Breaking computer virus mythology analysis of various viruses

xiaoxiao2021-03-06  41

In the eyes of ordinary users, the virus is mysterious, horrible. If you add "Trojan", this is like the myth in the computer world. Unfortunately this myth is not a beautiful ... but the virus, the Trojan is not so "God", but is just a small code. It is the human body than the PC, then the computer virus is bioavity, as long as the "medicine" is pressed, "drug" to the disease. In the eyes of the user, there is only a virus. Trojan is actually our common (web) malicious code, advertising spy, hacker program, etc., let's take a look.

virus

This is the boss of the nose. It is also the most common, but in fact, different division methods of viral also will be divided into DOS viruses, Windows viruses, guiding area viruses, macro viruses, etc., we are not discussing viruses, so I am not coming. After encountering a virus, everyone will not hesitate to use anti-virus software. But sometimes I will find it is not easy, I will say bad.

1, you are the most infected users, anti-virus software is being updated

At this time, users will find some abnormalities in use, but anti-virus software has no reflection. It is the most tricky because the user does not know the virus damage method, as well as counterparts. Most users will think that I have problems in my PC and constantly "test" expect to solve. In fact, this is very wrong!

solution

Unless you can't have it, you should immediately turn off your computer. And immediately contact the manufacturer of safety software yourself, explain the symptoms, waiting for the responses to the relevant personnel. (Under normal circumstances, large vendors will upgrade in 24 hours, and high harmful viruses will be upgraded within a few hours!)

2, the virus can't kill in Windows

This is because the viral infection, the system is being used, and the user is naturally not easy to use in Windows.

solution

Use the software's DOS anti-virus program to enter DOS to kill.

3, after restarting the virus "resurrection"

Most of this is a virus infected with the nature of the guiding area. Since the guiding area is infected by the virus, anti-virus software cannot be completely resolved.

solution

Use the boot disk provided by the anti-virus software or the clean boot disk itself, to reboot the boot and then kill normal.

4, the virus killed after the Internet is "resurrected"

This is because certain viruses use the system's vulnerability to attack. Due to the system, there is no relevant patch, it causes the Internet to re-infect

solution

The easiest way is to play patch. With relevant information, you can also set firewalls (some firewalls will upgrade) users the best time to download patches, don't come out again. However, Microsoft patch always loves new system failures such as slow system speed and crash, how would you hit?

In fact, some viral users will always avoid infection, such as disabling "macro" to avoid "macro virus". Everyone is interested in seeing the post of the fluttering brother, the post :)

Trojan

Sometimes users have hated Trojans, most users' ideas are that the virus is not CiH big, but if the Trojans, their own game accounts, bank accounts, QQ, all the passwords, etc. Bao, this is a silver, some things can not be changed.

Trojans, as well as Trojans have become a social phenomenon of a network. Relevant to all aspects, individual strength is unavoidable. Require user security Internet, but how do users' security settings can only be at home, in the company, in the school, how to ensure safety in Internet cafes users? This is a huge challenge for users, vendors, and even our current security concept!

1, can anti-virus software kill Trojans?

This is a question that many users have, even some Internet cafe administrators insist on anti-virus software without killing Trojans, rather I believe some of the crack Trojan killing tools.

solution

Anti-virus software can kill Trojans! This is no doubt, if there is a condition, there is a need for users to purchase related shared software, but don't use cracks, because I can't say any problems, but at least normal is different. It is necessary to point out important information in Trojans, and the master can find this information through various methods (manufacturers will be more absent, but will be restricted by law), you will clear the Trojan and clear the clues. Related organs have increased difficulty!

2, (web) malicious code

IE setting is modified, some website malicious code even bundle the virus / Trojan, which can be said to use some means of malicious website, and only modify the user's IE to add ourselves. But later, it turns out the virus / Trojan screaming medium.

solution

Use the IE repair software to modify, and use IE's secure patches to make up for related vulnerabilities.

3, advertising spy

This is a blind spot of anti-virus software, and the user can not be aware of, because these voyeur do you have any contact with the privacy in some software (the terms in your installation software are legal Trojan), the start is very hidden, anti-virus software is for them There is no great role.

solution

Use the advertising cleaning software to kill, but some software cannot start normally after killing.

4, hacker program

This is not true hacker, but people who use hacker software. These programs will be used on the so-called "broiler" or "target", including some special use procedures and Trojans (with the opening of the door, the Trojan is everywhere)

These without any so-called technical difficulty, just sharing some of the most basic response methods. Don't let your computer dominate you, and you have to master your computer.

转载请注明原文地址:https://www.9cbs.com/read-55303.html

New Post(0)