Traditional Culture Encyclopedia - Traditional stories - Common types and kinds of computer viruses

Common types and kinds of computer viruses

Common virus types

automatic operation

U disk virus is a virus that spreads through U disk. There is an autorun.inf vulnerability in U disk, and the number of U disk viruses using this vulnerability is increasing day by day. Virus programs are usually cleverly stored in USB flash drives.

1) is hidden as a system file.

2) disguised as other files. Because ordinary people don't display the suffix of the file, or the file name is too long to see the suffix, some virus programs change the icon to the icon of other files, causing users to open it by mistake.

3) Hidden in the system folder. The system folders here are often confusing, for example, the folder name is the name of the recycler.

4) Take advantage of Windows vulnerabilities. Some viruses hide a folder named runauto ... this folder can't be opened, and the system prompts that there is no path. In fact, the real name of this folder is runauto...\

5) Hide the folder and generate the virus file (folder imitator) or shortcut (Storm 1) corresponding to the folder icon.

6) Other new USB flash drive viruses: for example, masked exe first discovered by Kingsoft Internet Security 20 10 (this new USB flash drive virus will look for the exe file in the computer, and then rename the original file. Exe file changed to original file name+space. Exe, and set the hidden properties, and create a virus exe with the same name as the original file name. The purpose of a virus is simple, so that when you run any file, you can run its parent. ) new USB flash drive virus.

For these problems of U disk, we all have simple solutions. We recommend USBCleaner as anti-virus software for U disk virus. The use method is simple and the effect is obvious. After downloading, run the USBCleaner in the folder, and reply to the hidden folder after scanning the virus, so that the virus in the most popular hidden folder in our school will not threaten us, and then call other auxiliary tools according to the prompts, including broad-spectrum depth detection, FolderCure folder virus killing tool and so on. In daily use, both the computer and the USB flash drive should be backed up (put them in the USB flash drive as files) to avoid hiding the folders when you leave the computer.

2. Computer virus

A set of computer instructions or program codes that are compiled or inserted into a computer program, destroy computer functions or data, affect the use of the computer and can replicate themselves are called computer viruses. Computer virus has the following characteristics: parasitism, infectivity, latency, concealment, destructiveness and trigger. Common viruses can spread through floppy disk, hard disk, CD-ROM, Internet and other media. With the development of network, viruses are more rampant. No matter whether users browse infected files actively or not, they will stick to viruses. If the anti-virus software is not strong, then "poisoning" is inevitable. There are 24 common virus infections:

1) The computer system runs slowly.

2) Computer systems often crash for no reason.

3) The file length in the computer system changes.

4) The storage capacity of the computer is abnormally reduced.

5) The startup speed of the system is slow.

6) The file is lost or damaged.

7) Abnormal display appears on the computer screen.

8) The buzzer of the computer system has abnormal sound.

9) Disk volume label change.

10) The system does not recognize the hard disk.

1 1) abnormal access to the storage system.

12) Keyboard input is abnormal.

13) The date, time and properties of the file have been changed.

14) file cannot be read, copied or opened correctly.

15) command execution error.

16) false alarm.

17)。 Some viruses will switch the current disk to disk C.

18) clock inversion. Some viruses will name the system time reversal and reverse timing.

19)WINDOWS operating system frequently fails for no reason.

20) abnormal system restart.

2 1) Some external devices are not working properly.

22) Exception requires the user to enter a password.

23)WORD or EXCEL prompts to execute "macros" (macros are a series of WORD commands and instructions, which are combined to form a single command to realize the automation of task execution. )

24) Programs that should not reside in memory reside in memory.