Traditional Culture Encyclopedia - Traditional festivals - How many kinds of computer viruses are there so far? Which antivirus software is the best? (Hope to give a ranking) Thank you!
How many kinds of computer viruses are there so far? Which antivirus software is the best? (Hope to give a ranking) Thank you!
GData Anti Virus20 10, which uses dual-engine antivirus software from KAV and AntVir, has excellent antivirus ability and enjoys a high reputation abroad, but it is the first time I have heard of it. The biggest advantage of GData is that as long as the virus or Trojan horse is input into the virus database, it will be intercepted before the virus runs, and there will be no disinfection after poisoning. However, although the user interface of gdatantivirus 20 10 is simple, it is still more difficult to understand than other antivirus software. Therefore, gdatantivirus 20 10 may be the most suitable for professional users.
2. Symantec Norton Antivirus Software 20 10 (Norton)
Norton claims to be the only virus protection scheme in the world, and it is also one of the best antivirus software in the world.
3. Kaspersky Lab Anti-virus 20 10 (Kaspersky)
I believe everyone is familiar with Kaspersky. Before using MSE, I always used Kaspersky, an excellent anti-virus software from Russia. Because I cooperated with 360 for half a year for free, I quickly occupied a large number of markets, and the later paid version was not expensive. The current three-year edition of 158 yuan is equivalent to a dime a day.
4.BitDefender antivirus software 20 10
Chinese translation Bitfande, referred to as "BD", is an old anti-virus software made in Romania. It has over 4.53 million super virus databases, can be updated in real time, and has anti-virus engine function and Internet filtering technology.
5. Panda Antivirus Expert 20 10 (Panda Guardian)
Chinese name is panda guardian. It is the most advanced and easy-to-use antivirus software with unique concept and quality, which originated from PandaSoftware, the top antivirus software developer in Europe.
6.f- Safe Antivirus 20 10
F-Secure anti-virus is a powerful real-time virus monitoring and protection system, which supports all WINDOWS platforms. It integrates multiple virus monitoring engines. If one of them is ignored, the other will monitor it.
7.Avira AntiVir Premium (Red Umbrella)
The popular red umbrella is divided into personal version and enterprise version. Personal editions are Avira Antivir Personal-Free, Avira AntiVir Premium and Avira Premium Security Suite.
8. Trend Micro Antivirus Expert and Anti-Spyware 20 10 (Trend Micro)
Trend Micro Trend Micro provides comprehensive solutions for enterprise information security. Has a complete product line: the first brand of all-round computer antivirus from PC, network server to Internet gateway.
9.Eset Nod32 antivirus 4
Nod32 seems to be doing well in China, and it also cooperates with 360.
10.McAfee Antivirus Plus 20 10
McAfee VirusScan Enterprise is one of the best-selling antivirus software in the world. In addition to updating the operation interface, it also combines the company's WebScanX function and adds many new functions!
1 1. Alver Vast! 4.8 Professional Edition
Excellent anti-virus software comes from Czech Republic.
This list of anti-virus software is all commercial software, only considering anti-virus ability.
I used to use Kaspersky, but now I use MSE for the simple reason that they are completely free. Of course, 360 antivirus is completely free, but the origin of 360 antivirus and some recent events between 360 and Rising make me afraid to use it (I will write about it in the next article). In contrast, I trust Microsoft's MSE, and personally feel that MSE is basically enough.
Of course, like drugs, anti-virus software is not omnipotent, nor can it be completely trusted. It is as important to develop good habits and master some basic attempts as anti-virus skills.
I'm afraid it's hard for the landlord to give an answer if he asks about the computer virus. There are too many quotations. I'm afraid you can't solve the virus in a day, let alone say it! Introduce several viruses and malware to you.
adware
Advertising software is software that displays banner advertisements or pop-up window advertisement columns on the computer screen. These advertisements are usually immovable, so they are always visible. By connecting data, users' usage behavior can be analyzed, which is very problematic from the perspective of data security.
secret
Backdoor programs can bypass the computer access security mechanism to access the computer.
Generally speaking, attackers can have almost unlimited permissions through programs executed in the background. With the help of backdoor programs, attackers can steal users' personal data, but backdoor programs are mainly used to install more computer viruses or worms on related systems. By connecting data, users' usage behavior can be analyzed, which is very problematic from the perspective of data security.
Boot zone virus
The boot sector or main boot sector of hard disk is mainly infected with boot sector virus. The virus covers important information necessary for system execution. One of the bad consequences is that the computer system can no longer be loaded …
Botnet
Botnet is defined as a remote PC network (on the Internet) composed of robots communicating with each other. Botnets consist of a group of computers infected with viruses, which run programs (usually called worms and Trojans) under the control of a common command and control infrastructure. Botnets have many uses, including denial of service attacks, and users of infected computers are often unaware of their existence. What may become a botnet is mainly a network that can connect thousands of computers. In this network, the total bandwidth will soon occupy most of the conventional Internet access bandwidth.
