-
Latent, hidden, destructive, contagious, and secondary.
1, and then the antivirus method is one.
3. Open the anti-virus page to start the killing, remember to turn on the little red umbrella engine.
Scan. 5. After checking and killing all viruses, restart the computer immediately, conduct a security check-up again, and clear the redundant system cache files to avoid secondary infection.
-
1. A computer virus is actually a kind of computer program, and the virus is mainly transmitted through storage media such as optical discs or through the Internet. A computer virus is a set of computer instructions or programs inserted by the compiler into a computer program that can destroy computer functions or data, affect the use of the computer, and can replicate itself.
2. Computer viruses are transmissible, hidden, infectious, latent, exciting, expressive or destructive. The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period.
3. A computer virus is a program that can be executed. Just like biological viruses, they have the characteristics of biological viruses such as self-reproduction, mutual infection, and activation and regeneration. Computer viruses have a unique ability to replicate, and they can spread quickly and often hard**.
They can attach themselves to various types of files, and they spread along with files as they are copied or transferred from one user to another.
-
1. Reproduction: Computer viruses can reproduce like biological viruses, and when normal programs run, they also replicate themselves, and whether they have the characteristics of reproduction and infection is the primary condition for judging a certain program as a computer virus.
2. Destructiveness: After the computer is poisoned, it may cause the normal program to fail to run, delete the files in the computer or be damaged to varying degrees. Destroy the boot sector and BIOS, and destroy the hardware environment.
3. Infectivity: Computer virus infectivity refers to the fact that computer viruses infect their own replicas or variants to other non-toxic objects by modifying other programs, which can be a program or a part of the system.
4. Latentity: The latent nature of computer virus refers to the ability of computer viruses to attach to other ** parasites, and the invasive virus will only attack when the conditions are ripe to slow down the computer.
5. Concealment: Computer viruses have strong concealment, and a few can be checked out by virus software.
6. Triggerability: People who compile computer viruses generally set some trigger conditions for virus programs, such as a certain time or date of the system clock, and the system runs certain programs. As soon as the conditions are met, a computer virus "strikes" and compromises the system.
-
If we have a virus in our computer, how do we analyze it? Let me give you a detailed introduction to the computer virus analysis method! Hope it helps!
Computer Virus Analysis Method 1:
One is to monitor the behavior of the virus, through the behavior monitoring method to analyze the virus, it is easy to know the behavior of the virus's files, registry, processes, etc., so as to use its impact on the system.
It is helpful for system recovery, but this method does not know the true purpose and function of the virus.
The method is relatively simple and intuitive, and it is also the preferred method for virus analysis. The other is computer virus analysis.
Because all the functions of the virus are done through **, as long as we can get the virus this file, we can analyze it.
For example, the script virus can directly analyze its **, and the win32 virus can disassemble the assembly of the virus**.
The encrypted one can decrypt all of it, and then grasp the behavior and function of the virus through analysis.
Computer Virus Analysis Method 2:
This is usually in the temporary documentation under your username: C: Documents and Settings username local settings
Several sub-files in the local settings may contain viruses, and after entering the safe mode, you can manually clear them from them, and the ones that cannot be cleared are system files.
-
A computer virus is a kind of program that is artificially created and has a destructive effect on computer information or systems during computer operation. This kind of program does not exist independently, it is hidden in other executable programs, and it is both destructive and infectious. It will affect the running speed of the machine and make the machine unable to operate normally; At worst, the machine is paralyzed, which will bring immeasurable losses to users.
This destructive program is often referred to as a computer virus.
Computer viruses have the following characteristics:
1. Parasitism: Computer viruses are parasitic in other programs, and when the program is executed, the virus plays a destructive role, and before the program is started, it.
It is not easily noticed;
2. Infectious: Computer viruses are not only destructive in themselves, but also more harmful in terms of infectiousness.
Difficult to prevent; 3. Latent: Some viruses are like time bombs, and it is pre-designed when it will attack. For example, the Black Friday virus, which is less than the scheduled time.
I can't detect it, and when the source attack is ready, it will suddenly open up and destroy the system.
Summary. On the one hand, education and training around computer science emphasize technical capabilities such as programming, algorithms, and data processing; On the other hand, it pays more attention to the application and practice of computational thinking as an interdisciplinary way of thinking for solving complex problems and innovative thinking. >>>More
The best university for computers in the country is the National Defense University of Science and Technology, followed by Tsinghua University. >>>More
Dizzy. I actually ran here and asked.
Don't worry. See for yourself ......Intercepted in the courtyard, does it make sense that the people are so good overall? >>>More
General Declaration. dim x, y, z, a, b, c, d, e, iprivate sub check1_click()if = 1 then >>>More
360TimeProtect time protection tool.
Thanks to MJ0011 for delivery. >>>More