Computer operating system into the windows of the times and the global Internet → era created a computer virus in the personal computer a large number of outbreaks and the rapid worldwide spread of computer viruses to the computers we use every day causing inconvenience to the whole of social production, commercial and other activities led to increasing losses.
In order to let everyone on computer viruses, and the resulting harm to have more understanding of basic anti-virus knowledge, we specially made this guide.
Computer virus in the windows operating system common types are:
Boot-type virus. Boot-type viruses embedded in the disk master boot record (master boot sector viruses) or the DOS boot record (boot sector viruses), when the system boot into the memory when to control systems for dissemination and sabotage activities. When using a system with a boot disk virus when you start your computer, the virus followed them into the memory, and make the computer's hard drive starts, the virus will automatically enter the memory. In such a machine with a virus on any of read and write disk operation can be operating panel can be infected by the virus to become a new virus sources, and then this floppy disk to start the other computer will be infected with another computer.
File type viruses. Refers to the virus attaches itself to executable files in general on the virus, in order to document infection. Common file-type viruses are: macro viruses. With a variety of Windows, the development of packaged software, many software began offering so-called "macro" function, so that users can use to "create macro" approach with some of the cumbersome process of recording into a simple command to facilitate the own operation. However, this convenient feature, after the design of interested parties, finally have made it "document-type" virus has entered a new milestone: the traditional paper-based viruses that infect only the suffix for the implementation of exe and com files, while the macro virus is can infect Word, Excel, AmiPro, Access and other software, stored data files. Even more exaggerated, this macro virus is cross-platform operation. With Word macro virus, for example, it can infect DOS, Windows 3.1/95/98/NT, OS / 2, Macintosh, etc. Word files on the system, as well as generic templates. While macro viruses have a high infectious, but fortunately it was not too destructive power, and the detoxification easier ways, even without anti-virus software, you can manually detoxification on their own.
"Worm" virus. Through computer networks, communication, does not change the documents and data and information, use the Internet from a machine's memory spread to other machines of memory, computing network address, the virus itself sent over the network. Sometimes they exist in the system in general apart from the memory is not occupied by other resources.
Computer viruses spread primarily through the use of removable disk (floppy disk, U disk, mobile hard disk, etc.), install pirated or software from unknown sources, network and e-mail, etc..
After a computer infected with a virus, there may be some anomalies to help us to determine presence of the virus:
1. System resources have been filled. Open the windows Task Manager (press Ctril + Alt + Del, or point your mouse at the taskbar → Right-click the Task Manager, or click on the Start Menu → Run → type taskmgr), see the CPU use of a long time at 100%;
2. Click Start Menu → Run → type msconfig, look in your startup and found a large number of abnormal start-up projects exist;
3. Computer disk space for no reason a significant reduction in the system folder there are a large number of unknown files, delete the file that the file is being used, can not be deleted, the disk often read and write error;
4. Frequent computer crashes, restart the system corresponding slow;
5. Memory Baocuo frequent phenomenon;
6. Select the disk file, click the right mouse button and found the menu with automatic play option;
7. Click Start Menu → Run → type cmd into the command line mode, enter the netstat command to view network connections conversation, found a large number of suspicious unknown session connections.
Once the discovery of these phenomena described above can be basically sure that your computer has a virus, and users can install anti-virus software or virus names, knowing the circumstances under which the virus Zhuanshagongju to get rid of the virus, it can ask the professional computer maintenance personnel to get rid of the virus.
Second, computer virus protection and basic computer security knowledge.
Mainly through the computer's virus protection computer anti-virus software to complete. Common computer anti-virus software abroad are: Trends, McAfee, Norton, Kaspersky, etc.; China are: Rising, Jiangmin, Jinshan, Panda and so on.
Yun by tender, and finally selected trends in anti-virus software as desktop computers in schools anti-virus system, the user can download via http://ftp.ynu.edu.cn/ used to obtain a user guide. Http://202.203.208.98/housecall/ trends while providing an online antivirus service, users do not need to download the client to the local installation, you can directly on the site on your own computer for virus scanning and killing. Trend installed anti-virus software, if trends do not want to use the uninstall to uninstall when you enter the password: trend to uninstall.
