Traditional Culture Encyclopedia - Traditional virtues - Computer virus protection knowledge
Often some computers can't be used normally because of virus infection, which affects everyone's work and threatens the information security at work. Let me s
Computer virus protection knowledge
Often some computers can't be used normally because of virus infection, which affects everyone's work and threatens the information security at work. Let me s
Often some computers can't be used normally because of virus infection, which affects everyone's work and threatens the information security at work. Let me share with you the common sense of computer virus, protection methods and common sense of use. Welcome to read:
What is a computer virus?
According to the traditional classification, computer viruses can be simply divided into four types: boot type, file type, mixed type and macro virus.
Bootable boot virus is a virus that infects the boot area or the main boot area of a disk, and its infection rate is second only to "macro virus". Because this virus will infect the boot area, when the disk or hard disk is running, it will infect other computers such as *. Exe, *, .386 to execute the necessary command program, causing all kinds of damage. Windows system infection will seriously affect the execution speed, and some functions cannot be executed. After antivirus, it is often necessary to recharge the Windows operating system to perform normally.
File virus is a kind of virus that infects files, and it is the most kinds of virus at present. Hacking virus Trojan. Bo belongs to this type. Blog hacker virus uses communication software to illegally enter other people's computer systems through the network, obtain or tamper with information or control computers in the background. Thereby causing all kinds of leaks and theft accidents.
This mixed virus not only infects the command file, but also infects the disk boot sector and the main boot sector. CIH destroyer virus, which can destroy the BIOS of computer motherboard chip, belongs to this kind of virus. This virus is the first virus that directly attacks computer hardware, and it is extremely destructive. When it breaks out, it will destroy the system program in the computer Flash BIOS chip, resulting in the damage of the motherboard and hard disk data. 1On April 26th, 999, CIH virus broke out on a large scale in China, Russian, Korean and other places, causing hundreds of thousands of computers to be paralyzed in Chinese mainland alone, and a large number of hard disk data were destroyed.
Macro virus is a virus that mainly infects data files such as WORD documents and document templates. Macro virus is a virus written in the macro programming language of an application. At present, three kinds of macro viruses have been found in the world: WORD macro virus infected with WORD system, EXCEL macro virus infected with EXCEL system and Lotus Ami Pro macro virus. At present, people's macro viruses mainly refer to Word and Excel macro viruses. Different from previous viruses, macro viruses have the following characteristics:
① Infecting data files: Macro virus infects data files specially, which completely changes people's misconception that "data files will not spread viruses".
② Multi-platform cross-infection: Macro virus broke through the previous restrictions of virus spreading on a single platform. WORD, EXCEL and other software will be cross-infected by macro viruses when they are executed on different platforms such as WINDOWS, WINDOWS NT, OS/2 and MACINTOSH.
Easy to write: In the past, viruses appeared in the form of binary computer machine code, while macro viruses appeared in the form of source code that people can easily read, so it is easier to write and modify macro viruses than in the past. In the short period of half a year since the end of 1996, the number of macro viruses has increased sharply from more than 30 to more than 1000.
(4) Easy to spread: If someone sends you articles or emails, if they have viruses, as long as you open these files, your computer will be infected by macro viruses. Later, when you open or create a new file, you may bring a macro virus, which leads to a very high infection rate of macro virus.
The appearance of the Internet has set off a new round of information revolution. Because on the Internet, the distance between people is shortened to a very small distance. With the establishment of various websites and the use of search engines, everyone can easily get the information they want from the Internet. The prevalence of the Internet has created a lot of information circulation, but it just provides a convenient channel for computer hackers who are interested in spreading viruses and stealing other people's accounts and passwords. Therefore, ordinary users should pay attention to its side effects while enjoying the convenience brought by the Internet. Due to the convenience of the Internet, the spread of the virus is more diversified. Traditional viruses may spread in the form of disks or other storage media. Now, as long as you send a file to a friend in an online information exchange tool such as e-mail or ICQ, it is possible to infect him with a virus. Even if you download files from the Internet, you may receive files containing viruses.
All kinds of viruses mentioned above are basically traditional viruses, the so-called "first generation viruses". There will be such a name, which is mainly used to distinguish the latest brand-new virus after the vigorous development of the Internet. This new virus is very different from the traditional virus in essence, so some people call it the "second generation virus".
The biggest difference between the second generation virus and the first generation virus is that the transmission route of the second generation virus is browser-based, which is a bit surprising. It turns out that in order to make it easier for web designers to create more exciting animations on web pages and make web pages more spatial, several large companies have jointly developed the technologies of Active X and Java. Through these technologies, you can even distinguish the version of the software you use and suggest which software you should download to update the version, which is a very convenient tool for most ordinary users. But if you want the animation of these web pages to run normally, the browser will automatically download the programs of these Active X and Java applets to the hard disk. In this process, developers of malicious programs also use the same channels to penetrate into personal computers through the Internet. This is the recently emerging "second-generation virus", the so-called "network virus".
- Previous article:Talk about your understanding of the course of sports health care in combination with reality ~
- Next article:Who can tell me the real name of the instrument that Tang performed in the second season of China's Got Talent? There are many kinds of oral strings. I just want to know which model Tang Kangmin used.
- Related articles
- Games that can really receive red envelopes
- The use of the seal of basic knowledge of painting and calligraphy
- What are AB and BC golf courses? What's the difference?
- English dialogue about festivals
- How is Spanish chivalry reflected in literature?
- Which company's broadband is good!
- Traditional western magic and quarrel novels
- Advantages and disadvantages of information transmission mode
- Research report template
- Talk about the historical origin of Spring Festival, a traditional festival in China, and write some examples of folk activities related to the Spring Festival.