Joke Collection Website - Public benefit messages - What effect will mobile phone memory card be infected with virus carelessly?

What effect will mobile phone memory card be infected with virus carelessly?

Mobile phone virus literacy course] takes you to fully understand the era of mobile phone virus. Cell phone virus is slowly approaching and infiltrating into our lives. However, what do you know about it? Do you know what a mobile phone virus is? Do you know how harmful the mobile phone virus is? Do you know how to prevent and remove mobile phone viruses? If you don't know anything about the author's question, take a quick look at this special report on mobile phone virus. First, the concept of mobile phone virus is also a computer program, which is as contagious and destructive as other computer viruses (programs). Mobile phone viruses can be spread by sending SMS, MMS, email, browsing websites, downloading ringtones, etc. Cell phone virus may cause the user's cell phone to crash, shut down, delete data, send out spam, make phone calls, etc. , even damage the hardware such as SIM card and chip. Second, the history of mobile phone viruses The earliest mobile phone virus appeared in 2000. At that time, Movistar, a mobile phone company, received a large number of harassing short messages named "Timofonica" sent by computers, and the virus sent spam messages such as swearing to users in the system through the mobile system of Telefonica, a Spanish telecommunications company. In fact, the virus can only be regarded as a text message bomb at most. The real mobile phone virus didn't appear until June 2004, that is, the "Cabir" worm virus, which was copied by Nokia 60 series mobile phones, and then kept looking for mobile phones with Bluetooth installed. Then the mobile phone virus began to spread. So, what are the mobile phone viruses that appeared later? What harm do they have? Third, the working principle of mobile phone virus, the software in mobile phone, embedded operating system (the operating system solidified in the chip, generally written in JAVA, C++ and other languages), is equivalent to a small intelligent processor, so it will be attacked by the virus. Moreover, short messages are not only simple words, but also include ringtones, pictures and other information, which need to be interpreted by the operating system in the mobile phone and then displayed to the mobile phone users. Mobile phone viruses invade mobile phones by virtue of loopholes in software systems. In order to spread and run mobile phone viruses, mobile service providers need to provide data transmission functions, and mobile phones need to support advanced programming functions such as Java. Nowadays, many mobile phones with internet access and download functions may be invaded by mobile phone viruses. Fourth, the harm of mobile phone virus 1. User information was stolen. Nowadays, more and more mobile phone users store personal information on their mobile phones, such as personal address book, personal information, schedule, various network accounts, bank accounts, passwords and so on. These important materials will inevitably attract the "covet" of some people with ulterior motives, who will write various viruses to invade mobile phones and steal important information from users. 2. Disseminating illegal information. Nowadays, MMS is very popular, which facilitates the spread of pornographic and illegal pictures, sounds and movies. 3. Destroying the software and hardware of mobile phones The most common harm of mobile phone viruses is to destroy the software and hardware of mobile phones, so that mobile phones cannot work normally. 4. Causing communication network paralysis If the virus infects the mobile phone, it will force the mobile phone to continuously send junk information to the communication network where it is located, which will inevitably lead to information congestion in the communication network. These spam messages will eventually paralyze the local mobile communication network. V. Types of mobile phone viruses According to virus forms, mobile phone viruses can be divided into four categories: 1. Viruses "kabir" and "Lasker". A "spread through Bluetooth devices without red spread. Tips: "Cabir" is a network worm that can infect mobile phones running "Symbian" operating system. After the virus is found in the mobile phone, it will use the Bluetooth wireless function to scan other mobile phones with loopholes nearby. When a vulnerable mobile phone is found, the virus will copy itself and send it to the mobile phone. Lasko Like a worm, the virus spreads wirelessly to other mobile phones via Bluetooth. When the user clicks on the virus file, the virus is activated immediately. 2. Mobile phone virus "Mosquito Trojan" of mobile communication provider. Tips: The virus is hidden in the cracked version of the mobile game Mosquito. Although this virus will not steal or destroy users' data, it will automatically dial and send a large number of short messages to numbers located in Britain, resulting in a sharp increase in users' information fees. 3. The virus "mobile phone hacker" for mobile phone bugs. Tips: Hack.mobile.smsdos virus is spread by SMS with virus program. As long as the user views the short message with virus, the mobile phone will automatically turn off immediately. 