-
A zombie process is a zombie process that has exited the parent process and is not accepted by the process after it is dead. (zombie) process.
How to generate a zombie process:
When a process calls the exit command to end its life, it is not actually destroyed, but leaves behind a data structure called a zombie process (the system calls exit, which is used to exit the process, but it is only limited to turning a normal process into a zombie process, and cannot destroy it completely). In the state of a linux process, a zombie process.
It is a very special kind that it has given up almost all of the memory space, has nothing executable**, and cannot be scheduled, and only reserves a place in the process list to record the retreat of the process.
Other than that, the zombie process no longer occupies any memory space. It needs its parent process to collect the corpse for it, if its parent process does not have the sigchld letter installed.
The handle calls wait or waitpid() to wait for the child process to end, and does not explicitly ignore the signal, then it remains in a zombie state, and if the parent process ends at this time, then the init process is automatic.
Will take over this sub-process, collect the corpse for it, and it can still be cleared. But if the parent process is a loop and doesn't end, then the child process will remain in a zombie state all the time, which is why there are sometimes a lot of zombie processes in the system.
How to check the zombie process:
Using the command ps, you can see that the process marked as z is a zombie process.
How to get rid of zombie processes:
1.Rewrite the parent process and collect the corpse of the child process when it dies. This is done by taking over the sigchld signal.
After the child process dies, it sends a sigchld signal to the parent process, and after the parent process receives this signal, it executes the waitpid() function to collect the corpse of the child process. This is based on the principle that even if the parent process doesn't call wait, the kernel will send a sigchld message to it, although the default handling of the pair is to ignore it, and if you want to respond to the message, you can set a handler.
2.Kill the parent process. When the parent process dies, the zombie process becomes"Orphan process", passed to process 1 init, init will always be responsible for cleaning up the zombie process, and all the zombie processes it generates will disappear with it.
-
According to the incubation period, the Trojan is in the incubation period, and the computer that was hit by it has no obvious symptoms of discomfort, and its purpose is to better hide in the user's computer and wait for the opportunity to steal. According to the 360 Security Center, due to the very cunning hiding method of this Trojan, all antivirus software in China cannot detect and kill the Trojan. 360 Security Center has released a special killing tool in the first time, and users can log in** to use it.
60% of the recent reports received by the 360 Security Center are from "stealth zombies", and it is estimated that 2 million users have been infected. At first, the computer will pop up a web page and some advertising pages, and then enter the incubation period. The "stealth zombie" Trojan will start running when the user boots up, and delete all files on the hard disk, only existing in the process, and at the same time the user shuts down, all their files are written to the hard disk, this trick is specially designed to avoid the pursuit of antivirus software.
The production idea of this Trojan is very similar to my123, and it is suspected that my123 is an upgraded work.
According to Fu Sheng, general manager of Qihoo 360's personal software division, the purpose of the Trojan is to lurk in the user's computer for a long time to achieve the purpose of further stealing the user's privacy and account password. In addition, the poisoned computer will become a source of infection for its further spread. The original "icebreaking" technology is used in 360's special killing tool, which can ensure the pursuit and killing of the Trojan and its variants to the greatest extent.
-
It's just a file that can't be used, but it can't be deleted!
-
After the antivirus software detects that a file contains a virus, it performs antivirus operations on the file. If the file itself is not a virus, but is infected by a virus, the antivirus software will remove the virus and leave the normal data behind. However, sometimes antivirus software can't completely remove viruses from files.
Files that are not completely cleaned of viruses are zombie files. Most of the viruses contained in these files have been removed from the execution part and are no longer harmful, while some are not completely removed and can still damage the computer.
-
A zombie file is a file generated by computer hackers to attack large servers or large computers by means of network tools or tools made by themselves, and if the user is browsing the web and has the file they wrote in a web page, then your computer will be like a virus. Most of the features are DDoS operations on a designated remote computer.
-
Refers to a file sent by a computer that is controlled by a virus.
-
Resolutely delete, do not click, otherwise activate the zombie.
-
Bounty Points: 0 - 14 days and 23 hours until the end of the question.
What is a Zombie Folder?
Asked by: Defeat Lie - Apprentice of Magic Level 1.
Category rises to the top of the rankings.
Username Dynamics went up last week.
Silence in the night sky 7285
Wang Fengzi 3330
lala9170 3135
wxthank 2330
valli 1805
Do you want to show the Q&A on "Know" on your **? Get it for free**!
If you would like to make a complaint or make a suggestion, please go to.
Know the complaint and feedback.
2009 baidu
-
Ah! What you guys said is not right The zombie folder is composed of 3 folders The second one can be set The first and third folders are the main files, don't touch the 3647 version is not fun now, go to the ** plugin yourself.
Plants vs. Zombies has cheats, which are as follows:1. Win: Direct customs clearance. >>>More
A botnet is a network that can be controlled one-to-many between the controller and the infected hosts by infecting a large number of hosts with bot (bot) viruses by one or more propagation methods. Attackers spread bots through various channels to infect a large number of hosts on the Internet, and the infected hosts will receive the attacker's instructions through a control channel to form a botnet. The reason why the name botnet is used is to make people more vividly aware of the characteristics of this type of harm: >>>More
According to various books, zombies are actually creatures that have been reactivated by the corpse of the deceased due to the influence of the burial place, and have developed a weak conscious instinct, so that they have the ability to move. After a long period of Yin Qi absorption, it is possible to re-evolve and produce intelligent beings.
Do you believe in the movie? Waiting for you to be the director, he will be there wherever you want the zombies to be!
The first choice for defending the point is Gatling or cannon, the power is not to be said, and the record is absolutely powerful. For guerrilla, it is recommended to use a Thomson submachine gun or a 35-round AK, which is powerful and moves blocks, as long as you are not besieged by zombies, you can't catch up at all. As for that M249, I don't know about it, I haven't heard of it.