Discover top 10 computer virus names, include the articles, news, trends, analysis and practical advice about top 10 computer virus names on alibabacloud.com
The virus registers itself as an NT service in order to boot up:
[Tomdemoservice/tomdemoservice] [Running/auto Start] Delete method:
1, first delete the file can be considered tools POWERRMV or XdelboxC:\CONFIG. Exe
C:\CONFIG.dll is ignored if it does not exist.
C:\CONFIG_key.dll is ignored if it does not exist.
C:\CONFIGhook.dll is ignored if it does not exist.
C:\CONFIG.log is ignored if it does not exist.
2, restart the
that the virus is a MS Word macro virus, copy the "normal. dot" file in the C: Program FilesMicrosoft OfficeTemplates directory and all the files in the C: Program FilesMicrosoft OfficeOfficeStartup directory to the floppy disk.
If you suspect that the virus is a Microsoft Excel macro virus, copy all files in the XLST
family. For example, the family names of the famous CIH virus are unified "CIH ", in addition, the family name of the recently popular wannacache worm is "Sasser ".
A virus suffix is a variant of a virus. It is used to distinguish a variant of a specific family of viruses. Generally, 26 letters are used for representa
Jiang Min's August 10 virus broadcast: Beware of the account and password of online game thieves "Perfect World International Edition" Players
Jiang min reminds you today that among today's viruses, Trojan/PSW. GamePass. tip "online game thieves" variants tip and TrojanDownloader. Small. lge "Small dot" variants lge deserve attention.
Virus name: Trojan/PSW. Game
continuously, compete with normal programs for system control and disk space, constantly damaging the system, resulting in paralysis of the entire system. The virus code is well-designed and short.10. Virus vigilanceThis feature provides some good idea with a shortcut to create new viruses.According to the analysis of the co
boot the computer with viruses, and then run the following command:
A: \> fdisk/mbr
A: \> sysa: c:
If the files with viruses are in SUHDLOG. DAT or SUHDLOG. BAK, delete them directly. This is a backup file used by the system during the installation of the boot area of the hard disk. It does not work normally and the virus does not work in it.
5. The extension names
Virus Information Archival:
========================================
Xinhuanet, Beijing, September 11, February 20, a camel Trojan download tool, CAP (Trojan. DL. win32.mnless. CAP) "the virus is worth noting this week. Its authors are a bit superstitious. Even the names of the released virus files are" 98989898 (w
, Internet and BBS have been widely used, making it possible for domestic and foreign viruses to spread widely and quickly. These international computer information dissemination media are potential sources of virus viruses and tubes (of course, these network systems also have a highly secure anti-virus/Anti-Virus Syst
This article is mainly to share with you how to hide the computer letter name and folder names of the small tips, these two tips simple and not simple, interested friends, as long as the following graphic demonstration to do several times, I believe that can soon learn, I hope to give you more practical computer skills. Let's take a look at this
1 --- there are many types of viruses, but the virus can be divided into Boot virus, file virus, and hybrid virus based on the virus infection target.
2 --- boot virus, for a floppy disk, there is usually a section called DOS boot
Liu Tianyi, rising senior anti-virus Engineer
Question 1: What will happen after computer poisoning?
A: Recently, all the stock speculators have begun to pay attention to network security issues. If the computer is poisoned, it is often seen that the computer is slow and some operation functions cannot be used, such
-virus software.
9, Norton Anti-virus software 2016
Norton Antivirus 2016 fully compatible with Win8.1 Norton Antivirus 2016, five layer patent protection layer for security, performance, and availability, it will provide users with a more comprehensive protection, to help existing devices meet new threats without impacting performance.
The Norton Norton Antivirus 2014 Free Edition is a professional ant
Some days ago a classmate computer infected with a ferocious virus, looking for me to see, the scene is very solemn and tragic: the bottom right corner of the screen is constantly popping bad ads, the system icon part of the changes, more computers out of many programs, CPU occupancy rate 100%, the mouse keyboard is almost unusable.The process of antivirus is time-consuming, from
chat, especially those QQ virus carriers, because they automatically send messages, which is also the obvious characteristics of their poisoning.
8, close useless applications, because those programs will often constitute a threat to the system, but also occupy memory, reduce the speed of the system.
9, install the software, remember not to install its carry software, especially rogue software, once installed, want to delete all deleted, generally
into details about using one-click Ghost backup.
(4) Clear suspicious and virus-loaded services
Run the command again to start the autoruns program. In the autoruns main window, click "Services", as shown in 3. You can see many Services that cannot find files, some names are very similar to normal service names and files. They delete suspicious services and
, that is
MoV 01
MoV indicates [Move], that is, moving. it writes (shifts) the [0] contained in the address to the next address. After the inpu expands, every line of commands in the computer is changed to [mov 01]. in other words, a lot of [mov 01] is left on the fluorescent screen. [Gemini] (germini) is also an interesting guy. it has only one function: copy it by yourself, send it to the next one hundred addresses, and then discard the [original].
Why the network virus with stand-alone version can not be completely eliminated? Mainly because the network virus has its unique network characteristics. At present, the network virus does not have a standard concept, but for the LAN can be transmitted in the virus, collectively known as the Network
Many people think that the virus can be completely cleared if the operating system is re-installed. However, I do not know that after the operating system is re-installed, due to security settings and patch installation failure, the virus is most likely to be infiltrated, therefore, some necessary supplementary measures are critical.
1. Do not rush to access the network
After Windows is installed, do not im
that data is written to the wrong disk area.
(10) format a specific track for an entire disk or disk.
(11) The system hangs, causes the display screen or the keyboard blockade state.
(12) affect the normal operation of the memory resident program.
(13) Change the system's normal operation process.
(14) to steal important data about the user.
In short, a virus is a program that can do all the things a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.