With the rapid development of new network technologies and applications, computer networks should
With more and more extensive use, computer networks and human beings are playing more and more important roles.
Life is more inseparable from society, and our dependence on them will grow. along with
With the continuous development of computer technology, viruses have become more and more complex and advanced, a new generation.
Computer viruses make full use of some commonly used operating systems and application software to protect the weak.
In recent years, with the popularity of the Internet in the world, virus spots have become rampant, and virus-containing content will be attached to files.
The situation in the mail has been increasing, and the virus spreads through the Internet, which speeds up the spread of the virus.
Sharp has also increased, and the scope of infection is getting bigger and bigger. Therefore, it is essential to protect the security of computer network.
Will become more and more important.
computer virus
The definition of computer virus (computer virus) in the People's Republic of China (PRC)
The "Regulations on the Security Protection of Computer Information Systems" has clearly stipulated this. Virus refers to compiling or
Inserting a computer program damages or destroys the computer data function and affects the use of the computer.
Capable of self-replication and issuing a set of computer instructions or codes. "
Second, network virus.
With the development of network and Internet, the wider the spread, the greater the new harm.
The virus appeared, which is a network virus. Virus is a new concept.
The reason why viruses don't have the concept of network viruses is because of the development of the network and the traditional viruses.
The network also has many characteristics. Internet virus today is a broad concept.
As long as it uses the Internet to spread and destroy, it can be called a network virus, for example:
Love to enter through the back door, panda burning incense.
Third, the difference between network virus and computer virus
The first common computer virus is nothing more than destructively formatting the hard disk and deleting the system.
User documents, databases, etc. Destroy The mode of transmission is nothing but virus infection.
Copying software with each other and carrying viruses, such as using pirated CDs and infecting disk systems.
Pilot virus and infected executable virus, as well as network virus.
These are the common characteristics of viruses, and they are also stealing users' remote data and controlling each other remotely.
Computers and other damaged properties, such as Trojans, consume the operating expenses of network computers.
The source of the network server worm crashed.
Fourth, network antivirus.
Network destructive virus will directly affect the work of the network, from reducing the video speed.
When the network crashed, it rang for efficiency, which destroyed the server information and ruined years of work.
Daniel's economic losses caused by online fraud such as viruses exceed1600 million yuan every year.
But this number is rising every year. In the next few years, the market scale will reach safety.
60 billion yuan. An anti-virus software expert pointed out: "Internet bird flu virus is even worse." Such as: "Bear
In addition to infecting users through websites, the latest virus of "Incense Burning Cat" also spreads through QQ.
Spread its own vulnerabilities through file sharing network, default sharing, weak password system, USB flash drive and windows.
Form a bottom top mobile hard disk, and other means of communication. Although the LAN used to be a computer
For infection, it can spread all over the network in an instant, and even be infected in a very short time.
Thousands of computers can lead to serious networks. Symptoms of computer performance poisoning
It is enforceable. Exe file becomes a strange pattern, and the pattern is displayed as "Panda"
Incense burning ",and then the system blue screen, restart frequently, hard disk data damage is serious, the whole company paralyzed.
All computer LANs will be poisoned. "Panda Burning Incense" has only been more than half a month, and several varieties are already high.
More than 50, and the number of infected users is expanding. Infected with the disease of "panda burning incense"
The number of individual drug addicts has reached millions, and more corporate drug addicts are multiplying. network
The more viruses on the computer network, the greater the harm.
Verb (abbreviation of verb) The characteristics of network transmission of the virus.
1. Fast infection: In a stand-alone environment, the virus can only spread from a computer floppy disk.
On the other hand, it can spread quickly through network communication mechanism in the network. According to measurement
The typical PC network is used under normal circumstances, once a computer workstation is sick.
Drugs, and will be online in 10 minutes on hundreds of all infected computers.
2. Wide spread: Because the virus spreads very fast in the network and has a wide spread, it can not only spread to all LAN computers quickly, but also spread the virus instantly through remote workstations.
International spread to thousands of miles away.
3. The forms of transmission are complex and diverse: computer viruses generally spread through the Internet. "
Station server workstation "communication channels, but the form of communication is complex and diverse.
