What is an operating system vulnerability attack virus?

Updated on technology 2024-03-07
8 answers
  1. Anonymous users2024-02-06

    First of all, there is a small reversal of your question, not a "vulnerability attack virus", this should be looked at separately "Vulnerability attack" is a conflict between a file and the file of the XP startup program, which leads to a decrease in speed and a decrease in network speed, medium; Crash Severe: The damaged disk fails and the XP cannot be booted. These can be solved by simply reinstalling the program.

    A "virus attack" is a virus that is developed by someone who wants to get information on your computer or destroy your computer, and a "virus attack" is a software developed by a person who wants to control your computer and is attacked by a virus. For example, the toll machine in the Internet café accidentally installed the virus attack software "This software is automatic" as long as it is installed, it will automatically steal the information in your computer, as the most confidential of the toll machine is the point card transaction, it will steal all the money inside.

  2. Anonymous users2024-02-05

    Vulnerability attack monitoring is built on the operating system, and data packets must be checked by vulnerability attack monitoring before they reach the operating system. Therefore, regardless of whether the operating system is patched or not, as long as the vulnerability attack monitoring detects attack data, it will alert and block it.

    First, make sure that you have installed the system patch

    Here's how: Open the Control Panel "Add Removal Programs" and check if there are any of the following patches:

    Patch No: KB823980 (against the "Blastwave" virus) Patch No: KB824146 (against the "Blasterwave" virus) Patch Number:

    1.Open the main interface of Rising Antivirus.

    2.Click Settings to set up detailed settings

    3.Select the Computer Monitoring menu (arrow to the right of Computer Monitoring)4Select Vulnerability Attack Monitoring.

    5.Check the right side of Don't prompt the user when an attack is found

    Note: If your operating system is Windows XP and you have installed a system patch for SP2, the patches for the Shockwave and Oscillator Wave viruses are already included.

  3. Anonymous users2024-02-04

    Vulnerability attacks mean that a vulnerability in your computer is scanned for by a hacker, and then he exploits the system vulnerability to use a special tool or means to attack your home computer. But since antivirus software can show exploits, there should be no problem. Because it could mean that his attack had been intercepted.

    But be careful. Frequently patch your system and scan for vulnerabilities.

  4. Anonymous users2024-02-03

    First, system vulnerabilities matter.

    Second: having a vulnerability does not necessarily mean that it is poisoned. (It's like you sleep with the door open at night, but there is not necessarily a thief going in).

    Third, a vulnerability is a flaw in the hardware, software, specific implementation of the protocol, or system security policy, which can enable an attacker to gain unauthorized access to or compromise the system.

    Fourth: A computer virus is a very small (usually only a few kilobytes) piece of code that constantly replicates itself, hides and infects other programs. It performs in our computers and causes different effects.

    It can disappear or change programs or data in the computer. Complete!

  5. Anonymous users2024-02-02

    No, rest assured, a vulnerability is a flaw in a system or program that is easily attacked by a virus Trojan, not a virus, a virus is a faulty program or process that invades this flaw.

    However, to be on the safe side, it's best to patch the vulnerability to prevent the intrusion of viruses and Trojans.

  6. Anonymous users2024-02-01

    The vulnerability does not mean that your machine is infected with a virus, but only tells you that your machine may be poisoned, simply put, most of the operating systems made by Microsoft may be exploited by others to carry out attacks. This depends on what kind of vulnerability it is, so it's good to fix the vulnerability, and it's not a big deal if you don't fix it if it's not too important.

    For example, the shockwave virus used the Microsoft network interface RPC vulnerability to spread, causing many computer poisoning.

    I remember that there was also a Microsoft IE buffer overflow vulnerability, which was caused by a system prompt saying 0x??? when opening a web pageThe "0x??? referenced by the directiveMemory.

    The memory cannot be "read" or "written".

  7. Anonymous users2024-01-31

    Having a vulnerability doesn't necessarily mean it's poisoned.

    But it is also harmful to the computer (software).

    However, it is less harmful than the virus.

    But it's better to patch it anyway.

  8. Anonymous users2024-01-30

    It is mainly a Windows system vulnerability, which spreads using port 445.

Related questions
4 answers2024-03-07

Hello landlord! The Windows family of systems has been launched since 1985 and as of 2022A total of 13 PC operating systems and 8 server operating systems were launched。A brief list is as follows: >>>More

3 answers2024-03-07

Hello! From your question, it seems that you should be unfamiliar with computer commands. Therefore, I recommend that you use Windows OS for more convenience. >>>More

7 answers2024-03-07

Such a professional question does not add ...... points

I'll give you an original answer. >>>More

17 answers2024-03-07

Managing computer hardware and software, and most importantly, the computer operating system is a bridge between people and computers, and we can easily use computers without having to deal with the internal structure of computers. As for hardware and software, all system resources are handled by the operating system for us. Without an operating system, our computers cannot be used.

5 answers2024-03-07

There are four characteristics of a computer operating system: concurrent, shared, asynchronous, virtual. >>>More