-
A computer virus is a program that executes code. Just like biological viruses, computer viruses have a unique ability to replicate. Computer viruses can spread very quickly and are often difficult to **.
They can attach themselves to various types of files. When files are copied or transferred from one user to another, they spread along with the file.
In addition to their ability to replicate, some computer viruses have something else in common: a contaminated program is capable of delivering virus vectors. When you see that virus vectors appear to be merely in words and images, they may have destroyed files, reformatted your hard drive, or caused other types of disasters.
If a virus doesn't inhabit a contaminating program, it can still cause you problems by taking up storage space and degrading your computer's overall performance. For example, some viruses release a lot of junk files and take up hard drive resources. There are also viruses that run multiple processes, making the infected computer very slow.
The definition of a computer virus can be given from different perspectives. One definition is a program that spreads through disks, tapes, networks, etc., and can "infect" other programs. The other is a latent, contagious, and destructive program that can replicate itself and exist with the help of a certain vector.
Others define a man-made program that lurks or parasitizes in storage** (e.g., disk, memory) or programs through different means. When a certain condition or time is ripe, it will replicate and spread on its own, causing the computer's resources to be destroyed by different programs, and so on. In a sense, these terms borrow the concept of biological viruses, which are similar to biological viruses in that they are "pathogens" that can invade computer systems and networks and endanger normal work.
It is capable of all kinds of damage to computer systems, and at the same time it is capable of self-replication and is contagious.
In order to prevent and control computer viruses, it is necessary to achieve "three strikes and three preventions."
"Three dozen" is to install a new computer system, pay attention to the system patch, **wave and other vicious worms are generally spread through system vulnerabilities, patching can prevent such virus infection; When users surf the Internet, they should turn on the antivirus software to monitor in real time, so as to prevent viruses from entering their computers through the network; When playing online games, you should turn on your personal firewall, which can isolate viruses from the outside world and prevent Trojan viruses from stealing data.
"Three proof" is to prevent email viruses, users should first scan for viruses when receiving emails, do not open attachments carried in emails at will; Anti-Trojan virus, Trojan virus is generally spread through malicious **, users from the Internet ** after any file, must first scan the virus before running; Anti-malicious "friends", now many Trojan viruses can be spread through instant messaging software or email such as msn, QQ, etc., once your ** friends are infected with viruses, then all friends will be invaded by viruses.
-
A computer virus is a computer virus that compiles or inserts into a computer program that destroys computer functionality or destroys data, affects the use of a computer, and is capable of self-replication. Destructive, replicable and contagious.
Different types of viruses are differently destructive, so it is recommended that you install Rising Antivirus with Monitoring and do the following to protect your computer regularly
1.Update system patches to prevent viruses from infecting computers through system vulnerabilities;
2.Set a strong administrator login password (more than 8 digits) and change the password regularly;
3.Update anti-virus software in a timely manner and carry out comprehensive anti-virus on a regular basis;
4.Don't open unfamiliar emails and unfamiliar links from friends;
-
(1) Destroy the file allocation table or directory area of the disk, so that the information on the user's disk is lost.
2) Delete executable files or overwritten files on software and hard disks.
3) Write illegal data to the DOS memory parameter area, causing a system crash.
4) Modify or destroy files and data.
5) Affect the normal execution of memory-resident programs.
6) Marking false bad clusters on the disk, thereby destroying the relevant programs or data.
7) Change or rewrite the volume label of the disk.
8) Repeatedly infect copies of executable files, resulting in a reduction in disk storage space and affecting the efficiency of system operation.
9) Perform a specific format on the entire disk and destroy the data of the whole disk.
10) Make the system hang empty, causing the monitor keyboard to be blocked.
Extended Information: Ways to Protect Against Computer Viruses:
a. Establish rules and regulations for virus prevention and control, and strictly manage them.
b. Establish a virus prevention and emergency response system.
c. Carry out computer security education and improve the awareness of security precautions.
d. Conduct risk assessment of the system.
e. Choose virus prevention and control products certified by the Ministry of Public Security.
f. Correct configuration and use of virus prevention and control products.
g. Configure the system correctly to reduce virus invasion incidents.
h. Regularly inspect sensitive documents.
i. Conduct security assessments in a timely manner and adjust various virus prevention and control strategies.
j. Establish a virus accident analysis system.
k. Ensure recovery and reduce losses.
