"Stalker" virus (known as Dsound.dll, Ddraw.dll virus). February 1, "stalkers" began to spread, firmly occupy the first place in the virus rankings. "Stalkers" to infect Windows system files Dsound.dll, Ddraw.dll as a springboard, bypassing anti-virus software and online gaming protection system. Once an infected syste
January 25, 2003, the Internet appeared a new high-risk worm-"2003 Worm King" (worm.netkiller2003), its harm far more than the once rampant red code virus. Network bandwidth is heavily occupied after the worm is infected, resulting in network paralysis, which exploits the buffer overflow vulnerability of SQL SERVER 2000, which resolves port 1434, to attack its ne
Virus alias:
Processing time:
Threat Level: ★
Chinese name:
Virus type: Trojan Horse
Impact System: WIN9X/WINNT/WIN2K/WINXP/WIN2003
Virus behavior:
Writing tools: VB, Aspack compression
Infection conditions: User accidentally run, or through a floppy disk
Seizure conditions: Users are not careful to run
System Modifications:
The MagicCall.exe th
The specific methods are as follows:
Slow running of computer system
Under normal circumstances, unless the computer graphics card is too bad, the current computer is running relatively smooth and fast, if just opened the machine, or open the other software is a great card, the computer is ten to one poison.
Love bugs, worm-like script viruses. It is extremely dangerous to the e-mail system. Disseminated through the Microsoft Outlook e-mail system with a message subject "I Love You", containing a virus attachment ("Love-letter-for-you.txt.vbs"). Once this virus attachment is opened, the
There are a lot of friends on the Internet to ask this, Runassrc.exe is what file, in fact, this tool can be any executable file in the form of system services, the file is just a hacker to promote his virus file system services to meet the long-term running of his virus pur
c:desktop_2.ini/f/s/q/A
Del d:desktop_2.ini/f/s/q/A
Del e:desktop_2.ini/f/s/q/A
Del f:desktop_2.ini/f/s/q/A
Del g:desktop_2.ini/f/s/q/A
Del h:desktop_2.ini/f/s/q/A
Del i:desktop_2.ini/f/s/q/A
Del c:desktop_3.ini/f/s/q/A
Del d:desktop_3.ini/f/s/q/A
Del e:desktop_3.ini/f/s/q/A
Del f:desktop_3.ini/f/s/q/A
Del g:desktop_3.ini/f/s/q/A
Del h:desktop_3.ini/f/s/q/A
Del i:desktop_3.ini/f/s/q/A
Echo cleared, complete.
Exit
Use the following one to be immune!
@echo off
ECHO
The virus author is using a Trojan horse to launch an attack on a mobile phone based on the Symbian operating system. It can delete the system program and replace the original icon with a skull image.Miko, director of anti-virus research at F-Secure, said the trojan program called by the anti-virus manufacturer as the
Elk Cloner was the first computer virus known to have been widely spread. Richie Skrenta, a 15-year-old high school student, wrote the virus for the Apple II operating system, which was stored on a floppy disk. When the computer starts a floppy disk infected with Elk Cloner, the virus begins to function and then copies itself to any uninfected floppy disk that
The Pakistani virus is the world's first known virus to be widely popular on PCs, the Brain (C-brain) virus that was born in early 1986, which was written by a Pakistani brother who runs a computer company to sell its computer software for a living. At the time, because of rampant local piracy, in order to prevent the
The name of the Trojan Horse (Trojan) is derived from the Ancient Greek legends (Homer's epic Trojan Horse story, the Trojan Trojan horse is meant to Trojan, that is, the Trojan horse, that is, the story of the Trojan Horse). "Trojan" program is currently more popular
Preparation Tools
Tencent mobile phone ButlerSmart phone One.
Specific steps
1. Install "Tencent mobile phone Butler" in mobile phone and open it, we click on "Security protection-Virus killing page" in Tencent mobile phone Butler interface as shown in the following figure.
2. To the "Virus killing" panel, we clicked on the "Settings" icon at the red box.
3. Then in the Setup Panel will see a "stub
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.