-
Criminal Law of the People's Republic of China
Article 285 Whoever violates State regulations by intruding into computer information systems in the fields of State affairs, national defense construction, or cutting-edge science and technology shall be sentenced to fixed-term imprisonment of not more than three years or short-term detention.
Article 286: Where state provisions are violated by deleting, modifying, adding, or interfering with the functions of a computer information system, causing the computer information system to fail to operate normally, and the consequences are serious, a sentence of up to five years imprisonment or short-term detention is to be given; where the consequences are especially serious, the sentence is to be five or more years imprisonment.
Where state provisions are violated by deleting, modifying, or adding to data or applications stored, processed, or transmitted in computer information systems, and the consequences are serious, punishment is to be given in accordance with the provisions of the preceding paragraph.
Where computer viruses or other destructive programs are intentionally created or disseminated, impacting the normal operation of computer systems, and the consequences are serious, punishment is to be given in accordance with the provisions of the first paragraph.
-
Of course it's destructive. A virus Trojan can take control of another computer. Once the Trojan service is run and connected by the control end, the control end will enjoy most of the operation rights of the server, such as adding passwords to the computer, browsing, moving, copying, deleting files, modifying the registry, and cutting personal information, which may lead to the leakage of personal information such as bank card information, so that the computer crashes, files are lost, and the computer configuration is changed.
-
Harm. It is very important to enhance the awareness of computer virus prevention and realize the destructive and destructive nature of viruses. Nowadays, computers have been used in all walks of life, computers and computer networks have become an important part of people's lives, and viruses will destroy and tamper with computer data, theft will cause serious network security problems, affect the use of network efficiency.
1) If a virus is triggered, the computer will react very much; Most viruses directly destroy the important information and data of the computer when they are fired, it will directly destroy the CMOS settings or delete important files, it will format the disk or rewrite the directory area, and it will rewrite the files with "junk" data. Computer virus is a period of computer **, must occupy the memory space of the computer, some large viruses are still self-replicating inside the computer, resulting in a substantial reduction in computer memory, the virus also preempts the interruption, modifies the interrupt address and adds the "private goods" of the virus in the process of interruption, which interferes with the normal operation of the system. After the virus invades the system, it will automatically collect important data of users, steal and leak information and data, resulting in a large amount of user information leakage, bringing immeasurable losses and serious consequences to users.
2) Consumes memory as well as disk space. For example, if you don't access the disk, but the disk indicator flashes wildly, or you don't actually run many programs but find that the system has taken up a lot of memory, it is possible that a virus is at work. Many viruses are in memory when they are active, and some file-based viruses can infect a large number of files in a short period of time, and each file is lengthened to varying degrees, resulting in a serious waste of disk space. Normal software often needs to be tested by many people to improve, and computer viruses are generally released by others after the completion of a computer, so the harm that viruses bring to computers is not only the viruses expected by the manufacturer, but also some due to computer virus errors.
3) Computer viruses cause serious psychological pressure to users, the flood of viruses makes users worry, always worried about being infected by viruses, because most people do not know much about viruses, once there are phenomena such as computer crashes, abnormal software operation, etc., people often suspect that these phenomena may be caused by computer viruses. According to statistics, it is a common phenomenon for computer users to suspect that "there is a virus in the computer", and more than 70% of computer users are worried that their computer has invaded the virus, but in fact, all kinds of phenomena that occur in the computer are not all caused by viruses.
-
The main hazards of computer viruses.
1. Destroy memory.
There are four main ways to destroy the memory of your computer: occupying a lot of your computer's memory, prohibiting the allocation of memory, modifying the memory capacity, and consuming memory. Viruses occupy a lot of memory and consume a lot of memory resources when running, resulting in a lack of system resources, which in turn leads to crashes.
2. Destroy files.
Viruses can destroy files in the following ways: renaming, deleting, replacing content, reversing or copying content, missing part of the program**, writing time gap, splitting or counterfeiting files, losing file clusters, and losing data files. Files that have been damaged by viruses will not be usable if they are not disinfected in time.
3. Affect the running speed of the computer.
Once the virus is set on fire in the computer, it will run non-stop, occupying a lot of system resources of the computer, making the system resources of the computer and slowing down the operation of the computer significantly.
4. Affect the normal operation of the operating system.
Computer viruses can also disrupt the normal operation of the operating system, and the main manifestations include automatic restart of the computer, crashing for no reason, not executing commands, interfering with the execution of internal commands, unable to open files, false alarms, occupying special data areas, forcibly starting software, and disrupting various output entrances.
5. Destroy the hard disk.
The main manifestations of computer virus attack on hard disk include destruction of data stored in the hard disk, failure to read and write disks, swapping operations, and incomplete write disks.
6. Destroy the system data area.
Since a large number of files and important data are stored in the data area of a hard drive, the destruction of them by computer viruses can often have devastating consequences. The main attack of the virus is the main boot sector, boot sector, FAT table and file directory of the hard disk, when these locations are damaged by the virus, the data can only be restored through professional data recovery.