A cracked hole
Security vulnerability is a kind of computer program or script, which uses bugs, defects or weaknesses in computer systems to upgrade permissions or deny services. For example, there is a vulnerability that uses manipulated data packets to attack the Internet. Attackers can hack into programs to elevate their privileges.
Prank program
Over the years, users of the Internet and other networks have received e-mail warnings about the spread of viruses. Alerts require recipients to send them to all colleagues and other users they know to remind everyone to deal with "danger". These alerts are spread by email.
Honey jar
Honeypot is a service (program or server) installed in the network. It can monitor the network and turn to attack. This service is unknown to legitimate users, so users don't understand it. If an attacker checks the weak links in the network and uses the service provided by the honeypot, it will record it and give an alarm.
macro virus
Macro virus is a small program written in the macro language of the application (such as WordBasic in WinWord 6.0), and usually only spreads in the documents of the application. Therefore, this virus is also called document virus. To activate, they need to enable the corresponding application and one of the infected macros has been executed. Unlike common viruses, macro viruses do not attack executable files, but attack documents of corresponding host applications.
Website grafting
Website grafting is to manipulate the host file of the web browser and turn the query address to deceptive websites. This way goes further than traditional fishing. Fraudsters who use URL grafting technology run their own server room, which contains fake websites. Website grafting is a general term for all kinds of DNS attacks. When manipulating the host file, the system will be manipulated by Trojan horse or virus. In this way, even if the correct URL is entered, the system can only visit fake websites.
fish
Fishing means snooping about the personal information of Internet users. Anglers usually send seemingly formal letters (e.g. e-mails) to victims, with the intention of luring them to disclose confidential information, especially the user name and password of online bank accounts or PIN and TAN. Using the stolen detailed access information, the fisherman impersonates the identity of the victim and trades in his name. One thing is clear: banks and insurance companies will never ask for credit card numbers, PIN, TAN or other detailed access information by email, SMS or telephone.
Deformed virus
Metamorphic virus is a real master of disguise. They can change their programming code, so it is difficult to be detected.
Program virus
Computer virus is a kind of program, which will attach to other programs after execution, thus leading to infection. Unlike logic bombs and Trojan horses, viruses replicate themselves. Compared with worms, viruses always need a program as a host and a storage location for toxic code. Generally speaking, the host's own program operation will not change.
Rootkit
Rootkit is a set of software tools installed after the computer system is attacked by hackers, which is used to hide the login information of intruders, hide the process and record data. In short, it is invisible. They will try to update the installed spyware and reinstall the deleted spyware.
Scripting viruses and worms
This virus is easy to write and can spread: if the method is right, it can spread all over the world by email within a few hours.
Scripting viruses and worms are written in scripting languages such as Javascript and VBScript. They embed themselves into other new scripts or spread by calling operating system functions. They are usually spread by e-mail and file exchange.
Worm is a self-replicating program without infecting the host. Therefore, worms will not be included in other program sequences. Usually, in a system with strict security measures, worms are the only viruses that can invade any kind of destructive programs.
spyware
Spyware is called spyware because it intercepts or partially controls the operation of a computer without the user's knowledge. Spyware uses infected computers to gain commercial benefits.
Trojan horse
Trojan horses are very common now. We are talking about programs that pretend to have specific functions, and the real functions are only revealed when they are executed. In most cases, their actual functions are destructive. Unlike viruses and worms, Trojan horses cannot replicate themselves. Most Trojans use attractive names (SEX.EXE or STARTME.EXE) to lure users to run Trojans. Once executed, Trojan will be activated and then perform destructive operations, such as formatting the hard disk. The dropper is a special type of Trojan horse, which "drips" the virus, that is, embeds the virus in the computer system.
zombie virus
Zombie PC is a kind of computer infected by malicious programs, which allows hackers to abuse computers through remote control to achieve their criminal purposes. The infected PC was ordered to launch denial of service (Dos) attacks, such as sending spam and phishing emails.
- Related articles
- The best snacks in Russia
- How to use an external microphone in a notebook? There is only the microphone that comes with the notebook in the control panel.
- Villa Decoration Sample Room New Chinese Style Decoration Case
- Oriental Doll's Magazine Series
- The first lesson of the school theme class meeting speech
- Distribution of major industries of loans
- Montessori's view of education 2000 words
- Baked chicken wings with salt
- Difference between Chinese and Western food culture
- What are the benefits of children learning guzheng