Traditional Culture Encyclopedia - Traditional stories - What are the common computer viruses and their characteristics?
Computer viruses will also spread from infected computers to uninfected computers through various channels. In some cases, infecte
What are the common computer viruses and their characteristics?
Computer viruses will also spread from infected computers to uninfected computers through various channels. In some cases, infecte
Computer viruses will also spread from infected computers to uninfected computers through various channels. In some cases, infected computers will work abnormally or even paralyze. Different from biological viruses, computer viruses are artificially compiled computer program codes. Once this program code enters the computer and is executed, it will search other programs or storage media that meet its infection conditions, and insert its own code into it after determining the target to achieve the purpose of self-replication. The following is the knowledge about common computer viruses and their characteristics that I have compiled for you. I hope it helps you!
Features: infection, concealment, destruction and derivation.
Bootable virus refers to a computer virus that is parasitic in the boot area or the main boot area of the disk. This kind of virus takes advantage of the shortcoming of not judging whether the contents of the main boot area are correct when the system is started, invades the system, resides in memory, monitors the execution of the system, and waits for opportunities to infect and destroy it during the system startup. According to the parasitic position of boot virus on hard disk, it can be subdivided into master boot record virus and partition slot boot record virus. The master boot record virus infects the master boot area of the hard disk, such as * * * virus, 2708 virus, torch-virus, etc. Partition slot boot records the active partition slot boot records of hard disks infected by viruses, such as globus virus and Girl virus.
File virus refers to a computer virus that can parasitize in files. This virus program can infect executable files or data files. Such as executable files such as 1575/ 159 1 virus infection, 848 virus infection and. Exe macro/concept, macro/atom and other macro virus infections. DOC file.
Composite virus refers to computer viruses whose parasitic patterns are boot virus and file virus. This virus expands the infection path of virus programs, infecting both the boot record of the disk and the executable file. The virus will be enabled when the disk infected with this virus is used to boot the system or call to execute the infected file. Therefore, when detecting and removing the compound virus, it must be thoroughly cured. If only one feature of the virus is found, it should only be deleted as a boot virus or an archive virus. Although it seems to have been removed, there are still hidden dangers, and this "clean" system after disinfection is more aggressive. This virus includes rollover virus, Neolithic virus, half virus and so on.
Source code virus: attacks the source program written in high-level language, inserts it before the source program is compiled, and connects it with the source program compilation to form an executable file. At this time, the executable file just generated has been poisoned, which is very rare and difficult to write.
Invasive virus: it can replace some modules or stacks of normal programs by itself, which is difficult to find and remove. This virus only attacks some specific programs and is highly targeted.
Operating system virus: it can be used to add or replace some functions of the operating system, because it directly infects the operating system and is very harmful.
Shell virus: attaching yourself to the beginning or end of a normal program is equivalent to adding a shell to the normal program. Most viruses belong to this type.
Benign virus: only displays information, plays music, makes noise and replicates itself.
Benign virus refers to a computer virus that only expresses itself and does not completely destroy the system and data, but it will take up a lot of CPU time, increase system overhead and reduce system work efficiency. Most of this virus is the product of practical jokes. Their purpose is not to destroy the system and data, but to let infected computer users see or hear the programming technology of virus designers through monitors or speakers. These viruses include globus virus, 1575/ 159 1 virus, ambulance virus, Yankee virus, Darby virus, etc. Others use these characteristics of the virus to publicize their political views and opinions. There are also some virus designers who make personal attacks when the virus they compiled breaks out.
Malignant viruses refers to a computer virus, which will destroy the system or data and paralyze the computer system once it breaks out. Such viruses include Black Friday virus, torch-virus virus and Michelangelo virus. This virus is extremely harmful, and some viruses will cause irreparable losses to users after being attacked.
- Previous article:What dowry should Chaoshan prepare to marry his daughter?
- Next article:What projects are suitable for small businesses?
- Related articles
- Praying Mantis Fist Stances
- Text arrangement of toothpaste, toothbrush, dental floss, hair dryer, razor бн bathroom supplies
- How is tofu made?
- How many years was the hereditary system in place? When was it abolished?
- Shaoxing tourist route Shaoxing tourist attractions route
- Solve tradition
- What is a smart park?
- What are the four periods of the historical development of the Communist Youth League of China?
- What price can Chinese painting printed matter sell in the market?
- Car ownership in Guangdong province