Computer viruses (Computer Virus ) in the "People's Republic of China *** and the State Regulations on the Safeguard and Protection of Computer Information Systems" is clearly defined as: "refers to the compilation or inserted in the computer program to destroy the function of the computer or damage to the data, affecting the use of the computer and the ability to self-replication of a set of computer instructions or program code". A set of computer instructions or program code that can reproduce itself". Since the 1980s, when Morris created the first "worm" virus program, there have been many different types of viruses in the world. In the last few years, the following major viruses have emerged:
1.1 "Beautiful killer" (Melissa) virus. Writing papers This virus is a word macro virus specifically targeting Microsoft e-mail server MS Exchange and e-mail sending and receiving software Out1ookExpress, a denial-of-service attack type of virus that can affect computers running Microsoft word97, word2000 and Outlook. this virus is -kind of Word document attachment, carried by E-mail to spread the spread. Since the virus is self-replicating, once the user opens the attachment, the "Beautiful Killer" dysprosium virus is automatically copied and sent to the first 50 recipients using Outlook, according to the recipient's Outlook address book, thus overloading or corrupting the e-mail server. The spread of the "Beautiful Killer" virus can be as fast as a geometric progression. It has been calculated that if the "Beauty Killer" virus could spread at the theoretical rate, it would only need to multiply five times before all Internet users in the world would receive a copy. The most terrifying aspect of the "Beauty Killer" virus is not just the rejection of e-mail servers. Rather, the user's very sensitive and core confidential information inadvertently asked through the repeated dissemination of e-mail and diffusion and was leaked out, and even diffused to what place may not be known. > writing work Summary I2 Nimayaw variant W (Worm. Nimayaw). This virus spreads through infected files and can cause user files to become corrupted and inoperable. Because the files infected by the virus, the icon will be changed to a panda holding three incense sticks, so the virus is also known as "Panda burning incense". It is a worm that runs on WIN9X/NT/2000/XP/2003 systems. This variant infects EXE executable files on the user's computer. Infected computers also experience blue screens, frequent reboots, and corruption of data files on the system hard disk. The virus can spread through the LAN, and then infect all the computer systems in the LAN, eventually leading to the paralysis of the entire LAN.1.3 Mobile phone virus. Maybe many people have not heard of it, and even if they have heard of it, they will not think it has much harm. In recent days, Kingsoft Anti-Virus Center released a Trojan horse cell phone virus called SymbOS.Doomboot.G. The virus is extremely covert, and once a cell phone user is hit. On their own cell phones will be a disaster. Light cell phone information will be completely destroyed, heavy cell phone will show a dead state, can not start normally. The degree of harm is not much weaker than a computer virus.1.4 Valentine's Day (vbs. Valentin). Valentine (vbs. Valentin) is a virus that writes love letters. It will use its own script encryption engine encrypted and inserted into the HTML file, the virus will produce when running - a virus file named Main.htm. And copy it to the system directory. It searches for all the postal addresses in the outlook address book and sends a virus email with the title: Feliz s" valentin. The content is: Feliz s" valentirL Porfavor visita. The virus will attack on the 14th of each month, when the attack will be a West Bengal love letter to the content of the hard disk to overwrite all the files, and will be overwritten by all the file extension changed to .txt, so that the user's system crashes completely.15 San River lover (VBS. San) virus. VBSSan virus is a virus that deletes your files and wishes you a happy Valentine's Day. When the virus runs, it will generate a Loveday14-a.hta file, which is a compiled virus format that can be automatically executed by the system. The virus will put this Valentine's Day file into the startup directory of the system, and the virus will run automatically every time the system is turned on. The virus strikes on the 8th, 14th, 23rd, and 29th of each month, and when it strikes, it keeps all the root directories on the c-drive, deletes all the files and subdirectories in those root directories, and creates a directory named: "happysan-valentin' Happy Valentine's Day! to the directory to demonstrate this. Users can do nothing but crash their systems and laugh.1,6 CIH virus. It is reported that CIH virus has caused huge losses to Chinese computer users. Recently, an upgraded version of the CIH virus, the CIHvl-2 virus, has appeared. The CIHvl-2 virus attacks the hard disk and the bios chip of the PC, causing system crashes and even damaging the hardware.
The CIHvl-2 virus was timed to launch an attack on April 26 on the bios chips and hard drives of infected computers. The attack of this virus causes significant reduction of hard disk data and inability to boot or restart the computer.CIH virus basically infects the .exe file of windows 95 or 98 through interconnected internet or pirated software. After executing the infected file, the CIH virus then infects other programs that come in contact with the executed file. After the virus was triggered on April 26, it overwrote the most decisive parts of the hard disk with garbage code, and at the same time, it attempted to rewrite the bioso If the bios is writable, as it is in most current computers, then the bios will be corrupted by the virus. Once the bios is corrupted, the system will be unusable because it will not boot.
In fact, CIH viruses are particularly aggressive on hard disks, and may cause the loss of data on the hard disk E, or even cause the hard disk to have to undergo a low-level scaling
Computer viruses are not a recent development, and in fact, as early as 1949, years before the first commercial computers appeared, computer pioneer John Von Neumann wrote in his book The Computer Virus, which was published in the journal Compassionate Interaction. In fact, as early as 1949, several years before the first commercial computer, computer pioneer John Von Neumann outlined the blueprint for a virus program in his paper "Theory and Organization of Complex Automata". At that time, most computer experts could not imagine that such a self-reproducing program was possible, but a few scientists quietly studied the concepts that Von Neumann had put forward. But a handful of scientists quietly worked on the concepts that Van Neumann proposed, and it wasn't until ten years later, at AT&T's Bell Labs, that these concepts took shape in a very strange video game called "core war.