-
Features of computer viruses:
1. Reproduction.
A computer virus can multiply like a biological virus, and when a normal program is running, it also replicates itself, and whether it has the characteristics of reproduction and infection is the primary condition for judging a certain program as a computer virus.
2. Destructive.
After computer poisoning, it may cause normal programs to fail to run, delete files in the computer or suffer damage to varying degrees. Destroy the boot sector and BIOS, and destroy the hardware environment.
3. Infectious.
Computer virus infectivity refers to the fact that a computer virus infects a copy or variant of itself to other non-toxic objects by modifying other programs, which can be a program or a part of the system.
4. Latentity.
Computer virus latent refers to the ability of computer viruses to attach to other ** parasites, and the invasive virus will not attack until the conditions are ripe, which will slow down the computer.
5. Concealment.
Computer viruses have a strong concealment, and a small number can be detected by virus software, and concealed computer viruses appear and change from time to time, and this kind of virus is very difficult to deal with.
6. Triggerability.
People who compile computer viruses generally set some trigger conditions for the virus program, such as a certain time or date of the system clock, certain programs running on the system, etc. As soon as the conditions are met, a computer virus "strikes" and compromises the system.
Protection, prevention. The program or data has mysteriously disappeared, the file name is unrecognizable, etc.; Pay attention to write protection for system files, executable files, and data; do not use programs or data from unknown sources; Try not to use floppy disks for system booting.
Do not easily open emails from unknown sources; When using a new computer system or software, disinfect before use; Backing up systems and parameters, establishing contingency plans for systems, etc. Install anti-virus software. Manage data by category.
-
Ways to protect against computer viruses:
a. Establish rules and regulations for virus prevention and control, and strictly manage them.
b. Establish a virus prevention and emergency response system.
c. Carry out computer security education and improve the awareness of security precautions.
d. Conduct risk assessment of the system.
e. Choose virus prevention and control products certified by the Ministry of Public Security.
f. Correct configuration and use of virus prevention and control products.
g. Configure the system correctly to reduce virus invasion incidents.
h. Regularly inspect sensitive documents.
i. Conduct security assessments in a timely manner and adjust various virus prevention and control strategies.
j. Establish a virus accident analysis system.
k. Ensure recovery and reduce losses.
Main features 1, the reproduction of computer viruses can be like biological viruses to reproduce, when the normal program runs, it also runs its own replication, whether it has the characteristics of reproduction, infection is the primary condition for judging a certain program as a computer virus. 2. After destructive computer poisoning, it may cause normal programs to fail to run, delete the files in the computer or be damaged to varying degrees. Destroy the boot sector and BIOS, and destroy the hardware environment. >>>More
Right. Computer viruses are transmissible, hidden, infectious, latent, excitable, expressive, or destructive. The life cycle of a computer virus: development period, infectious period, incubation period, attack period, discovery period, digestion period, and extinction period. >>>More
Hello for the computer virus is not a sentence can be finished, the important thing about the virus is the time when you are in the next something, the software has some virus files, after the computer is infected with the virus, for example, the speed of booting is significantly slower than the previous one, and the reason why you can't turn on the boot is related to the virus, if you want your computer not to plant a virus, first clean up the junk files in your computer, and then in the latest version of [antivirus software] such as 360 antivirus software 360 Security Guard to achieve a two-pronged effect [360 Security Guard] is mainly used for the computer's junk file cleaning and some file updates, 360 antivirus software is the tool used to kill Trojans.
A computer virus refers to a set of computer instructions or programs that are compiled or inserted into a computer program that destroys computer functions or destroys data, affects the use of the computer, and can replicate itself. Bi Ju Chun. >>>More
To this day, new variants continue to wreak havoc on the internetIt is recommended that all netizens should update Windows vulnerabilities in a timely manner, and prepare recovery tools such as the powerful data recovery software we have developed today. In addition to retrieving computer files that have been accidentally deleted, you can also recover files that have been encrypted by viruses. >>>More