Home > Article > Computer Tutorials > Classification of computer viruses?
Do you know the classification of computer viruses? PHP editor Strawberry will help you understand various types of computer viruses, how they are classified, and their characteristics and hazards. Through the detailed introduction of this article, I hope to deepen everyone's understanding of computer viruses, improve their awareness of prevention, and ensure the security of computer systems and data.
1. Trojan virus, hacker virus. The prefix of Trojan virus is Trojan, and the prefix of hacker virus is Hack. Once the computer is infected with Trojan virus and hacker virus, the other party will remotely control our computer and our privacy will be disclosed.
2. Macro virus. The prefix of macro virus is Macro. Since it mainly uses the macro capability of the software itself to design viruses, macro viruses can infect OFFICE series documents. Word and Excel that we usually use will be infected, and it is a very dangerous virus.
3. Destructive program viruses. The prefix of destructive program viruses is Harm. This type of virus requires users to click to spread. When some good-looking pictures appear on the computer, as long as the user clicks on them, this type of virus will be generated, and the virus will cause direct harm to the computer.
4. "Worm" type virus, this type of virus will not change your file information and data information, but it will use the network to transfer the machine's memory, and then send its own virus out through the network
A computer virus is a set of computer instructions or program codes that the programmer inserts into a computer program to destroy computer functions or data. It can affect the use of the computer and can replicate itself.
Types of computer viruses
1. Trojan viruses, hacker viruses. The prefix of Trojan virus is Trojan, and the prefix of hacker virus is Hack. Once the computer is infected with Trojan virus and hacker virus, the other party will remotely control our computer and our privacy will be disclosed.
2. Macro virus. The prefix of macro virus is Macro. Since it mainly uses the macro capability of the software itself to design viruses, macro viruses can infect OFFICE series documents. Word and Excel that we usually use will be infected, and it is a very dangerous virus.
3. Destructive program viruses. The prefix of destructive program viruses is Harm. This type of virus requires users to click to spread. When some good-looking pictures appear on the computer, as long as the user clicks on them, this type of virus will be generated, and the virus will cause direct harm to the computer.
4. "Worm" type viruses. This type of virus will not change your file information and data information, but it will use the network to transfer the machine's memory, and then send its own virus through the network.
1. Clear Internet Explorer (IE) temporary files. If the virus reported by the antivirus software is in a path like this: c:/Documents and Settings/Administrator/Local Settings/Temporary Internet Files/, this usually means that the virus is through the web page. Browsing and downloading, if your browser does not have a patch installed at this time, then you are likely to be infected. For such viruses, the easiest way to remove them is to clear IE temporary files.
2. Display file extensions Display and view all files and folders (including protected operating system files). Many Trojan viruses use double extensions and hidden attributes to disguise themselves. By viewing this, the virus can have no hiding place.
3. Turn off "System Restore". System Restore is the most convenient and fastest tool to repair the system. If you have created a system restore point, when you find that the system has an error or is poisoned, you can restore it to the restore point created earlier. Repair the system. %20 If you find that the virus exists in a directory similar to c:/System Volume Information/, it means that the virus was backed up in the previously created restore point. The way to remove it is to turn off or disable system restore. At this time, the restore point will be deleted and the virus will be removed. It no longer exists. After waiting a few minutes, you can reopen System Restore and create a non-toxic restore point.
4. End the virus process. Open the task manager and find the abnormal process. Ending the process is a method of manual antivirus.
5. Modify the service "Startup Type" to stop/start the service. Sometimes, the virus is loaded as a service. You can use this method to shut down the virus program.
6. Set a secure account password. Simple passwords are very dangerous and can be easily cracked by hacking tools. Then, hackers can remotely access your computer.
8. Enter safe mode
When the normal mode cannot remove the virus, we usually have to check and kill the virus in safe mode. Some viruses even fail to be removed in safe mode. You should try the boot to bring command The difference between the two is that the safe mode with command line only has a console (CMD) character interface and no resource manager (desktop), so it requires some experience with DOS commands. You can enter the installation path of the anti-virus software and execute the command-line anti-virus tool. The command line of Kingsoft Antivirus is to type kavdx and press Enter to kill the virus.