4. "mobile phone. SMSDOS virus, which attacks by SMS or MMS, is a typical example of mobile phone virus. Aiming at the "SMSDOS" virus appearing in Siemens mobile phones. Tips: Virus "mobile phone. SMSDOS "can be spread by SMS or MMS, causing errors in the internal programs of the mobile phone, which leads to the failure of the mobile phone to work normally. Common Mobile Phone Viruses and Their Poisoning Symptoms Virus Name Mobile Phone Poisoning Symptoms EPOC _ Alarm The mobile phone keeps sounding alarms. EPOC BANDINFO。 A Change the user information to "Some fool owns this". EPOC _ fake.a displays pictures when the built-in hard disk is formatted on the mobile phone screen, which is a scary move. EPOC ghost is not real. A displays "Everyone hates you" on the screen (everyone hates you). Light of EPOC. A keep the background light flashing. EPOC is alone. This is a kind of malignant viruses, which will invalidate key operations. Timofonica sends toxic emails to mailboxes in the address book, and can also send a large number of short messages to mobile phones through a short message server. Hack.mobile.smsdos will cause the phone to crash or shut down automatically. Unavailaifabie When there is an incoming call, the words "Unavailaifabie" or some strange characters will be displayed on the screen. If you pick up the phone at this time, you will catch a virus and lose all the information in your mobile phone. Trojan horse malicious virus, when the virus breaks out, it will use the address book to make phone calls or send emails. Even called the police. 6. How the mobile phone virus 1 spreads. Spread through Bluetooth In February, 2004, 12, Shanghai discovered Kapoor virus, which will modify the system settings of smart phones, and automatically search neighbor's mobile phones for vulnerabilities and attack them through Bluetooth. 2. Infect the mobile phone executable file on the computer. On June 65438+1October1day, 2005, Velasco virus was discovered. After the virus infects the computer, it will search the SIS executable file on the computer hard disk for infection. 3. Use MMS multimedia message service to spread. On April 4, 2005, a new way of spreading mobile phone virus appeared, which was spread through MMS service. 4. Using mobile phone bugs to attack such viruses generally runs on the "EPOC" of portable information equipment, such as "EPOC- alarm" and "EPOC-BANDINFO". One ","EPOC-fake. " "EPOC-ghost. A "and" EPOC- ignition. One ". Seven, the target of mobile phone virus attack 1. Attacking Internet content, tools, services, etc. Provide services for mobile phones. 2. Attacking WAP server makes WAP mobile phone unable to receive normal information. 3. Attack the control "gateway" and send spam to the mobile phone. 4. Directly attack the mobile phone itself, making the mobile phone unable to provide services. Prevention of mobile phone virus 1. Garbled SMS, MMS, delete. Scrambled SMS and MMS may contain viruses, so delete them immediately after receiving them to avoid being infected with mobile phone viruses. 2. Don't accept strange requests. When using Bluetooth, infrared and other wireless transmission functions to receive information, you must choose a safe and reliable transmission object. If a strange device requests a connection, it is best not to accept it. Because as I said before, mobile phone viruses will automatically search for devices within wireless range to spread the virus. 3. Ensure the security of the download. At present, there are many resources on the Internet to provide mobile phone downloads. However, there are many viruses hidden in these resources, which requires users to ensure that the download site is safe and reliable when downloading various resources with their mobile phones, and try to avoid downloading from personal websites. 4. Choose your own background. Beautiful background pictures and screensavers are pleasing to the eye, but there are viruses in the pictures that make people uncomfortable, so users had better use the pictures that come with their mobile phones to set the background. 5. Don't visit dangerous websites. For example, some hackers and pornographic websites are very dangerous, and there are many viruses and Trojans hidden inside. It is very dangerous to browse such websites with mobile phones. Nine, the removal of mobile phone viruses Now the best way to remove mobile phone viruses is to delete short messages with viruses. If you find that your mobile phone is infected with a virus, you should turn it off immediately. If it crashes, you can take off the battery, and then take out the SIM card and plug it into another model of mobile phone (the brand of mobile phone is better to be different). After deleting the suspicious SMS stored in the SIM card, insert the card back into the original mobile phone. If it still doesn't work, you can contact the mobile phone service provider to disinfect the mobile phone through the wireless website or through the IC access port or infrared transmission interface of the mobile phone. References:

/forums/viewthread.php? tid=55 1 136。 Extra = Page% 3D2% Filter% 3dSummary

Seek adoption