In the use of anti-virus software for virus protection when you have the following two points are worth noting:
1. Regardless of what kind of anti-virus software, requires users to constantly update the software. The principle of anti-virus software, almost all of the computer by scanning every file, and anti-virus software features of its own to carry the virus in the virus signature database to compare, if we find a file in the code and a signature the same, finds that the file as a virus file, since a wide range of computer viruses, and updates very quickly, so only by constantly maintain their own anti-virus software on the computer the characteristics of library is the latest anti-virus software is possible in a timely manner killing computer viruses.
2. Recommended each computer, install only one anti-virus software. As the anti-virus software with real-time monitoring of the computer systems functions, need to occupy a certain degree of computer CPU and memory resources, several anti-virus software to work simultaneously, will result in increased utilization of system resources, which affect performance, it is also a waste of resources .
Anti-virus software is not a panacea, users install anti-virus software can not feel that their computer is safe, but also take other other measures to ensure their own computer security:
1. In time for the computer operating system patches. The world of computer hackers are using the windows operating system itself, a number of security vulnerabilities to write viruses and launch network attacks, of which more well-known as the shock wave (Worm.Blaster), Sasser (Worm.Sasser) Dengjun are loopholes in the use of windows virus. In response to these situations often have to release a number of Microsoft security updates to prevent attacks against these vulnerabilities, the current security patch for windows2000 has been out to the SP4, but for the windowsXP security patches out to the SP2. Users can log into Microsoft's official website (http://www.microsoft.com/china/) download the latest update, users can log http://windowsupdate.ynu.edu.cn large cloud to be updated;
2. Right to download and install the software from the network, games, and open the downloaded music, documents to be careful, many of the virus was deliberately hiding in them, or because the server itself with the virus, so that downloaded files are infected. In the open these files before the first file should be scanned for viruses, while the computer is best view in the Folder Options → remove the "Hide extensions for known file types" option, view the file name suffix for suffix called " . exe "file open should be careful, because. exe is an executable file suffix names, and many virus programs are executable files.
3. E-mail attachments from a document to verify that no virus can only open the case, with particular attention is not to click on with a ". Exe" extension.
3, anti-spyware software knowledge
Spyware (Spyware) is the ability to the user without the knowledge of the user backdoor program installed on your computer software. The user's privacy of data and important information will be captured by those who backdoors, and even these "backdoors" also gives hackers remote control a user's computer. Trojan is a common type of spyware. Protects against spyware, should pay attention to the following aspects:
1. Do not install shareware or "free software", where these software programs often contain advertisements, spyware and other bad software, may pose a security risk.
2. Some spyware installed through malicious Web sites, so do not visit bad sites.
3. The better use of security, Web browser, and note that compensate for vulnerabilities.
Another way to steal user information is called "phishing", the author and some online banking through the production of similar appearance or even the same page on the Internet, a user mistakenly thought it was normal after landing site, resulting in the input account number, intercept passwords and other information after page, the results of the funds in the account have been stolen. Users in the use of online banking services should be alert, and only given by the domain name through a bank Web site to enter.
Rogue software is a cross between viruses and between the formal software software, which is installed without the user permission to the user's computer or with other software (such as browsers) for malicious bundle, the implementation of pop-up window or steal user information, etc. behavior, the use of computer user inconvenience and safety hazard.
Pairs of spyware, malware protection, we have the following recommendations:
1. For the computer to install firewall software, isolation and cut off the back door of the communications link with the network in the world. But bearing in mind that some firewall software will block the normal use by users of the port, affecting the normal use of the software, so pay attention to the firewall rule set, to avoid the normal software and operating systems need to use the port barrier;
2. Do not visit inappropriate Web sites
3. The discovery of a computer Trojan horse or malware is installed on the use of tools to carry out killing and unload. Recommend the use of 360 security guards (local download address) or perfect uninstall (local download address) for killing.
360 security guards is a free safety class online support software, with the killing malicious software, plug-in management, virus killing, diagnosis and repair capabilities, while also providing pop-up plug-in immunization, clean traces, as well as the use of certain auxiliary functions such as System Restore , in particular, the operating system vulnerabilities can be tested and marked with the appropriate patch (see User Guide).
Perfect Uninstall main functions are: installation of monitoring, Trojan horses killing, intelligent software, unloading, garbage collection, registry cleaning, DLL clean-up, system repair, system optimization, memory management, vulnerability scanning, comprehensive system maintenance functions.
The two software are available for free online download. With the anti-virus software and personal firewall software used with personal computers will be able to have a comprehensive protection.
No comments:
Post a Comment