-
1. "Love bug" virus.
The virus spreads through the Microsoft Outlook email system with the subject "I love you" and contains an attachment. Once the email is opened in Microsoft Outlook, the system will automatically copy and send the virus to all email addresses in the address book.
The "Love Bug" virus is a worm that can rewrite certain files on local and network hard drives, and the email system will slow down after being infected with the virus, and may cause the entire network system to crash.
2. CIH virus.
A pure Windows 95 98 virus that spreads widely through mutual copies of software, the use of pirated discs, and the spread of the Internet. When the CIH virus occurs, it will overwrite the first 1024K bytes of the hard drive with messy data, destroy the motherboard BIOS chip, make the machine unable to boot, and completely destroy the computer system.
A virus that spreads automatically through email, and if clicked on it, a colorful image appears, which many people think is software like a New Year's card.
It installs itself under Windows and modifies the registry, which loads automatically the next time it starts. Since the virus has been installed, all outgoing emails will have an attachment - happy, and if the recipient clicks on this file, the computer will be poisoned.
4. Trojan viruses and hacker viruses.
The prefix of the Trojan virus is: trojan, and the prefix of the hacker virus is hack. The public feature of Trojan viruses is that they enter the user's system through network or system vulnerabilities and hide them, and then leak the user's information to the outside world, while the hacker virus has a visual interface that can remotely control the user's computer.
Trojans and hacker viruses often appear in pairs, that is, the Trojan virus is responsible for invading the user's computer, and the hacker virus will control it through the Trojan virus. Now both types are becoming more and more integrated.
5. Script virus.
The prefix of the script virus is: script. The public nature of a script virus is that it is a virus that is written in a scripting language and transmitted through a web page.
Script viruses will also have the following prefixes: vbs, js (indicating what kind of script it was written), such as Happy Hour (14 (etc.).
-
In the years since the development of computers, computer viruses have been an unavoidable topic, and there are various types of computer viruses, and the harm they bring to us is also varied, so commonWhat are the computer viruses??Below we will bring you a list of common types of computer viruses, hoping to help you.
What are the common computer viruses?
Common types of computer viruses 1, according to the presence of viruses ** division:
Network virus: Spreads through a computer network to infect executable files in a network.
File virus: infects files in your computer (e.g. com, exe, doc, etc.).
Boot virus: Affects the boot sector (boot) and the system boot sector (MBR) of the hard disk.
There is also a mixture of these three situations, for example: multiple types of viruses (file and boot type) infect both the file and the boot sector targets, such viruses usually have complex algorithms, they use unconventional methods to invade the system, and at the same time make Zheng lead use encryption and deformation algorithms.
Common types of computer viruses 2, according to the virus infection channel:
Resident virus: This virus infects a computer and places the part of its memory in memory (RAM), which is hooked up to system calls and merged into the operating system, where it remains active until it is shut down or restarted.
Non-resident virus: This virus does not infect computer memory when it has the opportunity to activate, some viruses leave a small part of the memory but do not transmit through this part, this type of virus is also classified as non-resident virus.
3. Common types of computer viruses are divided according to the destructive ability of viruses
Harmless: Except for the reduction of free disk space in the event of infection, there is no effect on the system.
Non-dangerous: This type of virus simply reduces memory, displays images, emits sounds, and similar effects.
Dangerous: This type of virus causes serious errors in the operation of computer systems.
Very dangerous: This type of virus deletes programs, corrupts data, and cleans the system memory area and important information in the operating system.
4. Common types of computer viruses are divided according to the virus algorithm
Companion viruses: These viruses do not change the file itself, they produce the companion of the exe file according to the algorithm, with the same name and a different extension (com), for example: the companion is xcopy-com.
The virus writes itself to the com file and does not change the exe file, when the DOS loads the file, the companion body sells the high priority to be executed, and then the companion loads and executes the original exe file.
"Worm" virus: Spread through the computer network, do not change the file and data information, use the network to spread from the memory of one machine to the memory of other machines, and the computer will send its own virus through the network. Sometimes they exist in the system and generally do not occupy other resources except memory.
Parasitic viruses: In addition to the companion and "worm" types, other viruses can be called parasitic viruses, which attach to the boot sector or file of the system and spread by shouting the functions of the system.
What are the common computer viruses that have brought you? The entire list of common types of computer viruses.
We should pay attention to efficiency and improve efficiency in learning. >>>More
Peking Opera: Also known as "Peking Opera", it is one of the popular opera genres in the country. It has a history of more than 200 years. >>>More
The road meets the south embankment to find the ferry (in case of difficult problems). >>>More
Legal analysis: 1. Paragraph 1 of Article 5 of the Measures for the Administration of Tobacco Monopoly Licenses stipulates that the tobacco monopoly license obtained by citizens, legal persons or other organizations in accordance with the law shall be protected by law. >>>More
If you want to learn systematically, you can consider signing up for a live online class, and recommend CGWANG's online class. The teacher speaks carefully, you can watch it back after the class, and there are also the same type of recorded classes that you can learn for free (give away lifelong VIP). >>>More