Joke Collection Website - Blessing messages - Is there a difference between mobile phone virus and computer virus?

Is there a difference between mobile phone virus and computer virus?

Let's have a look first.

In fact, mobile phone viruses, like computer viruses, can be executed by computers and send text messages to mobile phones. Strictly speaking, mobile phone virus should be a computer virus, which can only spread on the computer network and not through mobile phones. So the so-called mobile phone virus is actually a computer virus program, which starts the service of a telecom company, such as the function of e-mail to SMS, and it sends files to the mobile phone, which is not destructive at all. Of course, some mobile phone viruses are quite destructive. Once attacked, they may be more powerful than PC viruses and spread even faster than "I love you" viruses. Viruses that attack mobile phones on the Internet will automatically start the phone recording function and send the recording everywhere. The virus will also automatically make calls, delete the contents of files on the mobile phone, and create huge phone bills. Because some mobile phone viruses spread from automatic calls, because the mobile phone network connection is too good, it has a wider impact than computer viruses, and in the future, with the more complicated design and diversified functions of mobile phones, the disasters caused by viruses will be wider.

In addition, because the mobile phone has other data communication methods, such as SMS and WAP service, on the one hand, it can really bring convenience to us. Just press a few keys to change the LOGO and download your favorite ringtone. But it is these functions that can be written into the instructions of the system or memory. The saboteur only needs to find out the loopholes, send out poisonous short messages, change the machine code of the system with assembly programming, hide the instructions in the memory, then open the phone book of other mobile phones, spread the virus wildly, attack and destroy the boot system of mobile phones within a certain period of time.

2, mobile phone virus attack mode

Now many mobile phone users are worried that WAP phones will become an important target of hacker attacks. Because it is easier to attack WAP phones directly through the network than GSM phones. In this regard, some experts pointed out that because this technology is very difficult, and most mobile phone network operators have set up security systems in WAP servers and "gateways", ordinary users basically don't have to worry.

If a hacker attacks a mobile phone, there are usually three ways: one is to attack the WAP server, so that the WAP mobile phone cannot accept normal information. The second is to attack the control "gateway" and send spam to mobile phones. The third is to directly attack the mobile phone itself, making it unable to provide services. This failure mode is relatively difficult, but the current technical level is still difficult to achieve.

Based on the above attack means, all products related to computer information system network, such as WAP mobile phone, will face new security requirements. All this at least tells us that the demand for anti-virus products based on WAP "gateway" has emerged, and relevant mobile phone manufacturers and telecom companies should put this issue on the agenda. For WAP mobile phone users, we should always pay attention to new information to prevent problems before they happen.

3. The main types of mobile phone viruses

At present, six viruses have appeared in the market, namely:

A, the first one is "EPOC _ alarm", which always gives a warning sound continuously, although it is harmless, but it is also quite annoying;

B, the second one is "EPOC_BANDINFO". A ",when it breaks out, the user information will be changed to" someone's book ";

C, the third one is "EPOC _ fake. A ",the picture when formatting the built-in hard disk will be displayed on the screen of the mobile phone, so there is no need to panic, because in fact, the mobile phone will not format;

D, the fourth part is EPOC _ Ghost. A ",the words" Everyonehatesyou "will be displayed on the screen;

E. The fifth is "the light of EPOC". A ",which will keep the backlight flashing continuously;

F, the sixth song is "EPOC _ Loneliness". A ",can make the keyboard operation invalid; Wait a minute.

Of these six viruses, the first five are not very harmful and have a mischievous taste, but the sixth virus "EPOC _ loneliness". "It is a kind of malignant viruses. When the computer executes a program with virus, it will display the picture displayed when the infrared communication receives the file, and the virus will quietly hide in the memory at this time. When the virus sets up camp in the memory, it will display the message "Warning-Virus" on the computer screen, and then the mobile phone will not accept any keyboard operation. When found, you can enter "leavemealone" to remove the virus.

4. Measures taken against mobile phone virus

A, turn off the garbled mobile phone

When the other party calls, the original screen should show the calling number, but other words or strange symbols are displayed. In this case, the receiver should not answer or turn off the phone immediately. If you answer the call, you will be infected with this virus, and all new terms and settings in the machine will be destroyed.

B, try to download information from the Internet as little as possible.

If the virus wants to invade, it is not so easy to break through the protection system of mobile phone short messages, go through complicated coding procedures and then transmit them on the mobile network. However, with the arrival of 3G, mobile phones tend to be small computers, and there will be mobile phone viruses if there are computer viruses. Let's be more careful!

C, pay attention to the virus that may exist in the message.

Sending and receiving short messages is becoming an important way of mobile communication, but short messages are also an important way to infect mobile phone viruses. The news revealed at the Asian Anti-virus Conference last year showed that the development of mobile phone virus has shifted from incubation period to destruction period, which has attracted attention from all walks of life. Once a mobile phone user receives a short message with a virus, it will lock the keyboard of the mobile phone after reading it, and even destroy the vicious mobile phone virus such as the IC card of the mobile phone.

D, killing mobile phone viruses. At present, there are two main technical measures to deal with mobile phone virus: one is to disinfect mobile phones through wireless websites; The second is to kill viruses through the IC access port or infrared transmission port of the mobile phone.

Of course, the mobile phone virus has not reached that terrible level at present, because the current digital processing ability (capacity and operation) of mobile phones is not strong enough to handle and spread the virus independently. Therefore, viruses can only harass mobile phones through computers, WAP servers and WAP gateways, and it is technically very difficult to destroy the mobile phone itself (destroying smart cards, dialing indiscriminately, etc.). ).