Red Alert of "Red Code"

zhaozj2021-02-17  55

Since the "Happy Time" virus brings a nervous May, people have just calmed a month, the anti-poison alert once again, "red code" powder is debut. This kind of virus that is considered to bring the largest network crisis in history, in the first large-scale explosion on July 19, infected 250,000 units of computers. By August 1st, the computers of infected viruses have reached more than 300,000; until August 1, the virus has caused 1.2 billion US dollars in the world.

"This network worm has a unprecedented threat to national security and economy." Director of the FBI National Infrastructure Protection Center R. Dick said. More skilled is that "red code" virus has now produced a variety of varieties, such as "Red Code II, III". The waves of the Yangtze River push the waves, and a wave is more than a wave. "Red Code" Not only is it just to use the server to transmit spam. This way is blocked. It also extends to your personal computer, open a "back door" on your computer - your computer you buy, you Various secrets may be used by others, peep! "This makes anyone who wants to enter this computer to succeed." Computer security expert Rusuke said, "Any people who have found flaws can be." Since then, each of the world can be connected to the computer, " It will not be safe to say.

Not only that, from the information of the media broadcast information, this virus's offensive, such as Haohao Spring, It seems that there is no sign.

More terrible than viruses, is numbness of people.

According to reports released by the International Computer Security Association, although the anti-virus software installation rate of the interviewed enterprises has greatly improved, the survey data shows that more than 160 dyeing is still in average 300 companies accepted by the survey. The event occurred, and the number of viral infections per thousandth computers in 1996 continued to increase, an average of 22 times average. After dye, 7 companies need to shut down 19 hours, and spend 10 working days to remove viruses and repair computers. For the viral influence, it has the greatest impact on "loss of productivity", accounting for 70%, damaged document data, and users cannot use 50% of the computer, 49% of information, and 44% loss of information.

On April 26, 1998, a virus called CIH began to spread globally. Start, no one didn't take it to the event, however, by April 26, 1999, CIH began to show its 狰狞. According to statistics, only hundreds of thousands of damaged computers in China, hardware damage, data loss, and heavy damage.

This seems to still have to attract enough attention. On April 26, 2000, CIH roll was coming, and there were more than 100,000 computers in China by CIH.

More decentralized, 2,0001, in April, each media began to remind people to be vigilant, but after two years of expensive tuition, only my country, according to statistics, infected people still reached 5000 Many cases. The surface seems to be less and less, but this reduction is not enough to be optimistic. Among the infected people in 2001, more than 80% are small and medium-sized enterprise users and computers, finance, postal departments, government agencies, education, scientific research institutions, etc., personal users only less than 20%. In the investigated crowd, the number of users who had infected with viruses accounted for 73% of the number of people surveyed. Among them, the user of the infected virus is as high as 59%.

Infection rate, even the re-infectivity rate is high, what did you explain?

If the generation of these phenomena is incared to the backwardness of the anti-drug software, it is unfair. Every virus warning, the anti-drug manufacturers have launched the prevention measures in time, even "Red Code" that causes a large-area server "death" to the use of Windows defects, Microsoft also released the patch. However, although the vulnerability has been found for more than a month, how much is the system administrator of the installation patch? Perhaps, "Hacked By Chinese" in "Red Code" and only attacking English sites do not provoke Chinese sites, bringing us paralysis.

When I saw the Americans were busy with a mess, we have forgot to fix their own hospital walls. Soon, the disaster is coming. According to reports on August 1, when the red code just started to attack, most of the infected computers in the United States, but now there are about 75% -80% of the infected computer in Asia, in addition to South Korea, China is also a hardest hit area. - Once the box is opened, Pandora has no choice but to the disaster.

Zhi Yong is more sleepy, and the disaster is in a slight.

On July 27, the author received a friend's email, the title of the mail is "Please leave", the content is as follows "Hi! How are you? I send you this file in Order to have your advice see you latler. Thanks" , The email also has an attachment named "Request of leave .doc.bat". The inexplicable content and the BAT extension immediately caught the author's vigilance. For the sake of insurance, the author sent an email confirmed this. The next day, my friend replied that he was infected "Mr." worm ...

Later, in the forum, many infected crying is added.

Doubt everything, including your friends! Although this is not listening, it is truth in the network security, and the above case has a universal revelation.

However, curiosity often makes us have a big fearless courage. Our company, unit, agency, etc., but not only this curious, but also neglecting network security. Once bitten, twice shy. The question is, if you are not bitten by a snake? Do you have to be alert after you have to bite, even if you are bitten, then you can bite it?

Although we are shouting informatization, our information is not developed to fertilizers and hackers. The network is just a furnish, but also there is no media report for the "hacker invasion for a minute to reach 20,000 US dollars". Therefore, there is a soft pillow with soft pillow - meat The cave will hurt the little call. As soon as it is a dress, it is a big touch, and it is nothing to throw away.

When the red alarm is pulled, how many people still dream?

转载请注明原文地址:https://www.9cbs.com/read-29583.html

New Post(0)