Ask me if you have something to do at BU! What kind of cybercrime virus is also in my computer, how

Updated on number 2024-02-09
13 answers
  1. Anonymous users2024-02-05

    Hello user: It is recommended that you install the Rising Antivirus v16 version and upgrade to the latest virus database, restart the computer and press the F8 key to select the safe mode, perform a full virus scan and kill, and then use the Rising Security Assistant to repair the computer, **Address:

  2. Anonymous users2024-02-04

    Digital: Why are there so few viruses in computers now, do you know the inside story?

  3. Anonymous users2024-02-03

    In the past, people used computers to access the Internet, and the most feared thing was the virus in the computer, and computer poisoning was a nightmare. The hard drive data is emptied, the network connection is cut off, and the good machine becomes a source of poison, which begins to infect other computers, and in serious cases, it will destroy the computer hardware, and will record your keyboard operations to steal your QQ password and bank card password. At that time, computers on the Internet rarely dared to run naked, and installing anti-virus software could often detect and kill viruses.

    But in recent years, I don't seem to have heard of a large-scale outbreak of computer viruses, and I can't detect any viruses on my computer with antivirus software. Many netizens have not been poisoned when they run naked on their computers, is it because the computer virus is slowly starting to disappear? What did the people who made it go?

    2. The system version is updated and the vulnerability patches are improved. With the update of the system version, the security mechanism of the operating system is becoming more and more comprehensive, for example, the win7 system is more strict about the permission management, and the virus cannot get the corresponding operation authority in the computer, and there is no destructive power. Moreover, mainstream browsers have a sandbox mechanism, even if they are attacked by a network, it is difficult to affect the operating system, and there is big data to prompt some dangers**.

    III. The extent of online regulation has been strengthened, and relevant laws have been promulgated. There are now special public information network security supervision departments, and their responsibilities are to conduct online searches, supervise and deal with all kinds of bad behaviors on the Internet. The advancement of technology has also made it easier to detect the source of the virus.

    The introduction of corresponding laws has increased the illegal cost of producing and spreading the virus.

    Fourth, there are not enough benefits. The improvement of the security environment of personal computers has led to the fact that the living conditions of viruses are not as good as in the past, and the cost of obtaining monetary benefits by means of computer viruses has risen, and the costs and benefits cannot meet expectations.

    To sum up, the whole environment has changed, the network security protection mechanism has been improved, and our personal computers are indeed much more secure than before. So what did the people who created the virus do before? First of all, all countries attach great importance to the Internet, hackers, red people, hackers and other really capable people, about half of them have been requisitioned by the state.

    It's the same in every country. Now the international environment is very tense, and hackers are being guided by the state to study the military aspects of other countries and the aspects of cyber confrontation.

  4. Anonymous users2024-02-02

    For nowThere are still viruses in the computerIt's just that compared to the large-scale computer virus many years ago, everyone was directly harmedReduceIt gives us the illusion that the virus is decreasing! According to the data of the National Internet Emergency Response Center, in August 2019, 1559097 attacks were launched using reflective servers, which shows that the number of these single cyber attacks is extremely high!

    But why do we feel it in our daily lives?In fact, the reduction of computer viruses is mainly due to the improvement of security awareness, the systematic development of network security, and the improvement of administrative and judicial supervision!We have built a systematic network security prevention and control to ensure the integrity of our network.

    In the past few years, with the rapid development of the Internet, people's understanding of network security has been greatly improved. At the individual level, personal computers, mobile phones, iPads and other electronic devices will have corresponding virus prevention and control software, such as computer systems have their own security prevention and control monitoring.

    The system comes with security software + third-party security software installed by individuals, forming two layers of protection, for virus makers, when a person's electronic equipment is not of extremely high value, it is not too valuable to spend a lot of energy to break through multiple lines of defense.

    June 13, 2019, bySaida Laboratory, National Computer Virus Emergency Response Center, National Network and Information System Security Product Quality Supervision and Inspection Center, Capital Innovation Alliance and 100 Industry AlliancesThe 7th China Cyber Security Conference (NSC 2019) was held at the China National Convention Center in Beijing.

    The role of virus prevention and control is increasing, and the participating roles include system manufacturers, network security software companies, national network complete departments, virus prevention and control departments, etc., and the network security system is also constantly improving.

