"Experimental Purpose"1) Learn about macro viruses2) How to learn macro virus"Experimental principle"Macro viruses are malicious programs written in macro language (VBA) that exist in Word-processing documents, spreadsheets, databases and other data files, such as Office data Processing systems, which use the functions of the macro language to replicate and reproduce themselves in other data documents.There are two types of macros: an inline macro tha
Jiang Min's August 15 virus broadcast: Beware of "Heaven killer" Beware of online game equipment and other information
Jiang min reminds you today that Trojan/PSW is a virus today. lineage. eko "Heaven killer" variants eko and Trojan/PSW. gamePass. tiq, a variant of "online game thieves", deserves attention.
Virus name: Trojan/PSW. Lineage. eko
Chinese name: "Hea
Tool Type: Integrated tools
⊙ operating system: All Windows systems
⊙ Tool Size: 1.95 MB
⊙ Date of submission: 2007-1-1
⊙ number of visits: 1590
⊙ Download Address: Download address
⊙ Tools Introduction The symptoms of a computer infected with the ARP spoofing virus (Trojan) are as follows: The machine starts to surf the internet and constantly sends ARP spoofing messages, Tha
Method One:You can use WinRAR software to open the D:e: F: Wait for a disk to see if there are SES.EXE files on each disk if so, then the Rose virus is modified.The solution is this:In Safe mode for manual antivirus, in addition, I am in the Register, manual search for virus-related files: Sxs.exe, Svohost, Autorun.inf, found after all deleted, each letter is deleted, and then Safe mode running antivirus so
Recently, Sunway Mutant virus rampant, many people were forced to format all the partitions, painstakingly saved data destroyed.The characteristics of this virus is: slow response to the system, playing online games will automatically quit, the hard drive EXE file icon will be changed to "Flower", to Dos with Ghost recovery system failure, if not the overall format, reload system can not solve the problem.T
Mobile viruses are now mimicking the common destructive practices of computer viruses, such as: "The Machine", "Terminate the Application", "derivative variant family", "Wireless Intrusion", "camouflage free software" even "steal the information", the virus invades the handset may cause the file, the telephone book, the message, the photograph as well as the telephone itself operation function to lose. Overall, although mobile phone
"Mail Virus" is actually the same as ordinary computer viruses, only because they are transmitted mainly through e-mail, it is called "Mail Virus", because they generally through the mail "attachment" entrainment method to spread, due to ordinary daily work in the use of e-mail frequently, Therefore, the prevention of mail viruses is very important. To deal with the mail
Next week (2007.09.24 ~ 09.30) a new Virus is particularly worth the user. It is the "LYW (Virus. Win32.LYW. a)" Virus. The virus automatically downloads other viruses and trojans from the Internet to steal users' privacy information.
Follow the virus this week: LYW
Vigila
Recently, a large number of Excel files in the company have discovered an office macro virus. They cannot be killed when using Kingsoft 360. Downloading Kingsoft version's macro virus excludes only part of the virus, another type of macro virus cannot be killed in any way.
Attack symptoms
Office macro
HDM.exe is a vicious u disk virus, its destructive power, mainly in the following areas:Quote:1. Use recovery SSDT to destroy antivirus software2.IFEO Image Hijacking3. Close the specified window4. Delete gho file5. Destroy Safe mode, and Show hidden file function6. Infection HTM and other Web files7. Guess the password is spread through LAN8. Through the U disk and other mobile storage transmission9.arp DeceptionThe specific analysis is as follows:Qu
Jinshan Poison PA 2008 The official introduction of technical information looks very beautiful, the actual face of the virus, and what? Going to get a virus experience. Virus samples are in a forum to get the little ladybird, the virus almost at the same time with panda incense and AV terminator
"A few days ago, the computer panda incense, just the ' national treasure ' away from a few days, today on the Internet to download a gadget, the machine began to slow down, there are several program icon into ' handsome ' head, eyes more prominent like the appearance of the light bulb, estimated again in the virus, really depressed! The user, Mr. Chen reluctantly said.
Jinshan Poison Bully Anti-Virus expe
I haven't met the virus yet. I don't know if it is popular. But I have never seen pandatv before.
Ps: My computer is streaking without even anti-virus
How to kill the popular virus igm.exe VirusIgm.exe virus poisoning symptoms:1. IGM. EXE found in the startup Item of MSconfig2. Automatic startupTo clear the igm.exe vir
Php webpage virus cleanup class, php webpage virus cleanup
This example describes the php webpage virus cleanup class. Share it with you for your reference. The details are as follows:
I believe that many people's webpages are often troubled by adding Trojans in the background of php, asp, html, js and other files for no reason! I used to have a website like this
"Panda incense" virus can not only damage the user system, the result is that a large number of applications are unusable, and all files with an extension of Gho can be deleted, resulting in the loss of a user's system backup file, resulting in a failure to restore the system, and the virus can terminate a large number of anti-virus software processes and greatly
In the computer configuration is not high on the machine, do not install anti-virus software will certainly be much higher efficiency. I do not have antivirus software for more than two years and there is no virus dye body reason. Frankly speaking is the user as the Internet! Instead of being an administrator. Let's say how to use the Internet in user mode.
1, after the installation of the system (includin
First, virus description:
Virus transmission through the U disk, run after copying itself to the system directory and release a gray pigeon Trojan. To enhance concealment, the generated virus files have a recycle Bin and an Ann
Two kinds of icons for loading programs.
Second, the basic situation of the virus:
360 Antivirus virus library How to upgrade? Many people are using the 360 antivirus software. But many people do not know, 360 anti-virus software virus library by default does not install the local engine virus library, namely 360 antivirus virus library not only automatica
Newbie can also deal with virus series Article address: http://www.bkjia.com/Search.asp? Field = Title ClassID = keyword = % D0 % C2 % CA % D6 % D2 % B2 % C4 % DC % B6 % D4 % B8 % B6 % B2 % A1 % B6 % BE Submit = + % CB % D1 % CB % F7 +
Once a friend had a virus on his computer, I went to check it out. It was a QQ virus. Because I had not been surfing the inter
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.