1 --- there are many types of viruses, but the virus can be divided into Boot virus, file virus, and hybrid virus based on the virus infection target.
2 --- boot virus, for a floppy disk, there is usually a section called DOS boot
Why the network virus with stand-alone version can not be completely eliminated? Mainly because the network virus has its unique network characteristics. At present, the network virus does not have a standard concept, but for the LAN can be transmitted in the virus, collectively known as the Network
Some manifestations of viral infection
How do we know about the virus in the computer? In fact, computer poisoning and people are sick, there are always some obvious symptoms show. For example, the machine runs very slowly, not on the network, anti-virus software can not be born, Word documents can not open, the
Often on unknown sites, the use of unknown mobile hard disk, enabling remote control or resource sharing will easily infect the virus, how to know whether the computer infected with the virus?
Virus Infection Diagnosis
1, press Ctrl+shift+delete (simultaneously press this three key), bring up the Windows Task Manager
Computer Virus on Planet PandoraProblem Description Aliens on Planet Pandora also write computer programs like us. Their programs only consist of capital letters (' A ' to ' Z ') which they learned from the Earth. OnPlanet Pandora, hackers make computer virus, so they also h
Nowadays, the use of computers in our lives is a common phenomenon, life is already a part of most people's lives, work, life, learning to use the computer, but the computer in our life is increasingly important at the same time, for us, the risk is constantly increasing, the computer with our use of it at the same time, Constantly record our privacy information,
Computer Virus on Planet PandoraTime limit:6000/2000 MS (java/others) Memory limit:256000/128000 K (java/others)Total submission (s): 2480 Accepted Submission (s): 688Problem Description Aliens on Planet Pandora also write computer programs like us. Their programs only consist of capital letters (' A ' to ' Z ') which they learned from the Earth. OnPlanet Pando
January 14,200 2 | 0 comments How does a computer virus scan work?
Geoff kuenning, a program sor of computer science at Harvey Mudd College, provides this explanation.
Malicious Software comes in several flavors, distinguished primarily by their method of propagation. the two most pervasive forms are viruses and worms. A
25 years ago, a 15-year-old student wrote the world's first computer virus. At first, it was just a "little prank", but now tens of thousands of viruses have become a nightmare for all computer users, the arrival of the Internet era provides a new mode for virus transmission. The Associated Press reported that Ricky
Word prompts "enable macro "? Be careful when computer files are encrypted by the Locky fraudster Virus
If you prompt "the macro has been disabled" when you open the Word document, do not click "enable content! Recently, a type of Locky scam virus is prevalent. It is parasitic in Word documents. Once macros are enabled, files, images, videos, music, and other im
Conventional:In safe mode, use antivirus software to disinfect.Safe Mode only loads system core processes and some hardware-driven processes.Restart the computer, press F8 on the boot to enter the selection interface, the upper and lower keys to select Safe Mode. Special case, the computer is an ASUS motherboard desktop, when the boot press F8 incredibly entered the ASUS Motherboard Setup interface.Workarou
Many of my friends, if they find their computers poisoned, will only be panic and complain in the computer. In fact, we should take some urgent measures calmly at this time. Next, let's work with the editor to learn some emergency techniques!Computer
1. Do not restart.
Generally, when an abnormal process is found, an unknown program is running, or the computer
Viruses will always find ways to invade our computer to sabotage, although you can use anti-virus and other software, but also must not ignore the usual prevention work. "Resist outside the country" is the most ideal, so we suggest that we should use the "prevent first" principle to deal with the virus. The following anti-vir
, transmitted over the network, dependent system: WIN9X/NT/2000/XP.
After running the program, the virus will steal the user's QQ number and password and send it to the hacker, which may cause the user's personal information leakage. The virus also downloads files from the network to infected computers and terminates the running of multiple anti-virus software.
Free High-Performance Computer Systems linux and BSD without virus-Linux general technology-Linux technology and application information. The following is a detailed description. Linux and BSD are like pure girls. You have a crush on it, and you want to have it! Open-source linux and BSD systems deal with viruses. The first open-source system requires 30-60 minutes to compile the kernel source code. No
As long as the virus is infected, the computer system will always appear abnormal phenomenon. When these phenomena are discovered, the system should normally be suspected of being infected by viruses. Here are some common anomalies:
The primary boot area, boot sector, file allocation table, or root directory of the disk are modified.
The length or content of the system file has changed.
The disk has a fi
Any computer or computer network is infected with a virus. As soon as the time is ripe, the virus will be activated. An activated wrist virus can harm a computer or network system.
The harm of
U disk has a small, brisk, reliable, easy to operate and other characteristics, in our life and work widely used, especially when the computer installed system, more is the use of U disk to complete. However, if you insert a virus into your computer, you will be in danger of computer security.
The
The specific methods are as follows:
Slow running of computer system
Under normal circumstances, unless the computer graphics card is too bad, the current computer is running relatively smooth and fast, if just opened the machine, or open the other software is a great card, the computer is ten to one poison.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.