Joke Collection Website - Blessing messages - What is the mode of computer virus transmission?
What is the mode of computer virus transmission?
Network communication is divided into Internet communication and LAN communication. In the era of network information, Internet and local area network have been integrated into people's life, work and study, and become an indispensable part of social activities. In particular, the Internet has been increasingly used to obtain information, send and receive files, receive and publish new messages, and download files and programs. With the rapid development of the Internet, computer viruses have also embarked on the road of high-speed transmission, becoming the first transmission route of computer viruses.
I. Internet communication:
Internet is convenient and fast, which not only improves people's work efficiency, but also reduces operating costs, and is gradually accepted and widely used by people. Business mail, as well as browsing the web, downloading software, instant messaging software, online games, etc. , all through the Internet. Such frequent use is bound to be "favored" by viruses.
Spread by e-mail:
Today, with the increasing popularity of computers and networks, e-mail is more widely used in business communication, and viruses have also found a carrier. The most common way is to exchange documents in Word format through the Internet. Due to the extensive use of the Internet, its spread speed is quite rapid. E-mail carries viruses, Trojans and other malicious programs, which will cause the recipient's computer to be attacked by hackers. Newsgroup, file server, FTP download and BBS file area of e-mail protocol are also the main forms of virus transmission. Virus makers often upload files with viruses to FTP and BBS, and usually send them to different groups in groups. Many viruses will pretend to be new versions of some software, even anti-virus software. Many virus epidemics infect thousands of computers at the same time in this way.
BBS is a communication website spontaneously organized by computer enthusiasts. Because it is easy to go to the site and has less investment, it is very popular with the public. Users can exchange files (including free software, games and self-compiled programs) on BBS. Because BBS stations generally have no strict security management and restrictions, it provides a place for some virus programmers to spread viruses. The BBS station in the city spreads through the central station, which has a wide spread. With the popularity of BBS in China, new media have also joined the spread of viruses.
Expert tip: Cultivate good safety awareness. Don't easily open strange emails and attachments of unknown origin, even the emails of relatives and friends should be more careful.
Spread by browsing the web and downloading software:
Many netizens have encountered such a situation. After browsing a web page, the title of IE has been modified, and every time IE is opened, it is forced to log in to a fixed website, and some of them are forbidden to recover. This is malicious code at work. When your IE is modified, the registry can't be opened. After booting up, IE opened the window crazily and was forced to install some software that you didn't want to install. Even when you visit a web page, your hard disk may have been formatted ... then unfortunately, you must have been poisoned by malicious websites or malware.
When you visit some unhealthy websites or enter some hacker websites by mistake, while visiting these websites or clicking some links or downloading software, some spyware will be automatically installed in your browser or system. These spyware programs can let your browser visit their websites from time to time, or intercept your private information and send it to others.
The function of "Blocking Malicious Websites" uses built-in default and free addition to determine the list of malicious websites, identify the addresses of malicious websites, and effectively intercept viruses and Trojans infected by malicious websites. At the same time, with the daily automatic upgrade of Guanghua antivirus software, the list of malicious websites will be constantly updated, so there is no need to worry about the limited number of websites in the list.
"Green Internet access function" can shield all kinds of malicious components in the process of surfing the Internet, avoid the interference of spyware and advertising software, and truly realize free roaming of your network.
Reject Malware: Click the menu "Tools → Plug-ins → Green Internet Access" in Guanghua Antivirus Software to open the window of green Internet access plug-ins. Similarly, for different types of malware, Guanghua made a detailed classification for us, including domestic, foreign, chat, security, games and so on. We click on the components that we want to block in the corresponding classification, so that we can block all kinds of malicious components in the process of surfing the Internet and avoid interference from spyware and adware.
"Close IE advertising window" can ban pop-up advertisements on some websites, which makes you more worry-free when surfing the Internet with IE.
Tip: Don't just log on to those tempting small websites, because these websites are likely to have network traps. Don't download the software and programs of small websites easily. The downloaded software needs to be checked before installation and use to ensure that your computer is always in a safe environment.
Spread through instant messaging software:
Instant messaging (IM) software can be said to be the software with the highest usage rate among netizens in China. It has changed from a simple entertainment tool to a necessary tool for life and work. Due to the huge number of users and the security defects of instant messaging software itself, such as the built-in contact list, viruses can easily get the spread target, and these characteristics can be used by viruses to spread themselves, leading to their attack targets. In fact, the notorious virus worm Klez, which caused tens of billions of dollars in losses, was the first vicious worm that could spread through ICQ. It can traverse the contact list in the local ICQ to spread itself. Moreover, more viruses that pose security risks to instant messaging software are still being discovered one after another, and there is a growing trend. Up to now, hundreds of viruses have spread through QQ.
P2P (peer-to-peer network technology) allows users to directly connect other users' computers for file sharing and exchange. Every day, thousands of netizens around the world exchange resources and share files through P2P software. Because this is a new technology, it is not perfect, so there are great security risks. Because it is easy to use without a relay server, many virus makers begin to write viruses that rely on P2P technology.
Tip: When chatting, you receive suspicious information from friends. Don't click on it at will. You have to make sure it's from a real friend first. To prevent viruses from spreading through IRC, we should also pay attention not to download suspicious files from unfamiliar websites and execute them at will, and not to easily receive files sent by other users of IRC channels to avoid computer damage.
