Home  >  Article  >  In what three ways do U disk viruses attack computers, systems and networks?

In what three ways do U disk viruses attack computers, systems and networks?

王林
王林Original
2020-12-22 15:29:4918154browse

U disk viruses attack computers, their systems and networks through three channels: hiding, copying and spreading. U disk virus is a virus spread through U disk. It does not only exist on U disk. There are also U disk viruses in each partition of the infected computer.

In what three ways do U disk viruses attack computers, systems and networks?

#The operating environment of this tutorial: Windows 10 system, Dell G3 computer.

What are the three ways U disk viruses can attack computers, systems and networks?

U disk virus, as the name suggests, is a virus spread through U disk. Since the discovery of the U disk autorun.inf vulnerability, the number of U disk viruses has been increasing day by day. U disk viruses do not only exist on U disks. There are also U disk viruses under each partition of the infected computer. Computers and U disks are cross-transmitted.

U disk viruses attack computers, systems and networks through three channels: hiding, copying and spreading.

(1) Hide

There are many ways to hide U disk viruses: ①Hide as a system file. Generally, system files are invisible, so this achieves the effect of hiding; ②Disguise as other files. Since ordinary computer users do not display the suffix of the file, or the file name is too long and the suffix cannot be seen, some virus programs change their own icons to the icons of other files, causing users to open them by mistake; ③ Hidden in system folders. These system folders are often confusing; ④Use Windows vulnerabilities. The name of the folder where some viruses hide is runauto.... This folder cannot be opened and the system prompts that the path does not exist. In fact, the real name of this folder is runauto...\

(2) Copy

U disk virus has ferry technology, that is, it copies certain files with specified keywords in the system to the USB disk. When the USB disk is inserted into a computer with Internet access, the USB disk virus will copy the copied files. Transfer the file to the specified mailbox or Trojan virus control terminal.

(3) Spread

When a hidden or poisoned U disk is inserted into a computer without any viruses, and the user double-clicks to open the U disk file to browse, Windows will default to autorun.inf The settings in the file are used to run the virus program in the USB flash drive, and the Windows operating system is infected at this time.

Related expansion introduction:

Computer viruses are artificially created, destructive, contagious and latent programs that damage computer information or systems. It does not exist independently, but is hidden in other executable programs. When a computer is infected with a virus, it may affect the running speed of the machine at first, or crash and damage the system at worst. Therefore, the virus brings great losses to the user. Under normal circumstances, we call this destructive program a computer virus.

Computer viruses can be divided into three types according to the existing media: boot viruses, file viruses and hybrid viruses; according to the link method, they can be divided into source code viruses, embedded viruses and operating system viruses. 3 types; according to the system classification of computer virus attacks, they are divided into viruses that attack DOS systems, viruses that attack Windows systems, and viruses that attack UNIX systems. Today's computer viruses are constantly introducing new ones, including some unique new viruses that cannot be classified according to conventional types for the time being, such as Internet viruses (which spread through the network, and some data carrying viruses are increasing), email viruses, etc.

Computer viruses are recognized as the number one enemy of data security. Since 1987, computer viruses have received widespread attention around the world. Computer viruses were first discovered in my country in 1989. Currently, new viruses are developing in directions that are more destructive, more secretive, have higher infection rates, and spread faster. Therefore, it is necessary to learn the basic knowledge of computer viruses in depth and strengthen the prevention of computer viruses.

Related recommendations: Website Security Tutorial

The above is the detailed content of In what three ways do U disk viruses attack computers, systems and networks?. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn