Joke Collection Website - Blessing messages - The Solution of Computer Virus Spreading
The Solution of Computer Virus Spreading
According to the analysis of the current virus characteristics, there are two modes of transmission, one is through the network, and the other is through hardware devices. First of all, let's look at the ways and solutions of network communication. Network communication is divided into Internet communication and LAN communication. In the era of network information, Internet and local area network have been integrated into people's life, work and study, and become an indispensable part of social activities. In particular, the Internet has been increasingly used to obtain information, send and receive files, receive and publish new messages, and download files and programs. With the rapid development of the Internet, computer viruses have also embarked on the road of high-speed transmission, becoming the first transmission route of computer viruses. 1. internet communication: the internet is convenient and fast, which not only improves people's work efficiency, but also reduces operating costs, and is gradually accepted and widely used by people. Business mail, as well as browsing the web, downloading software, instant messaging software, online games, etc. , all through the Internet. Such frequent use is bound to be "favored" by viruses. Spread by e-mail: Today, with the increasing popularity of computers and networks, business Unicom uses e-mail more, and the virus has also found a carrier. The most common way is to exchange documents in Word format through the Internet. Due to the extensive use of the Internet, its spread speed is quite rapid. E-mail carries viruses, Trojans and other malicious programs, which will cause the recipient's computer to be attacked by hackers. Newsgroup, file server, FTP download and BBS file area of e-mail protocol are also the main forms of virus transmission. Virus makers often upload files with viruses to FTP and BBS, and usually send them to different groups in groups. Many viruses will pretend to be new versions of some software, even anti-virus software. Many virus epidemics infect thousands of computers at the same time in this way. BBS is a communication website spontaneously organized by computer enthusiasts. Because it is easy to go to the site and has less investment, it is very popular with the public. Users can exchange files (including free software, games and self-compiled programs) on BBS. Because BBS stations generally have no strict security management and restrictions, it provides a place for some virus programmers to spread viruses. The BBS station in the city spreads through the central station, which has a wide spread. With the popularity of BBS in China, new media have also joined the spread of viruses. Expert tip: Cultivate good safety awareness. Don't easily open strange emails and attachments of unknown origin, even the emails of relatives and friends should be more careful. Spread through browsing the web and downloading software: Many netizens have encountered such a situation. After browsing a web page, the title of IE has been modified. Every time IE is opened, they are forced to log in to a fixed website, and some of them are forbidden to resume. This is malicious code at work. When your IE is modified, the registry can't be opened. After booting up, IE opened the window crazily and was forced to install some software that you didn't want to install. Even when you visit a web page, your hard disk may have been formatted ... then unfortunately, you must have been poisoned by malicious websites or malware. When you visit some unhealthy websites or enter some hacker websites by mistake, while visiting these websites or clicking some links or downloading software, some spyware will be automatically installed in your browser or system. These spyware programs can let your browser visit their websites from time to time, or intercept your private information and send it to others. The function of "Blocking Malicious Websites" uses built-in default and free addition to determine the list of malicious websites, identify the addresses of malicious websites, and effectively intercept viruses and Trojans infected by malicious websites. At the same time, with the daily automatic upgrade of Guanghua antivirus software, the list of malicious websites will be constantly updated, so there is no need to worry about the limited number of websites in the list. "Green Internet access function" can shield all kinds of malicious components in the process of surfing the Internet, avoid the interference of spyware and advertising software, and truly realize free roaming of your network. Reject Malware: Click the menu "Tools → Plug-ins → Green Internet Access" in Guanghua Antivirus Software to open the window of green Internet access plug-ins. Similarly, for different types of malware, Guanghua made a detailed classification for us, including domestic, foreign, chat, security, games and so on. We click on the components that we want to block in the corresponding classification, so that we can block all kinds of malicious components in the process of surfing the Internet and avoid interference from spyware and adware. "Close IE advertising window" can ban pop-up advertisements on some websites, which makes you more worry-free when surfing the Internet with IE. Tip: Don't just log on to those tempting small websites, because these websites are likely to have network traps. Don't download the software and programs of small websites easily. The downloaded software needs to be checked before installation and use to ensure that your computer is always in a safe environment. Spread through instant messaging software: Instant messaging software (IM for short) can be said to be the software with the highest usage rate among netizens in China at present, and it has changed from a pure entertainment and leisure tool to an essential tool for life and work. Due to the huge number of users and the security defects of instant messaging software itself, such as the built-in contact list, viruses can easily get the spread target, and these characteristics can be used by viruses to spread themselves, leading to their attack targets. In fact, the notorious virus worm Klez, which caused tens of billions of dollars in losses, was the first vicious worm that could spread through ICQ. It can traverse the contact list in the local ICQ to spread itself. Moreover, more viruses that pose security risks to instant messaging software are still being discovered one after another, and there is a growing trend. Up to now, hundreds of viruses have spread through QQ. P2P (peer-to-peer network technology) allows users to directly connect other users' computers for file sharing and exchange. Every day, thousands of netizens around the world exchange resources and share files through P2P software. Because this is a new technology, it is not perfect, so there are great security risks. Because it is easy to use without a relay server, many virus makers begin to write viruses that rely on P2P technology. Tip: When chatting, you receive suspicious information from friends. Don't click on it at will. You have to make sure it's from a real friend first. To prevent viruses from spreading