Computers are connected to the network every day. Nowadays, there are countless Trojan viruses on the network, and viruses will inevitably happen one day. So what should we do after the virus? The correct solution can avoid greater losses and minimize the damage caused by viruses. Let's take a look.
I. MediumVirusSymptom
When your
the function of the system to propagate, according to its different algorithms can be divided into: exercise-type virus, the virus itself contains errors, can not be very good transmission, such as some viruses in the debugging phase.
Secretive viruses they generally do not directly modify DOS interrupts and sector data, but through the device technology and file buffer, such as DOS internal modification,
technology for computer viruses
Abstract: Starting from the popular file-type virus, this paper analyzes and introduces a technology to clear computer viruses starting from the file structure characteristics.
Keyword virus infection load execution (EXEC) file prefix segment (PSP) Process
Chapter 1 IntroductionComp
, then the normal program is transferred to the memory. Currently, most file-type viruses belong to this category.
With some basic knowledge about viruses, we can now check whether your computer contains viruses. To learn about these, we can use the following methods to determine.
1. Scanning of anti-virus software
Author: Fresh sunshine (Http://hi.baidu.com/newcenturysun)Date: 2007/08/11 (reprinted please keep this statement)I. Personal Computer Security Status Quo Analysis1. virus killing anti-virus software is no longer a new thingSince the orange s in the S, the virus has been frantically infected with antivirus software. The cases of antivirus software being killed are not uncommon. The popular pandatv incense at the beginning of this year and the recently
A variety of viruses today can be regarded as a blossoming, make a panic, once found that their computer is a bit abnormal to identify the virus in the mischief, everywhere looking for anti-virus software, a no, and then one, in short, it seems not to find "culprit" just like, the result of virus software is used one after another Perhaps for this the renminbi is used one after another, or not see the "culp
I think there may be problems in the article. I hope you can give me more advice. I will update the article before the Spring Festival and publish the full version. There will be some processes, services, and other things that need experience to be explained. They are all for beginners and persons who want to learn. I hope these experiences can help you, you can communicate with me in the forum or send emails. Thank you.To answer this question, no matter what the virus is, paste the log to let e
virus is very rapid. Like Code Red, it resides only in the memory of the attacked server.
10.MyDoom (2004)
Another worm Mydoom (also known as Novarg) left a backdoor in the user's operating system in February 2004. The virus uses a combination of viruses and spam tactics that can quickly spread through the corporate e-mail system, causing a surge in the number of messages and blocking the network. Like o
Comments: Worms are common computer viruses. It uses the network for replication and transmission, and the transmission path is through the network and email. A worm is a self-contained Program (or a set of programs) that can spread copies of its own functions or some part of it to its worm.In his computer system (usually through a network connection ). Note that
The origins of computer viruses
The concept of computer viruses actually originated quite early, and in the years before the first commercial computer appeared, the pioneer of computer Neumann (John Von Neumann) in one of his pap
In today's network society, computer viruses, Trojans, and rogue software pose a great threat to the security and stability of computer systems. How to effectively detect and remove viruses, Trojans, and rogue software from our computers has always been an important topic in the anti-virus field.The general methods of
Why cannot I completely clear Network viruses with a single-host version? This is mainly because the network virus has its unique network characteristics. Currently, there is no standard concept for network viruses, but for viruses that can be transmitted within the LAN, they are collectively referred to as network viruses
.
2. File type computer virus
File-type computer viruses, also known as parasitic viruses, typically infect execution files (. EXE), but some can infect other executable files, such as DLL,SCR, etc. ... Every time an infected file is executed, a
Intelligent defense against unknown computer virusesJinzhou [est_vip] 2006.8.21I. Introduction.2. Basic Structure of VirusesIii. Intelligence4. Intelligent implementationV. Thanks and referencesOverview.With the popularization of the Internet, viruses will become more and more harmful to individual users. The main harm of the Jinzhou sensory virus is: 1. Its harm to the system. Some launch models are infect
, other virus processes will immediately create the terminated process.Solution: scan and kill in security mode.
2) use the virus code injected into the system process as mentioned above to protect the virus process.Solution: Same as 3.
3) the virus is started as a system service, so we cannot terminate it through the task manager.
Solution: stop the virus service first, and then completely scan and kill the virus.If you cannot see or stop the virus service, you need to handle it in securi
All kinds of viruses have been put together today. Once you find that your computer is abnormal, it is regarded as a virus, and anti-virus software is everywhere, in a word, it seems that we cannot find the "culprit". As a result, the virus software has been used one after another. Maybe the RMB has been used one after another, or no trace of "culprit" has been found, in fact, this is not necessarily a viru
file is generated after virus file instead of virus infection. In this case, only isolation or deletion measures can be taken, because the file contains only virus code and there is no clearing problem.
The virus uses some special methods to infect files and processes the infected files. So that the anti-virus software cannot effectively restore the original file. However, it does not rule out the possibility of cleaning with the improvement of anti-virus software.
9. What are the common types
If the virus is to be transmitted, it must leave traces. Biomedical viruses are the same, so are computer viruses. Detection of computer viruses, it is necessary to go to the site of the virus to check, find abnormal situation, and then identify "in", confirm the existence o
items. Windows XP run Msconfig also play the same role. With the accumulation of experience, you can easily judge the start of a virus.
4, in the browser to determine the Internet. A burst of Gaobot virus, can be on yahoo.com,sony.com and other sites, but can not visit such as www.symantec.com,www.ca.com such a well-known security manufacturer's website, installed symantecNorton2004 anti-virus software can not upgrade the Internet.
5, unhide the pr
of the virusComputer viruses generally include the boot module, infection module, Performance (destruction) module three modules, but not any virus contains these three modules.Workflow for virusesSource of infection: The virus is attached to some storage media.Vectors: vectors are determined by their working environment, possibly a computer network, or removable storage media, such as a USB flash drive.Vi
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.