What are the common computer viruses?
According to the virus existence media, the virus can divide into the network virus, the file virus, the boot type virus. Network virus spreads the executable file in the network through the computer network, file viruses infect files on your computer (such as: Com,exe,doc, etc.), boot-type virus infection boot sector (boot) and the system Boot sector (MBR) of the hard
Types of computer viruses
The traditional computer virus classification is according to the infection pattern to differentiate, the following is the various types introduction:
· Boot type
Michelangelo virus, latent for a year, "hard" is to get (this did not read)
· File type
(1) Very standing type
Datacrime II Data Killer-low-order formatted hard drive, hi
With the development of mobile Internet, as one of the largest mobile operating systems today, Android has been used by more and more users. However, due to imperfect market systems and drawbacks, the low quality of applications in the Android Market and the proliferation of junk software and malware have brought great harm to users. Users are faced with huge mobile terminal security issues, and threats such as built-in viruses, information theft, and
With the increasing prevalence of Trojan viruses and the gradual decrease of "rogue software", Qihoo 360 security guard began to focus on trojan detection, removal, and defense, we strive to provide users with the most comprehensive security assistance solutions. Recently, the new version 360 security guard 3.6beta has released a sample library of up to 0.15 million types of Trojans, and added the file crus
After the virus has spread to the target, the virus's own code and structure have changed in space and time, and this virus is called the deformed virus.
We briefly classify the following variants of the variant virus into four categories.
The characteristics of the first type of deformable virus are: the basic characteristics of the common virus, however, after each transmission of the virus to a target, its own code and the previous target of the virus code almost no more than three consecut
Departure: Silicon Valley Power cool guest heaven
If you have experience in Internet cafes or data center management, you must know that virus cultivation is a headache. Most of the current viruses have strong replication capabilities and can be spread over local networks, A large amount of system resources are consumed. If one server is infected with viruses in a local network, and the virus is not immedi
technology for computer viruses
Abstract: Starting from the popular file-type virus, this paper analyzes and introduces a technology to clear computer viruses starting from the file structure characteristics.
Keyword virus infection load execution (EXEC) file prefix segment (PSP) Process
Chapter 1 IntroductionComputer viruses have a long history and have bee
Many people call malware a virus, but this is not accurate from a professional perspective. You may have heard of many words out of virus scope: malware, worms, Trojans, root access tools, keyboard record tools, spyware, and so on. What are the meanings of these words?
These terms are not only used between hackers, but are also widely used in news, network security issues, and technological news. Understanding them helps us understand the dangers.
Malware
"Malware" is short for "malware ". Many
Computers are connected to the network every day. Nowadays, there are countless Trojan viruses on the network, and viruses will inevitably happen one day. So what should we do after the virus? The correct solution can avoid greater losses and minimize the damage caused by viruses. Let's take a look.
I. MediumVirusSymptom
When your computer is infected with
Three methods are used to detect hidden viruses in hard disks and memory, and three methods are used to detect viruses.
In fact, the computer virus is like a person who is ill, there will be some kind of symptoms, the virus will leave marks for infection. Therefore, to detect computer viruses, you also need to be targeted. If something goes wrong, check the viru
The so-called traditional virus refers to the virus of the boot type and the file type. The writing of this virus requires considerable experience in programming and a deep understanding of the DOS operating system, designing a virus usually takes several days to weeks, but on the contrary, it is easy to write the most popular file macro virus. Skilled people can create a virus in dozens of minutes, several virus variants can be made in one day, so writing v
Type 218.197.192.254 00-01-02-03-04-05 static at this moment, if the type changes to static, it will not be affected by the attack. However, it should be noted that the manual binding will expire after the computer is shut down and restarted, and you need to bind it again. Therefore, to completely eradicate the attack, only computers infected with viruses in the CIDR block should be found to prevent viruses
software used must have the function of killing both types of viruses at the same time.
The above is based on the virus infection object. If we divide the virus by the degree of damage, we can divide the virus into the following types::
A. benign virus
These viruses call them benign
enter, it is also relatively fast.
4. Open the registry, set the CheckedValue on the Right of hkey_local_machinesoftwaremicrosoftwindowscurrentversionpoliceradvancedfolderhiddenshowall to 1, and then you can open the hidden file. Use winrar's viewing function or use the resource manager to delete the 8-bit random number. dll and autoruns under a partition directory, and delete C: PROGRA ~ 1COMMON ~ 1 micros ~ An 8-bit random number in 1 MSINFO. dll and 8-bit random number. dat. delete the tempo
, some Internet viruses can infect almost all office files, such as Word, Excel, and email. The attack methods have also changed, from the original deletion, modification of files to the current file encryption, theft of user useful information (such as hacker programs), etc, the transmission path has also experienced a qualitative leap, instead of being limited to disks, but through a more concealed network, such as e-mails and e-advertisements.D. Co
[News collection on the IT168 Forum] There are many ways to detect viruses. Today we will teach you four tips!
Search Method
This method scans the specific strings contained in each virus. If a specific byte string is found in the detected object, the virus represented by the byte string is found. Foreign countries refer to this virus scanning software working by search method as "virus ". This virus scanning software consists of two parts: a virus co
and the original backup still needs to be further verified to find out whether the computer virus is the cause or the DOS data is accidentally caused, such as sudden power outages, program runaway, and malicious programs. These analysis methods will be used later to check the nature of the changed part of the code to confirm whether there is a virus.
Search Method
This method scans the specific strings contained in each virus. If a specific byte string is found in the detected object, the virus
Virus writing is a kind of advanced technology. Real viruses are generally contagious, hidden (also known as latent), and destructive. There are also many types of viruses, such as viruses that infect executable files and macro viruses. However, the most destructive virus is
Many times, you have used anti-virus software to find out your own machine, such as Backdoor. rmtBomb.12, Trojan. win32.SendIP. 15. Wait for a string of virus names with numbers in English, and some people will be disconnected. How do you know what the virus is like?
In fact, as long as you know the naming rules of some viruses, you can determine some public characteristics of the virus by using the virus name in the report of anti-virus software.
In
This article introduces the scientific, systematic, and rigorous classification methods of computer viruses.
As we all know, viruses are actually human-prepared malignant programs. Computer viruses have scientific, systematic, and rigorous classification methods. We will introduce them to you:
Based on the damage ability of the virus, it can be divided into the f
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.