    The National Computer Virus Emergency Response Center website link has a weekly updated virus forecast, which is mainly aimed at providing a simple plan to prevent the latest computer viruses and help people deal with computer viruses.

    In addition,National Computer Virus Emergency Response CenterThere are also laws and regulations on network security, electronic data forensic appraisal and other information content, in fact, in recent years, China has been constantly improving some policies and regulations on Internet security.

    In recent years, the development of information technology, people for security prevention and control is also constantly improving, cloud computing, big data, AI technology and other applications, in the virus security prevention and control is also helpful, such as the cloud security concept proposed in recent years, is the Internet security prevention and control method in the era of cloud computing, the main goal is to ensure the security of everyone's cloud data. Cyber security has a long way to go, and we still need to work together!

  5. Anonymous users2024-02-01

    In today's era, we rarely hear about the problem of computer viruses, is it because hackers don't dare, or is it because our people's awareness has increased? When computers were just introduced to China's mainland, maybe everyone's security awareness was not vigilant enough at that time, after all, computers were an emerging thing, and there was no awareness of network security. At that time, most of us thought that we could do anything on the Internet, and never thought that the Internet also had insecure software, and never thought that our property would be unsafe online.

    In fact, on the computer, our property and personal privacy can be stolen. Especially for the company, those confidential documents, once stolen, will involve the issue of infringement. Because of the emergence of these network viruses, people began to study antivirus software, and the antivirus software that appeared at the beginning was charged a certain fee, and the more high-end the network software, the higher the charge.

    But then there was a free software, which was 360, which made all computers free of charge. Therefore, it has been welcomed by the public, even if it is free, it can also prevent viruses from invading their computers.

    Since 360 software opened a free antivirus head, and later, more and more other antivirus software had to be free in order to compete. As more and more free software is available, people are slowly starting to think about their quality. In order to meet the needs of customers, antivirus software is constantly updated and developed, so that the quality of antivirus software is getting higher and higher.

    With so many antiviruses out there, it's hard for any virus to break into people's computers. No matter how powerful the virus was before, it is more difficult to develop now, so there are fewer and fewer people who do it, and basically no one does it.

    Today we would like to give special thanks to these antivirus companies, because of their existence, our computers can run normally from hackers, so that we can have a healthy, good, green Internet environment.

  6. Anonymous users2024-01-31

    First, the progress of hardware, the previous virus, can replicate itself in a short period of time, occupy a large amount of internal memory of the computer, resulting in the death of the computer.

    The right machine collapsed, however, at that time, the computer, the memory was only a few trillions, more than a dozen trillions, and now the memory of the computer, 16G, 32G is very common, the general small hacker, there is no ability to make a virus that affects this hardware configuration, and the big hacker, do not disdain to play this kind of child's house. Second, the previous virus, there is also a role is to steal the number, steal the password, but now the account password, by the large company rubbing protection, change the password is directly sent to the mobile phone verification code, unless the hacker virus breaks through the firewall of the large company, otherwise there is no way to steal the information of individual users, in this case, or that reason, small hackers can't do it, big hackers don't need to do it. Third, the previous virus, Trojan horse or something, there is also a role, that is, to make a meat machine, to **, software brush users, but now the major antivirus software companies, themselves are doing this kind of thing, can he tolerate a small hacker to rob his business?

    There is one counts as one, all of them are beaten, and the big hacker has long been co-opted, who are you to make the virus.

  7. Anonymous users2024-01-30

    Now direct fraud is costly and inefficient... The virus is the United States to the rest of the world. For the people to use it is to fight mosquitoes with missiles... So, you know.

  8. Anonymous users2024-01-29

    Feel the virus.

    Less is an illusion, in fact there are hundreds of millions of broilers in China. The reason why I feel that there are fewer viruses is because the viruses have evolved more than before.

    It's more subtle and low-key. Modern virus makers are more inclined to make long-term and very hidden virus worms and Trojan horses, etc., to seek personal economic interests and even seek political interests for the organization.

  9. Anonymous users2024-01-28

    It's not that no one makes a virus.

    bai is now doing du like that kind of disease zhi poison doesn t make much sense to make you hack dao screen can't control the change of system and.

