Traditional Culture Encyclopedia - Traditional festivals - What are the most harmful computer viruses in history?
What are the most harmful computer viruses in history?
I. CIH virus
CIH virus is a kind of malignant viruses that can destroy the hardware of computer system. The virus was produced in Taiwan Province Province and was made by Chen Yinghao, former chief engineer of Unitalen Communication Company (Gigabyte subsidiary) mobile phone R&D center, while studying in Datong Institute of Technology in Taiwan Province Province.
CIH virus is a deadly file virus. The main performance is that after the virus attack, all the hard disk data is lost, and even the original contents in the BIOS on the motherboard will be completely destroyed, and the host cannot start.
Second, the grey pigeon.
Huigezi, originally this software is suitable for company and family management, and its function is very powerful. It can not only monitor cameras, keyboard records, monitor desktops, file operations and so on.
It also provides special functions for hackers, such as disguising system icons, changing the name and expression of startup items at will, changing ports at will, deleting after running, and not prompting for installation. And adopt the defect design of rebound link, so that users have the highest authority, once cracked, they can't control it. Eventually lead to malicious use by hackers. The original author defines Grey Pigeon as a Trojan horse program with multiple control modes.
Third, cyber thieves.
The network thief virus will copy itself into the system directory and name it Iexplorer.exe, and then add the virus key value of "Internet Explorer" in the self-startup item of the registry. The runtime will connect to the virus website every minute to communicate with the virus author in an attempt to control the user's computer and bring losses to the user.
Fourth, pandas burn incense.
"Panda Burning Incense", different from the grey pigeon, is a virus with automatic transmission ability, automatic infection of hard disk and extremely destructive power. It can not only infect exe, com, pif, src, html, asp and other files in the system, but also stop a large number of antivirus software processes and delete files with the extension of gho.
This file is the backup file of a system backup tool GHOST, which makes the user's system backup file lost. All of them. The exe executable file in the infected user's system has been changed to the appearance of a panda with three incense sticks. It was written by a 25-year-old Li Jun from Xinzhou District, Wuhan City, Hubei Province on June 5, 2006 at 438+ 10. At the beginning of 2007 10, the network was rampant, mainly infected by downloading files.
Five, QQ tail
QQ Tail is a Trojan horse program that attacks QQ software. After being poisoned, QQ will send spam or Trojan websites to friends for no reason. Solutions include upgrading antivirus software, firewall interception, detection and deletion methods.
The main hazards are stealing accounts, using system broadcast to defraud fees, viewing other users' information, exploiting QQ vulnerabilities, and maliciously using QQ files.
Baidu Encyclopedia-Computer Virus
- Related articles
- 20 18 Selected 6 Presiding Speeches of Kindergarten Opening Ceremony in Autumn
- What are some examples of logical fallacies?
- Spicy shell chicken claws
- The traditional hard pull of the hard rabbi on the bookshelf
- A typical example of traditional authority
- What are the 400-word contents of virtue story's diary around me?
- How to open an ordinary lock without a key?
- What are the names of famous computer viruses?
- What causes the green algae in the pond?
- List of American Home Style Brands-List of American Home Decoration Brands Suitable for Cities