-
The damage caused by computer viruses is mainly manifested in the following aspects:
1.Modify or delete system files, damage the operating system, and cause the system to fail to boot or run normally.
2.Secretly steal users' personal privacy, data, accounts, passwords, etc. for illegal profit.
3.It occupies system and hardware resources, resulting in the slowness of the computer and affecting the work efficiency.
4.The virus is transmitted and spread through the network, mobile storage, etc., causing a large area of computer paralysis.
-
The main thing is to destroy the computer's files, such as deleting and encrypting them. The most popular ransomware virus is to extort money after encrypting computer files.
-
With the continuous escalation of viruses, computer viruses cannot destroy only keyboards, mice, and monitors.
Computer viruses are transmissible, hidden, infectious, latent, excitable, expressive, or destructive. The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period.
A computer virus is a program that executes code. Just like biological viruses, they have the characteristics of biological viruses such as self-reproduction, mutual infection, and activation and regeneration.
Computer viruses have a unique ability to replicate, and they can spread quickly and often hard**. They can attach themselves to various types of files, and they spread along with files as they are copied or transferred from one user to another.
The computer is composed of internal circuits, which can complete various arithmetic operations at high speed and accurately. Today's computer systems have a computing speed of trillions per second, and microcomputers can reach more than 100 million times per second, enabling a large number of complex scientific computing problems to be solved. For example:
Calculations of satellite orbits, calculations of large dams, and 24-hour weather calculations take years or even decades, whereas in modern society, it only takes a few minutes to complete with a computer.
-
Computer viruses are devastating! So what do computer viruses damage our computers? Let me give you a detailed introduction to computer virus destruction! Hope it helps!
Introduction to Computer Virus Destruction 1:
A computer virus is a program that is carefully designed and written by some people to spread through diskettes, networks, or the Internet, impacting memory, affecting performance, modifying data or deleting files, and even paralyzing the entire system.
The full name of "Trojan Horse" is called Trojan Horse*** Trojan Horse***** which is derived from the Greek story: Trojan Horse, the legendary hollow Trojan Horse. It is said that the Greeks entered the city of Troy by hiding inside the Trojan Horse, and later opened the gates for the Greek army.
In the computer field, it is also interpreted as an illegal command, a set of commands hidden in a legitimate program by a virus, instructing the computer to operate illegally. In other words, it refers to the use of unwitting methods to infiltrate the other party to carry out some kind of sabotage***theft***.
The essence of a Trojan is a remote control software: remote control software is a software that remotely controls a remote machine when it is known and allowed by the remote machine. The structure is a standard cs***clientserver*** program.
The function of most Trojans is to remotely control them.
Introduction to Computer Virus Destruction II:
Programs and information.
Hard disks: Floppy disks.
Disk drives.
Introduction to Computer Virus Destruction III:
*1***The machine does not start properly.
The machine doesn't start at all, or it can start, but it takes longer than the original start-up time. Sometimes a black screen appears suddenly.
*2*** Execution speed slowed down.
If you find that the time to read the data is longer than the original when running a certain program, and the time to save or retrieve the file increases, it may be caused by a virus.
3*** Disk space is rapidly decreasing.
Because the virus program has to enter the memory and can multiply, the memory space becomes smaller or even becomes "0", and the user cannot get any information in.
*4*** The content and length of the file have changed.
After a file is stored on a diskette, its length and its content will not change, but due to the interference of viruses, the length of the file may change, and the content of the file may also be garbled. Sometimes the contents of the file cannot be displayed or disappears after being displayed.
*5*** "Downtime" is frequent.
Normal operation will not cause downtime, even for beginners, if the command input is incorrect, it will not be downtime. If the machine is down frequently, it may be due to the system being infected by a virus. ‘
China's "People's Bank of China Law" stipulates that the institution that confirms the authenticity of the renminbi is the bank, and the confiscation of counterfeit currency belongs to the bank, and the public security department or any other unit or individual has no right to confiscate it, but the commercial service departments have the obligation to assist the bank in discovering and confiscating the counterfeit currency. That is to say, if the general public or the financial and accounting personnel of the unit find "counterfeit money" (actually suspicious money) when receiving and paying cash, they should first detain the "fake money" and then send it to the bank for identification in time. >>>More
I love this land.
If I were a bird, I would also sing with a hoarse throat >>>More
I'm also the same as the previous one?
Haha years >>>More
The largest oil field discovered in China is the Daqing Oilfield. >>>More
In an essay on the question of law, Kafka said that law is one of the few "secrets of the aristocracy that governs us", and he was convinced that "these ancient laws are strictly observed, but it is a painful thing to let people rule according to laws that people do not know". Therefore, in the parable "at the door of the Fa", he pointed out the psychology of the "countryman" who longs to enter the door of the "Fa", and he wants to understand the secret mantras imposed on his life, and for this reason he does not hesitate to wait for his whole life——— the final answer he finally gets, which may be the core of this secret. >>>More