    It's easy to answer when you go back to the hard drive, and now it's all stored in the cloud disk, and the main thing is personal data and big data, and antivirus software is stealing personal information, and big data is also controlled by several companies, and there is no privacy at all, and what kind of virus do you want.

  10. Anonymous users2024-01-27

    Trojans never stop their activity, and rogue software is on the rise.

  11. Anonymous users2024-01-26

    Do you remember the panda burning incense more than ten years ago? The gho image files are all infected, so I can only remove each partition. For many years, it was customary to change the extension of the gho file to gh, and only change it back to gho when it was necessary to clone it.

  12. Anonymous users2024-01-25

    A computer virus is a set of computer instructions or programs inserted by the compiler into a computer program that can destroy computer functions or data, affect the use of the computer, and can replicate itself.

    Computer viruses are transmissible, hidden, infectious, latent, excitable, expressive, or destructive. The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period.

    A computer virus is a program that executes code. Just like biological viruses, they have the characteristics of biological viruses such as self-reproduction, mutual infection, and activation and regeneration. Computer viruses have a unique ability to replicate, and they can spread quickly and often hard**.

    They can attach themselves to various types of files, and they spread along with files as they are copied or transferred from one user to another.

    Unlike medical "viruses", computer viruses are not naturally occurring, but are a set of instructions or programs that people compile to take advantage of the inherent vulnerabilities of computer software and hardware**.

    It can latent in the computer's storage medium (or program), activate when the conditions are met, and put an exact copy of itself or a possible evolution into another program by modifying other programs. The so-called virus is artificially caused and is very harmful to other users.

    Virus signs: undesirable special characters or images on the screen, irregular changes or falls off characters, stillness, scrolling, snowflakes, jumping, ball highlights, inexplicable information mentions, etc.

    Screaming, beeping, or abnormal playing, etc.

    Crashes often occur for no reason, randomly rebooting or not starting properly, running speed dropping significantly, memory space becoming smaller, disk drives and other devices becoming invalid devices for no reason, etc.

    The disk label is automatically rewritten, abnormal files appear, fixed bad sectors appear, the available disk space becomes smaller, the file becomes larger for no reason, missing or scrambled, and the executable file (exe) becomes inoperable.

    Printing abnormality, printing speed is significantly reduced, cannot be printed, Chinese characters and graphics cannot be printed, or garbled characters appear when printing.

    Protection and prevention: the program or data mysteriously disappears, the file name is unrecognizable, etc.; Pay attention to write protection for system files, executable files, and data; do not use programs or data from unknown sources; Try not to use floppy disks for system booting.

    Do not easily open emails from unknown sources; When using a new computer system or software, disinfect before use; Backing up systems and parameters, establishing contingency plans for systems, etc. Install anti-virus software. Manage data by category.

  13. Anonymous users2024-01-24

    A computer virus is a computer program that is generated under human or non-human circumstances and can replicate or run itself without the user's knowledge or approval; Computer viruses often affect the normal operation of the infected computer, or are controlled without realizing it, and there are also behaviors that are not initiated by the user, such as the normal operation of the computer and only stealing data.

Related questions
2 answers2024-02-09

Distinction: for means "for", in order to be generally connected with transitive verbs such as decorate, help, thank, etc.; Of means "of", which is generally followed by a noun, and it also connects quantifiers and uncountable nouns. >>>More

15 answers2024-02-09

You're a rookie! The process you open yourself can be turned off except for the antivirus and the input method.。 You can optimize it with Super Bunny or something. >>>More

19 answers2024-02-09

Allergic to cosmetics? Are you sure you include skincare? If yes, I would suggest that you go to the hospital to check the source of the allergen first, you must be allergic to one of the ingredients, metaphorically someone is allergic to aloe vera, then moisturizing products containing aloe vera ingredients are not suitable for him, and if you find out the source of allergens, avoid this ingredient when choosing skin care products in the future! >>>More

7 answers2024-02-09

1.Solution: Set up a ticket gate to check x tickets in one minute, the original Y people, and Z people come every minute. >>>More

6 answers2024-02-09

<>> plus point plan <<

Chinese server [CHN] lv 80 Fighter: Female > Street Fighter > Poison King. >>>More