9. Close shared folders
There are serious risks in writable sharing in the local area network. If it is not necessary, it is better to close it.
No need to download, many computers will pop up automatically
The method of putting computer viruses on other people’s computers is as follows: you can compress the virus files and send them through email, QQ and other communication tools for the other party to accept (but most virus files can be scanned by anti-virus software) . You can use the Glacier Trojan, a remote control Trojan, to use hacking technology to invade other people's hosts and control other people's hosts. Directly copy the Trojan to the other party's computer using a USB flash drive. Upload the Trojan to the website and let the other party access it. Tips: It is recommended not to learn to use Trojan viruses, because this is an illegal and criminal act.
It indicates that your disk space is low. It suddenly turns red or indicates that there is not enough space. The red color mainly means that the occupied ratio is too high, which is mostly caused by viruses. It comes in proportion.
Hello, a computer virus is a type of malware that can infect computer systems and destroy and steal data in various ways. Its principles mainly include the following aspects:
1. Infection method: Computer viruses can enter the computer system through file downloads, email attachments, software vulnerabilities, etc., and then infect other files or systems.
2. Hiddenness: Computer viruses can modify system files or hide in system processes, making them difficult to detect and remove.
3. Self-replication: Computer viruses can spread themselves to other computer systems through self-replication, thus spreading their scope of influence.
4. Destructiveness: Computer viruses can destroy computer systems by deleting, modifying, and tampering with files, leading to system crashes, data loss and other problems.
5. Stealing information: Computer viruses can obtain users’ sensitive information by stealing passwords, account information, etc., resulting in user property losses or privacy leaks.
To sum up, computer viruses are highly concealed and harmful malware that require users to pay attention to prevention and timely removal.
Computer viruses are the steps in creating them
1. The characteristics of computer viruses are transmissibility, unauthorizedness, concealment, latentness, destructiveness, unpredictability, and triggerability.
2. According to the infection method, computer viruses can be divided into viruses that infect executable files, viruses that infect boot sectors, and viruses that infect document files.
3. The current anti-virus technology includes signature scanning, heuristic scanning, and virtualization. Machine technology, active defense technology, auto-immunity technology, cloud anti-virus, etc.
4. The modules of a simple virus include trigger module, propagation module and performance module.
5. To learn computer viruses, you need to understand the hard disk structure, computer sector structure, computer system startup process, file system, and computer boot process.
6. Assembly language and C language are used more often.
7. There are also some simple virus-making machines at this stage, and such software can be found online.
A computer virus is a computer program that can be inserted into a computer program to destroy computer functions or data and affect the use of the computer. At the same time, it can also copy itself and attach itself to various types of files. When the files are copied or transferred from one user to another, the virus will spread along with the files. Computer viruses have various characteristics, such as transmissibility, concealment, infection, latentness, excitability, expressiveness or destructiveness, etc. Like biological viruses, they can have the characteristics of biological viruses such as self-reproduction, mutual infection, and activation of regeneration. The destructive power of computer viruses cannot be underestimated. They may destroy data, destroy files, occupy system resources, and even cause the computer system to crash. Therefore, it is very important to protect your computer from viruses. In order to prevent the spread of computer viruses, we should pay attention to the following points: first, do not open email attachments from unknown sources; second, do not visit bad websites; third, install anti-virus software and update it regularly; fourth, back up important files; finally , conduct comprehensive checks and anti-virus on your computer regularly. In short, computer viruses are destructive computer programs. We should strengthen our awareness of prevention and take effective protective measures to protect our computers from viruses.
Windows XP Horror Edition is a virus developed by foreign netizens to spoof Windows. Someone specially made a video introduction to it. It is an application disguised as an upgrade system. After running, it will warn you once and then boot to another desktop. The desktop only has My computer icon, and the theme is very scary, the win icon used during the loading process is a bloody eye
The above is the detailed content of Classification of computer viruses?. For more information, please follow other related articles on the PHP Chinese website!