SOS Network Virus Prevention Example Sample Essay Give 100 points

Updated on healthy 2024-03-23
6 answers
  1. Anonymous users2024-02-07

    Local Area Network (LAN) Chinese is the abbreviation of "local area network", the full English name is "local area network", which mainly refers to a working group Internet network composed of servers and multiple computers in a small area, which belongs to a branch of computer network applications. Because every computer in the network is connected through the server, the transmission rate of information in the LAN is relatively high, and it also provides an effective channel for the spread of viruses, usually the viruses spread to each other in the LAN through the following ways:

    1. Because a large part of the use of LAN is in the sharing of resources, and it is precisely because of the "data openness" of shared resources that the directness of virus infection is created.

    2. Because some servers are low-end servers or simply restructured from ordinary PCs, they are not very strong in performance, so when each computer transmits data through the server, once the server is infected with external viruses, all the data that needs to pass through the server will also be infected, which will cause the entire network to be infected with viruses.

    3. The characteristics of the LAN are that the data of the computer in the network is fast and easy to transmit, if one of the computers is infected with a virus, any data transmission with the computer will be infected with the virus.

    4. If one of the computers in the LAN is infected with a virus, and the information is transmitted through the server, the server will be infected, and now any computer in the LAN that transmits information through the server will be infected with a virus.

    5. Network users do not have a strong sense of security of viruses, so they will cause frequent virus infections.

    It is precisely because of these unique characteristics of the application in the LAN that the viruses in the LAN are transmitted rapidly, and the computers in the network are infected with each other, and the viruses are repeatedly killed.

  2. Anonymous users2024-02-06

    Regarding the problem of anti-copying virus Trojans, the main one is bai

  3. Anonymous users2024-02-05

    It is inevitable that you will chat with netizens during the process of surfing the Internet, but in the process of chatting, do not easily accept files sent by others, let alone open them easily, unless this person is someone you are familiar with and you need to get information from him. Don't open attachments in emails, especially if you're sent by someone you don't know. Before opening the file, use PC Manager to check whether there is a risk, right-click on the file, and select Scan for Viruses (PC Manager).

    In addition, it is also recommended that you set a strong administrator password for all administrator users in the system, including administrator users, generally it is recommended to use a password composed of numbers, letters and symbols greater than or equal to 8 digits, of course, please be sure to remember this password, do not block yourself out of the system. The setting method is to right-click on my computer (win7 is the computer), select management, local users and groups, right-click the corresponding user name in the window on the right side of the user, such as administrator, and select set password.

  4. Anonymous users2024-02-04

    1.Install anti-virus software (regularly upgrade and check the system).

    2.Install anti-phishing software (to protect your online security).

    3.Install rogue software cleanup (remove third-party plug-ins or rogue software)4Bad login**.

  5. Anonymous users2024-02-03

    Trojan firewall is by no means equal to firewall, firewall can be used for program network management, intercept network attacks (including LAN attacks), 360 LAN protection is not recommended and not necessary to be turned on in a non-LAN environment (another note, sharing the Internet with others, your computer and other people's computers constitute a small LAN).

    2.I just want to say one thing,Don't install active defense software for novices who don't have computer knowledge,360's defense belongs to the cloud main defense,It's intelligent,And the vast majority of active defense software will let users judge the vast majority of the behavior of the program (except for those that already have main defense rules)

    3.I don't recommend that you just install a product from a softening manufacturer, although there will be no conflict. Once the virus has done a no-kill ...... against 360That's it.

    There have already been examples, although the 360 cloud main defense was intercepted soon after, but during this period of time without interception, many netizens have been victimized). As for the soft matching, find it yourself, the one that suits you is the best.

    It can block attacks and scans, but it can't stop hackers from scanning your computer! This only proves that there are hackers in the network environment you are in.

  6. Anonymous users2024-02-02

    1.The computer's communication channel is through port pipes, and firewalls inspect data through these ports. The firewall is divided into intranet and extranet, the so-called LAN is also the intranet, and LAN protection can be left without in the case of non-LAN.

    2.Active defense is the bottom layer of the system where the antivirus software is stationed (ring0, and ring3 for ordinary users), which has a large authority, which can effectively prevent viruses from entering, and active defense is still necessary. Generally speaking, active defense and firewalls are not directly related, one is a virus, and the other is an intrusion.

    3 Yes, the firewall is checked for the ping command, once there is a foreign IP scan, generally rely on ping to see the port information of your computer, will be blocked, so that the firewall will report, but in fact, the other party is a batch scan, not for you personally.

Related questions
12 answers2024-03-23

Be sure to scan your computer thoroughly when the following conditions occur. 1. The computer often crashes, 2. The computer data is lost, 3. The relevant files cannot be opened, 4. The system runs slowly, 5. The hard disk space is not enough, 6. The memory is often reported, 7. There are a large number of files from unknown sources, 8. The operating system automatically performs the operation. >>>More

8 answers2024-03-23

It should be rogue software, right? You can download Super Rabbit Pro (be sure to be up-to-date), install it in safe mode, and after running it, go to - clear junk, uninstall software - and delete all the network software detected inside. >>>More

8 answers2024-03-23

Two reasons,One is that your crystal head is broken,It's good to change it this way.,The other reason is that you're in the "devil's wave" virus.,The next XP patch should be good.,But don't rule out the reason why Netcom often drops down.,My home is Netcom.,Dropping is a common thing.,If there are no three reasons.,It is recommended that you redo the system.,Maybe when you first made the system, your IP protocol was not matched.。

29 answers2024-03-23

1. The web page has a backdoor program, which contains a special **, that is, a script, to open the web page, the script program must be opened first, and it will be ** to the disk at the same time, of course, it also has the ability to self-replicate! Some are ActiveX controls. >>>More

9 answers2024-03-23

Hello! Computer viruses are generally spread through ** software and USB flash drive Computer viruses can self-replicate and self-backup without the user's knowledge Fix a series of operations There is also an embedded virus Inject its own executable program into all executable files or other files for destruction This virus is very harmful It will infect many programs and files Usually antivirus software will delete the program together However, most viruses need to be double-clicked by the user to start for the first time Just remember to put ** A single scan of a finished file can greatly reduce the chance of poisoning.