking. This article will analyze the recently used Acticity hijacking and installation hijacking viruses.Ii. Ac
January 25, 2003, the Internet appeared a new high-risk worm-"2003 Worm King" (worm.netkiller2003), its harm far more than the once rampant red code virus. Network bandwidth is heavily occupied after the worm is infected, resulting in network paralysis, which exploits the buffer overflow vulnerability of SQL SERVER 2000, which resolves port 1434, to attack its ne
Sometimes when anti-virus software processing virus program, will result in double click Hard disk Letter open, right click to appear, such as auto words, such as the occurrence of such a situation with the system master record of the configuration file Autorun.inf.
Interpreting Autorun.inf
Because the computer will automatically search for the Autorun.inf configuration file under the letter directory whe
Many friends are not familiar with the svchost process, sometimes in the task Manager once see a number of this process (the following figure has 6), they think their computer in the virus or trojan, in fact, not so! Under normal circumstances, You can have multiple Svchost.exe processes running at the same time in Windows, such as Windows 2000 with at least 2 svchost processes, more than 4 in Windows XP, and more in Windows 2003, so when you see mult
I checked what Anti-Virus engine I often see in anti-virus software introductions on the Internet. Write down:
It is to use the virus library carried by anti-virus software (which is often automatically upgraded), and compare it
Virus description:
Name: visinPath: c: \ windows \ system32 \ visin.exeCompany: Microsoft CorporationAction Description: New system startup ItemLocation: hkey Local Machine \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ Run
Registry: hkey Local Machine \ Software \ Microsoft \ Windows \ CurrentVersion \ Policies \ Explorer \ Run
Next, a "visin" appears. Please cancel the start of this item. (step: Start-run-Enter "ms
Virus alias:
Processing time:
Threat Level: ★
Chinese name:
Virus type: Trojan Horse
Impact System: WIN9X/WINNT/WIN2K/WINXP/WIN2003
Virus behavior:
Writing tools: VB, Aspack compression
Infection conditions: User accidentally run, or through a floppy disk
Seizure conditions: Users are not careful to run
System Modifications:
The MagicCall.exe th
. A file will be written to the startup Item of the Start menu at the moment of shutdown;
Note that the virus is infected with All executable files (*..
Symptoms after drive Trojan Infection:
1. Slow system operation, frequent crashes, blue screens, and error reports;
2. Two lss.exeand two smss.exe are displayed in the process, and the user name of the virus proc
How is your application replaced? Analysis of App hijacking Virus1. Introduction to App hijacking
App hijacking refers to the redirection of the execution process, which can be divided into Activity hijacking, installation hijacking, traffic hijacking, and function execution hijacking. This article will analyze the recently used Acticity hijacking and installation hijacking viruses.Ii. Activity hijacking virus
In fact, we all experienced webpage virus attacks. For example, after an Internet roaming, we found that the homepage of IE browser was changed to a malicious website, in addition, the default search engine of the browser is also changed to the search engine of the malicious website, and the "Navigator" is attacked by malicious webpage viruses ......
A lot of
Recently, one of the most influential words in the major media may be "pandatv". Why is it so famous for being a technology-Free virus? In the final analysis, I think it is still destructive and the use of existing technologies to achieve rapid dissemination. From the first DOS era to today, viruses are varied. Compile a virusProgramMembers have also evolved from
Love bugs, worm-like script viruses. It is extremely dangerous to the e-mail system. Disseminated through the Microsoft Outlook e-mail system with a message subject "I Love You", containing a virus attachment ("Love-letter-for-you.txt.vbs"). Once this virus attachment is opened, the
Note: Wowexec.exe is a system process, but if preceded by a space, it is a virus.
Wowexec.exe Virus Solution:
1, download Poison PA, and upgrade to the latest virus library, into safe mode, turn off System Restore, killing the virus
The specific methods are as follows:
Slow running of computer system
Under normal circumstances, unless the computer graphics card is too bad, the current computer is running relatively smooth and fast, if just opened the machine, or open the other software is a great card, the computer is ten to one poison.
Csrss.exe is a Microsoft client/server Runtime subsystem. This process manages Windows graphics-related tasks. This program is very important for the normal operation of your system.
Note: CSRSS.EXE is a process that the system must run, but because it belongs to the system browser process, it is not restricted by any
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.