Spread through online games:
At present, online games have become one of the main bodies of online activities, and more people choose to enter games to relieve the pressure of life and realize their self-worth. It can be said that online games have become an indispensable thing in some people's lives. For gamers, the most important thing in online games is virtual items such as equipment and props. With the accumulation of time, these virtual items will become things with real value, so there is a transaction of these virtual items, which leads to the phenomenon of stealing virtual items. Some users must obtain the user's game account information if they want to illegally obtain the user's virtual goods. So at present, the security problem of online games is mainly the problem that the game number is stolen. Because online games can only run through computers and connect to the network, Trojan horse is the most effective weapon to steal players' game accounts and passwords, and Trojan horses specialized in stealing online game accounts and passwords are also emerging one after another. This kind of offensive weapon is regarded as the favorite by novice hackers and network security experts.
Second, local area network communication.
Local area network is composed of a group of interconnected computers, which is the need of data sharing and mutual cooperation. Each computer forming a network can be connected with other computers, and data can be sent from one computer to other computers. If the data sent is infected with computer virus, the computer of the receiving party will be infected automatically, so it is possible to infect the computers of the whole network in a short time. The application of LAN technology has made great contributions to the development of enterprises and paved the way for the rapid spread of computer viruses. At the same time, the security risks brought by system vulnerabilities will also make the virus spread in the LAN.
Third, spread through immovable computer hardware equipment.
This mode of transmission is to spread the virus through the immobile computer hardware equipment, in which the application specific integrated circuit chip (ASIC) and hard disk of the computer are the important transmission media of the virus. Viruses transmitted through ASIC are extremely rare, but extremely destructive. Once invaded by viruses, it will directly lead to the damage of computer hardware, and the means of detecting and killing such viruses need to be further improved.
Hard disk is the main storage medium of computer data, so it is also the hardest hit area of computer virus infection. The ways for hard disk to spread computer virus are: copying toxic files from hard disk to floppy disk, formatting floppy disk when poisoned, burning toxic files to CD-ROM, copying data between hard disks, and sending toxic files to other places.
Expert tip: It is very important to regularly use genuine antivirus software to kill viruses.
Fourth, spread through mobile storage devices.
More computer viruses are gradually spreading by using mobile storage devices. Mobile storage devices include floppy disks, magnetic tapes, optical disks, mobile hard disks, and U disks (including digital cameras and MP3 players). ), ZIP disk and JAZ disk. The latter two kinds of disks are just special disks with large storage capacity. Floppy disks are mainly portable. In the early days when the network was not popular, floppy disks were widely used and storage media were frequently moved, so they became a "hotbed" for computer virus parasitism. CD-ROM has a large storage capacity, so most software is burned on CD-ROM and transmitted to each other. At the same time, pirated CD-ROM software and games and illegal copying are also the main ways to spread computer viruses. With the wide use of large-capacity mobile storage devices such as Zip disk, erasable optical disk, magneto-optical disk (MO), these storage media will also become places where computer viruses parasitize.
With the development of the times, mobile devices such as mobile hard disk and U disk have also become new targets. Because of its huge storage capacity, U disk has gradually become the most widely used and frequently used storage medium, providing more ample space for computer virus parasitism. At present, the virus on USB flash drive is increasing gradually, which makes USB flash drive the second largest way of virus transmission.
Expert tip: Users who use mobile devices such as USB flash drives in school public computer rooms, Internet cafes and other specific public places should be especially careful to avoid being infected with Trojans, resulting in their information being leaked and stolen.
Fifth, the popularity of wireless devices.
At present, with the opening of mobile phone functions and the expansion of value-added services, this transmission route has become a virus transmission route that needs to be guarded against. With the popularity of smart phones, more and more programs are downloaded to mobile phones via MMS, which will inevitably cause hidden dangers to the security of mobile phones, and mobile phone viruses will also become the "source" of a new round of computer viruses. With the development of mobile phones, especially smart phones and 3G networks, the spread speed and harm of mobile phone viruses are increasing. The trend of wireless communication is likely to develop into the second largest virus transmission medium, which is likely to cause the same harm as network communication.
Expert tip: When using the Internet function of mobile phone, you should mainly browse information, and try to reduce downloading information and files from the Internet. Even if there is such a demand, it is best to download it from some regular websites. Delete the text message or email with virus immediately after receiving it. If the keyboard is locked, remove the battery immediately and restart it to delete it. You can use the mobile phone version of Guanghua antivirus software to kill virus first. If it still can't return to normal, please send the mobile phone to the factory for repair in time to avoid the second spread of the virus.
There are many kinds of viruses with different characteristics, so it is not difficult to monitor and kill them as long as you master their circulation and transmission methods.
- Related articles
- Parents' wedding wishes to their children
- I heard that you can get tickets for Hunan Satellite TV's 20 19 New Year's Concert for free now? How to participate?
- The thank-you letter solved the case.
- When will the court unfreeze the SMS?
- How do Tencent video members log in?
- Warm Valentine's Day greetings
- How about Rugao Jiuhua Sub-branch of China Agricultural Bank Co., Ltd.
- Reception process of hairdressing front desk
- How to complain about the short message of106810691065?
- How does Apple set up a small screen reply message?