4. It is difficult to completely remove: Independent computer virus carriers can sometimes delete files.
Or low-level formatted drives and other measures to completely eliminate viruses, once computers and networks work.
The cleaning station failed to disinfect, and the whole network may be infected by the virus again, or even just cleaned up.
The work of one workstation is likely to be infected by the virus of another workstation and online. Therefore,
Only the workstation can not solve the harm of viruses to the network except killing viruses.
6. Types of network viruses
With the increasingly developed network, the types of network viruses are also increasing, which are generally summarized as follows
The following categories:
1. worm
It uses the communication mechanism to copy and spread the network, and the way of communication is through the network.
And e-mail, prefixed with Worm. For example, the "Nimda" virus that has been extremely harmful in recent years is demodex.
Worm virus. The virus uses Microsoft's Windows operating system, Computer Influenza.
People with this virus will continue to dial the Internet automatically and use the information or address in the file.
Sharing network communication will eventually destroy the most important user data.
2. Macro virus
Hong virus is a virus stored in Acer computer documents or templates. prefix
Macro, once you open such a file, Acer will be executed, and then Acer will be infected with a virus.
Be enabled to transfer to the computer and exist in the normal template. From then on, from beginning to end.
The file will constantly move the "infected" flood virus if other users open the flu.
There was a virus in the file, and Hong transferred the virus to his computer.
3. Destructive program virus
Prefix destructive virus program is: harm. The characteristics of this virus are good in itself.
Watch the user click on the icon to seduce. When the user clicks on the virus, the virus will guide the user.
Computer-generated destruction. If c formats the disk (Harm.formatC.f), the killer command (Harm.
Orders. Black boy).
4. System virus
Virus prefix system: Win32, PE, Win95, W32, W95, etc. These viruses
The general public can be infected with the features of the windows operating system *. Exe and *. Dll file,
And spread it through these documents. If the CIH virus.
5. Backdoor virus
Backdoor virus prefix is backdoor. The total number of such viruses spread through the network-
Broadcast, opened the back door of the system and security risks for users.
6. Bander virus
The prefix of the bundled virus is Binder. The characteristic of this virus is that the virus writer will use it.
Specific programs will be bundled with some applications, such as QQ and IE, which are ostensibly bundled.
It is normal to read newspapers that when users run these bundled viruses, they will run these applications on the surface.
Programs, and then bundled to run hidden viruses, thus causing harm to users. Such as: packaging
Bundle QQ (binder. QQPass.QQBin), the system killer (Binder.killsys).
7. Script virus
The virus is usually malicious code written by JavaScript script code, and the prefix is usually
Spript, with the general nature of advertising, will modify your IE homepage, modify the registry and other information.
Bring inconvenience to computer users.
8. Planting program virus
This virus will release one or several new viruses from the public.
The virus reached the system directory and was destroyed by the released new virus. If glaciers are sowing,
(dropper. BingHe2.2C), MSN striker (dropper. Worm.Smibag)。
9. Joke virus
The prefix is virus joke: joke. Also known as prank virus. The virus itself is characterized by a beautiful user clicking on the icon to seduce,
When the user clicks on this virus, the virus will interrupt the operation and scare the user. In fact,
This virus didn't destroy any computer users. Such as: ghosts (jokes. Girlghost) virus.
10. Trojan hacker virus
The prefix of Trojan is Trojan, and the prefix of Hacker virus is generally hack. Public special program
Sex enters the user's system through a loophole in the network or system, hides it, and then leaks it to the outside world.
User information, hacker virus has a visual interface for remote users' computers.
Control. Trojans and hacker viruses often appear in pairs, and Trojan viruses are responsible for invading power users.
Brain, and hackers passed the virus to Trojan horse virus control. . General Troy is like QQ.
News follows Troy. Troy. QQ3344, with Trojan horse. LMir.PSW.60 Virus form.
A PSW or something like General PWD said that this virus has the function of stealing passwords.
Such as some hacking programs, such as network hackers. Nether. client
7. Mode of transmission and network anti-virus
From the above, we can see that the spread of e-mail virus is through clicking on the home page, user downloading,
Others transmit through five computer implants, implants and other loopholes, as long as they hold these five.