through IRC, we should also pay attention not to download suspicious files from unfamiliar websites and execute them at will, and not to easily receive files sent by other users of IRC channels to avoid computer damage. Spread through online games: online games have become one of the main activities of the network at present, and more people choose to enter games to ease the pressure of life and realize their self-worth. It can be said that online games have become an indispensable thing in some people's lives. For gamers, the most important thing in online games is virtual items such as equipment and props. With the accumulation of time, these virtual items will become things with real value, so there is a transaction of these virtual items, which leads to the phenomenon of stealing virtual items. If some users want to illegally obtain users' virtual goods, they must obtain users' game account information. So at present, the security problem of online games is mainly the problem that the game number is stolen. Because online games can only run through computers and connect to the network, Trojan horse is the most effective weapon to steal players' game accounts and passwords, and Trojan horses specialized in stealing online game accounts and passwords are also emerging one after another. This kind of offensive weapon is regarded as the favorite by novice hackers and network security experts. Second, the local area network communication local area network consists of a group of interconnected computers, which is the need of data sharing and mutual cooperation. Each computer forming a network can be connected with other computers, and data can be sent from one computer to other computers. If the data sent is infected with computer virus, the computer of the receiving party will be infected automatically, so it is possible to infect the computers of the whole network in a short time. The application of LAN technology has made great contributions to the development of enterprises and paved the way for the rapid spread of computer viruses. At the same time, the security risks brought by system vulnerabilities will also make the virus spread in the LAN. Third, spread through immobile computer hardware devices This mode of transmission refers to the spread of viruses through immobile computer hardware devices, among which the application specific integrated circuit chip (ASIC) and hard disk of the computer are important media for spreading viruses. Viruses transmitted through ASIC are extremely rare, but extremely destructive. Once invaded by viruses, it will directly lead to the damage of computer hardware, and the means of detecting and killing such viruses need to be further improved. Hard disk is the main storage medium of computer data, so it is also the hardest hit area of computer virus infection. The ways for hard disk to spread computer virus are: copying toxic files from hard disk to floppy disk, formatting floppy disk when poisoned, burning toxic files to CD-ROM, copying data between hard disks, and sending toxic files to other places. Expert tip: It is very important to regularly use genuine antivirus software to kill viruses. Fourthly, the spread of more computer viruses through mobile storage devices has gradually changed to spread by mobile storage devices. Mobile storage devices include floppy disks, magnetic tapes, optical disks, mobile hard disks, and U disks (including digital cameras and MP3 players). ), ZIP disk and JAZ disk. The latter two kinds of disks are just special disks with large storage capacity. Floppy disks are mainly portable. In the early days when the network was not popular, floppy disks were widely used and storage media were frequently moved, so they became a "hotbed" for computer virus parasitism. CD-ROM has a large storage capacity, so most software is burned on CD-ROM and transmitted to each other. At the same time, pirated CD-ROM software and games and illegal copying are also the main ways to spread computer viruses. With the wide use of large-capacity mobile storage devices such as Zip disk, erasable optical disk, magneto-optical disk (MO), these storage media will also become places where computer viruses parasitize. With the development of the times, mobile devices such as mobile hard disk and U disk have also become new targets. Because of its huge storage capacity, U disk has gradually become the most widely used and frequently used storage medium, providing more ample space for computer virus parasitism. At present, the virus on USB flash drive is increasing gradually, which makes USB flash drive the second largest way of virus transmission. Expert tip: Users who use mobile devices such as USB flash drives in school public computer rooms, Internet cafes and other specific public places should be especially careful to avoid being infected with Trojans, resulting in their information being leaked and stolen. V. Spread of wireless devices At present, with the opening of mobile phone functions and the expansion of value-added services, this kind of transmission route has become a virus transmission route that needs to be guarded against. With the popularity of smart phones, more and more programs are downloaded to mobile phones via MMS, which will inevitably cause hidden dangers to the security of mobile phones, and mobile phone viruses will also become the "source" of a new round of computer viruses. With the development of mobile phones, especially smart phones and 3G networks, the spread speed and harm of mobile phone viruses are increasing. The trend of wireless communication is likely to develop into the second largest virus transmission medium, which is likely to cause the same harm as network communication. Expert tip: When using the Internet function of mobile phone, you should mainly browse information, and try to reduce downloading information and files from the Internet. Even if there is such a demand, it is best to download it from some regular websites. Delete the text message or email with virus immediately after receiving it. If the keyboard is locked, remove the battery immediately and restart it to delete it. You can use the mobile phone version of Guanghua antivirus software to kill virus first. If it still can't return to normal, please send the mobile phone to the factory for repair in time to avoid the second spread of the virus. There are many kinds of viruses with different characteristics, so it is not difficult to monitor and kill them as long as you master their circulation and transmission methods. ]
- Related articles
- Does Unicom SMS have a monthly rental card?
- Recently, I often see online loans and credit cards overdue for help in Tik Tok. Is it true?/You don't say.
- How to use OPPO mobile phone text messages to find mobile phones
- What is the copy to wish people a happy birthday?
- China Mobile lets me enjoy the package of 6G traffic in 60 yuan. Does 6G traffic come from 60 yuan or 60 yuan every month?
- 10690 133604, 10658422, 106575259 1272, what are these three numbers for? The mobile phone sends messages to it inexplicably. How to deal with it? thank you
- Classic sentence of buying a house
- How to write the notice of parents issuing health codes?
- What is SMS cbc credit management?
- How to sort out spam messages in mobile phones?