The gameplay of core war is as follows: two parties each write a set of programs, entered into the same computer, the two sets of programs in the computer's memory system to kill each other, sometimes they will put down some of the levels, and sometimes they will stop to repair (rewrite) by the other side of the destruction of a few lines of instruction; when it is trapped, you can also copy themselves to escape from danger, because they are all in the computer's memory of the magnetic pistil to swim, and therefore get the name of core war. getting the name Magneto Wars.
In those days, computers weren't wired, they were independent of each other, so there was no plague of viruses. If a computer became "infected" and went out of control, the staff simply shut it down. But as computer connectivity becomes part of the fabric of society, a single or self-replicating virus program is likely to cause untold mischief. So for a long time, the computer people who knew how to play Magneto had an unwritten rule about not disclosing the contents of these war programs to the general public.
In 1983, this rule was broken. Ken Thompson Ken Thompson was the recipient of an award for computer excellence that year. At the award ceremony, he gave a speech that not only publicly confirmed the existence of computer viruses, but also told the audience how to write their own virus programs. His peers were horrified, but the secret was out, and in 1984 the situation became more complicated. In 1984, Scientific American columnist A.K. Dewdney wrote the first article in the May issue discussing the "Magneto Wars," and for two dollars, any reader could send in a copy of the article. For two dollars, any reader could receive a copy of his program for writing programs to fight the war on their home computers.
The original virus was not "sick" as long as you paid attention to "personal hygiene"
When computer viruses were first created, the most primitive technical principle was the use of a program to encroach on the resources of the computer system, preventing other programs from running. From then on, the use of non-normal program code began to appear, in the user's unknown circumstances, to carry out illegal operations, hindering the normal operation of the computer, the destruction of information and data in the computer and other behaviors.
The initial spread of the virus is self-replicating, through floppy disks, later C D-ROM and other media; the initial virus is self-destructive, that is, destroying the computer while also destroying its own operating environment, once the computer hard disk is completely formatted, all types of viruses will naturally disappear; the initial performance of the virus type of executable files, such as E XE, COM, DLL and other suffixes, if the infected virus file once the file suffix has been modified, the virus can not be infected, that is, the virus is very strong regularity, as long as a little training, you can quickly master to find out the laws of the virus attack.
The initial characteristics of all viruses dictate that the computer user's habits become an anti-virus key - as long as attention is paid to "personal hygiene" will not be "sick!
The initial nature of all viruses dictates that the habits of the computer user become an anti-virus key - as long as they pay attention to "personal hygiene", they won't "get sick", so for some extreme computer users, anti-virus software is just an insurance mechanism, not a necessity; for many more, anti-virus software is more like a medicine for treating illness.
New viruses automatically come to the door and cannot be prevented
After the red code, the various viruses are fundamentally different from the original viruses - just as the difference between AIDS, anthrax, and cold viruses, as long as the body is healthy and pays attention to personal hygiene, you will not get a cold; but the body is healthy again, and the personal behavior is standardized again. , there is no way to avoid contracting serious viruses such as AIDS and anthrax. AIDS and other viruses and code red as much more harmful, far greater than the general cold virus; are spread through normal channels, and no longer like the original virus with very obvious characteristics; more serious is that the code red and anthrax, like the same, the spread of the speed of the extremely fast, the vitality of the extremely tenacious, so that a large number of traditional ways of virus prevention of the user suffered a great harm.
The emergence of such viruses has prompted more and more users to change their traditional habits and arm themselves with the real-time monitoring capabilities of anti-virus software, which has led to a recent boom in anti-virus software.
This hot effect, as well as the emergence of sex-based virus technology, anti-virus software and enterprises have put forward new requirements, just like the cold patients and patients infected with AIDS, anthrax, between the level of medical equipment and health care institutions for the level of requirements are different, now the anti-virus software is no longer a mere software, but the building blocks in the software platform on a whole service system. This requires anti-virus software itself to have sufficient technical level and functionality to carry such complex services and requirements.
Finally, virus technology is constantly changing, so information security and anti-virus products and services must also change, and people's habits of using computers will also undergo fundamental changes. I think to develop a good habit of using the computer at least now should pay attention to the following matters:
1, usually ready to use the floppy disk, write protection. Check the computer for any problem, or detoxification, it is best to carry out in the environment without the interference of viruses, in order to complete the measurement of the real reason, or completely solve the virus invasion.
2. Important information must be backed up.
3. Try to avoid using computer removable disks on machines without anti-virus software. People generally think that do not use other people's disks, you can anti-virus, but do not just use other people's computers is also very important, otherwise it is possible to bring a lot of viruses home.
4, the use of new software, the first check with a virus scanning program, can reduce the chance of poisoning.
5. Prepare a copy of the software with virus checking, anti-virus, anti-detection and important functions, which will help to eliminate the virus.
6. When the computer has unknown music or is down, and the hard disk light is on, you should shut down the computer immediately. If you find that the computer H DISK light is flashing continuously, it may be that the virus is formatting the hard disk.
7, if the hard disk data has been damaged, do not have to rush to format, because the virus can not be in a short period of time, all the hard disk data destruction, so you can use the anti-virus program to rebuild after the disaster, to analyze and rebuild the damaged state. Because the rebuilding of the hard disk is possible, the chance of saving is quite high.
8. Do not open unknown letters.
9. ****Have a password for the directory.
10. Upgrade your operating system patches and anti-virus programs.
11. Please respect the intellectual property rights of the original product and support the domestic development of good software.
I hope you will be satisfied!
Reward points should be given!