With a thoroughfare, we can better live an anti-virus network.
Computer network virus and its prevention
With the continuous application and rapid development of various new network technologies, computer networks should
It is used more and more widely and plays an increasingly important role. Computer network and human beings
Our life is more encrypted and inseparable, and the dependence of society on it will continue to grow. And with
With the continuous development of computer technology, viruses become more and more complex and advanced, and a new generation.
Computer viruses make full use of the low protection of some commonly used operating systems and application software.
In recent years, with the worldwide popularity of the Internet, files containing viruses have been attached.
There are more and more cases in the mail, and the spread of the virus through the network makes the virus spread faster.
It has also increased rapidly, and the scope of infection has become wider and wider. Therefore, the security protection of computer network will
Will become more and more important.
First of all, computer viruses
The definition of Computer Virus in China people * * * and
China's "Regulations on the Security Protection of Computer Information Systems" clearly stipulates that virus "refers to the compilation or
Inserting data into a computer program that destroys computer functions and affects the use of the computer.
And a set of self-replicating computer instructions or program codes.
Second, network virus.
With the development of network and Internet, it is a new type with wider spread and greater harm.
The virus came into being. This is the network virus. Network virus is a new concept, in the traditional
There is no concept of network virus in virus classification. Due to the development of network, traditional viruses
It also has some network characteristics. Today's network virus is a broad concept, a
Generally, as long as it uses the network to spread and destroy, it can be called a network virus, such as:
The back door of love, panda burning incense and so on.
Third, the difference between network virus and computer virus
The original common computer virus is nothing more than formatting the hard disk and deleting the system.
User files, destroy databases, and so on. And the route of transmission is nothing more than being infected by a virus.
Copying software, using pirated CDs with viruses, etc. , such as infecting the disk system.
Bootable viruses and file viruses infect executable files, while network viruses are not only equipped with
In addition to these characteristics of common viruses, it also has the function of stealing user data and remotely controlling each other.
Computer and other destructive features, such as Trojan horse virus and consumption of network computer operating funds.
Source, a worm that paralyzes the network server.
Fourth, the harm of network virus.
Viruses on the network are destructive, which will directly affect the work of the network and even reduce the speed and shadow.
If the work efficiency is high, the network will collapse, the server information will be destroyed, and the work for many years will be destroyed.
Daniel's annual economic losses caused by online fraud such as viruses are as high as 654.38+0.6 billion yuan.
And this number is still rising year by year. In the next few years, the security market scale will reach.
60 billion yuan. An anti-virus software expert pointed out: "Network virus is even more terrible than bird flu". Such as: "Bear
In addition to infecting users through websites, viruses will also be updated through QQ.
Vulnerabilities spread by themselves, through network files * * *, default * * *, weak system passwords, USB flash drives and windows.
Move the hard disk at the top of the body and the bottom of the form and expand it in various ways. And as long as there is a computer in the local area network.
Device infection can spread all over the network in an instant, and even be infected in a very short time.
Thousands of computers can cause network paralysis when it is serious. Poisoning symptoms are shown on the computer.
All executable. Exe file becomes a weird pattern, which is displayed as "Panda".
Burning incense ",and then the system blue screen, frequent restart, hard disk data destruction, etc. , seriously the whole company.
All computers in the LAN will be poisoned. "Panda Burning Incense" has only been more than half a month, and the number of varieties is already very high.
There are more than 50 infected users, and the number of infected users is still expanding. Contracted the disease of "panda burning incense"
The number of individual users has reached millions, and the number of corporate users infected has doubled. network
The more computers on the Internet, the greater the harm caused by network viruses.
Five, the characteristics of network virus transmission
1. Fast infection: In a stand-alone environment, viruses can only be downloaded from a computer through floppy disks.
Take it to another computer, and it can spread quickly in the network through the network communication mechanism. According to measurement
For a typical PC network in normal use, as long as one workstation fails.
Poison, you can infect all hundreds of computers on the internet in a few minutes.
2. Wide spread: Because the virus spreads very fast and widely in the network, it can not only infect all computers in the LAN quickly, but also spread the virus instantly through remote workstations.
Spread thousands of miles away.
