UC browser blocks access to malicious websites. What kind of website do you mean?

Refers to illegal websites such as viruses, worms and trojans that deliberately perform malicious tasks on computer systems. Such websites usually have the same characteristics. They usually let people browse the content of the page normally in the form of web pages, and at the same time illegally obtain all kinds of data in the computer.

When Internet users browse unhealthy or other illegal websites, or download games or other programs from unsafe websites, they often bring malicious programs into their computers without users' knowledge.

It is not until malicious advertisements keep popping up or pornographic websites automatically appear that users may find that their computers have been "poisoned". During the period when no malicious software is found, all sensitive information on users' Internet may be stolen, such as bank account information, credit card passwords and so on.

These websites that let the victim's computer pop up pornographic websites or deliberately spread malicious advertisements are called malicious websites, and not everyone likes them.

Extended data:

Characteristics of malicious websites

1. Forced installation: refers to the act of installing software on a user's computer or other terminal without explicitly prompting the user or without the user's permission.

2. Difficult to uninstall: refers to the behavior that there are still active programs after uninstallation without providing common uninstallation methods, or without being affected by other software or being destroyed by others.

3. Browser hijacking: refers to the act of modifying the user's browser or other related settings without the user's permission, forcing the user to visit a specific website or preventing the user from surfing the Internet normally.

4. Web page pop-up: refers to the behavior of using software installed on the user's computer or other terminals to pop up advertisements without explicitly prompting the user or without the user's permission, or after the user accidentally clicks on its website. At the same time, the historical records of various Trojan websites and pornographic websites are left, so that users can continue to mistakenly enter and plant more Trojans next time.

5. Malicious collection of user information: refers to the act of maliciously collecting user information without explicitly prompting the user or without the user's permission.

6. Malicious uninstallation: refers to the act of uninstalling other software without explicitly prompting the user, without the user's permission, or misleading or deceiving the user.

7. Malicious binding: refers to the act of binding software that has been identified as malicious.

8. Other malicious acts that infringe users' right to know and choose when installing, using or uninstalling software.

Baidu Encyclopedia-Malicious Website