3. The forms of transmission are complex and diverse: computer viruses generally spread through "work" on the Internet.
Station server workstation ",but the communication form is complex and diverse.
4. It is difficult to completely remove: Computer viruses on a single computer can sometimes be removed by deleting files with viruses.
Or low-level formatted hard disk and other measures to completely eliminate the virus, and as long as there is one working in the network.
If the station is not disinfected, the whole network may be reinfected by virus, or even just cleaned up.
The working workstation may be infected by another workstation with a virus on the Internet. Therefore,
Just killing viruses on the workstation can't solve the harm of viruses to the network.
Six, the type of network virus
With the development of the network, there are more and more kinds of network viruses, which can be roughly summarized as follows.
The following categories:
1. Vorms
Its infection mechanism is replication and transmission through the network, and the infection route is through the network.
And emails prefixed with Worm. For example, the "Nimda" virus that has done great harm in recent years is creep.
A worm virus. This virus takes advantage of the vulnerability of Microsoft's Windows operating system.
After being infected with this virus, you will continue to dial the Internet automatically and use the address information in the file or
The tireless spread of the network eventually destroyed most of the important data of users.
2. Macro virus
Macro virus is a computer virus registered in the macro of a document or template. The prefix is
Macro, once you open such a document, the macro inside will be executed, so will the macro virus.
Is activated, transferred to the computer, and resides on the normal template. Since then, all from
Any saved document will be infected with this macro virus. If other users open it,
The infected file and macro virus will be transferred to his computer.
3. Destructive program virus
The prefix of destructive program virus is: harm. The characteristic of this virus is that it is good in itself.
Look at the icon to lure the user to click. When the user clicks on the virus, the virus will be directly transmitted to the user.
The computer is broken. Such as format C disk (Harm.formatC.f), killer command (Harm.
Orders. Black boy) and so on.
4. System virus
The prefixes of system viruses are Win32, PE, Win95, W32, W95, etc. These viruses
The common common feature is *. Exe and *. Dll files that can infect windows operating system.
And spread it through these documents. Such as CIH virus.
5. Backdoor virus
Backdoor viruses are prefixed by backdoors. This virus is characterized by spreading through the internet.
Broadcast, open the back door to the system, and bring security risks to users.
6. Adhesive virus
The prefix of binder virus is: binder. The characteristic of this virus is that the virus author will use it.
A specific binding program binds the virus to some applications, such as QQ and IE. On the surface,
Look at the normal file. When users run these bundled viruses, they obviously run these applications.
Program, and then hide and run the bundled virus, thus causing harm to users. For example, binding
Tie QQ (binder. QQPass.QQBin), system killer (Binder.killsys), etc.
7. Script virus
Script viruses are usually malicious code written by JavaScript code, and the prefix is usually
Spript, generally with the nature of advertising, will modify your IE homepage, modify the registry and other information.
It is inconvenient for users to use computers.
8. Virus planting program virus
The common feature of these viruses is that they will release one or several new ones from the body when they run.
When the virus enters the system directory, it will be destroyed by the released new virus. Such as a glacier planter.
(dropper. Glacier 2.2C), MSN shooter (dropper. Worm.Smibag) and so on.
9. Joke virus
The prefix of joke virus is: joke. Also known as prank virus. This kind of virus is characterized by beautiful icons to lure users to click.
When users click on this kind of virus, the virus will do all kinds of destructive operations to scare users. In fact,
The virus did not cause any damage to the user's computer. Such as: jokes. Girl ghost virus.
10. Trojan hacker virus
The prefix of Trojan virus is Trojan, and the prefix name of hacker virus is generally hack. Gongyoute
Sex is to enter the user's system through network or system vulnerabilities and hide it, and then leak it to the outside world.
User information, hacker virus has a visual interface, which can remotely access the user's computer.
Control. Trojan horses and hacker viruses often appear in pairs, and Trojan viruses are responsible for invading users' electricity.
Brain, and hacker virus will be controlled by Trojan virus. . QQ and other general Trojan horses.
Troy. QQ3344, tail trojan horse and big trojan horse. LMir.PSW.60 in virus name
The appearance of PSW or PWD generally indicates that the virus has the function of stealing passwords.
Hackers and other hacking programs. Net her. Customers, etc.