Current location - Education and Training Encyclopedia - Graduation thesis - On the harm and prevention of computer virus
On the harm and prevention of computer virus
On the harm and prevention of computer virus

No matter in school or in society, everyone will always come into contact with papers, which are reasoning articles that describe academic research results for learning in various academic fields. How to write a thoughtful and literary paper? The following is what I arranged for you, talking about the harm and prevention of computer viruses, for reference only, hoping to help you.

Abstract: With the development of the information age, computers are more and more widely used, and almost every household will install computers. At the same time, computer viruses attack more and more computers, so the harm and prevention of computer viruses should be highly valued. This paper will explain the harm of computer virus through its basic knowledge, and put forward relevant suggestions on its preventive measures.

Keywords: computer virus computer virus harm prevention measures

Due to the emerging development of the Internet era, computers have become an indispensable tool for people to work and study, and the computer viruses that followed have also become a problem for users. For example, the "panda burning incense", which was a smash hit in the past, still makes people feel worried. What is a computer virus and what harm does it have? How to take effective preventive measures? These are the basic knowledge that we need to master urgently in the process of using computers correctly.

1 computer virus overview

When the computer is in use, if there is executable program code, modify its program, then these programs will be infected and the existing virus programs will be copied. Such a process is called a computer virus. It can control the operation of any other program, but it is a clone of another program, a secret execution attached to another program, and it can attach and copy itself. Some viruses can not only replicate, but also complete other activities, and some need to meet certain conditions before they can attack. Most viruses are written in assembly language, which is a low-level language particularly similar to machine language, but there are also high-level language editors to write viruses, such as C language. There are computer virus writers all over the world, and many young writers have become the motivation to write viruses in order to show their programming ability in the same way. But for experienced senior writers, most of them have the desire to write viruses because they are bored or bored. Most of them will use Internet sites and international bulletin board systems as places for virus code exchange and exchange. Many viruses are generated by virus writers downloading codes, modifying their codes and disassembling viruses under normal circumstances. This deepens the difficulty of anti-virus work and brings great challenges to its prevention and control.

2 the classification of computer viruses

In the use of computers, there has been fierce competition between antivirus software writers and virus writers since the first infection. When an anti-virus software is developed to effectively resist existing viruses, new viruses appear, and then a new type of anti-virus software is developed. Therefore, knowing what type of virus is the premise of doing a good job of protective measures, so the following author makes an explanation on the classification of viruses.

2. 1 parasitic virus

Parasitic virus is the most common and traditional form of virus. It can attach itself to an executable file. This virus infection will be activated when a program is being executed. It is a program that infects executable files. Once the infected file runs in different ways, the consequences will be unpredictable, such as destroying user data or deleting hard disk files.

2.2 Boot zone virus

The virus in the boot area is put into the boot module of the operating system at a fixed location, and the physical location is the basis of control transfer. Therefore, when the physical location is occupied by a virus, it can have control, thus transferring or replacing the real boot area content. After the virus program is executed, the real boot area content has control, so it seems to run normally. In fact, the virus has been hidden in the system, waiting for an opportunity to infect and attack.

2.3 Memory resident virus

As the name implies, a virus that resides in memory is a virus that resides in main memory. It becomes a resident program in memory, and when it is used, every executed program will be infected by virus.

2.4 Multiline virus

Multiline virus is a virus that changes every time a program is infected, and it is impossible to judge what kind of virus it is according to its appearance characteristics.

2.5 invisible virus

Invisible virus is just a form of virus, and for its detection, the virus can make hidden reactions at the same time.

3 the harm of computer viruses

The destruction of computer files and programs by computer viruses shows its amazing lethality. The technical energy of the virus writer and the desire of the supervisor can determine the intensity of virus damage. Thousands of viruses are constantly expanding and developing, but there are also strange destructive behaviors. The following author summarizes the parts and targets that common viruses will attack.

3. 1 attack site

Boot sector, hard disk master boot sector, file directory, FAT table. Usually, malicious viruses exist in the data area of the attack system, and once the data is destroyed, it is difficult to recover.

3.2 Attack memory

The important resource in a computer is its memory, which is also the target of virus attacks. Consuming memory resources in the system and occupying land other than viruses will hinder the operation of some large programs. Occupy a lot of memory, forbid to allocate memory, change the total amount of memory, eat memory, etc. It's the way viruses attack memories.

3.3 attack files

There are several ways for viruses to attack files: renaming, deleting, losing some program codes, replacing contents, reversing contents, fragmenting, blank writing time, losing file families, forging files and losing data files.

3.4 Interference with system operation

The destructive behavior of the virus will interfere with the normal operation of the system. However, there are various ways of destruction, including: interfering with the execution of internal commands, not executing commands, unable to open files, false alarms, occupying special data areas, reversing clocks, replacing current disks, crashing, restarting, disrupting serial ports, and forcing games.

3.5 attack CMOS

The important data of the system are generally stored in the CMOS area of the machine, such as system clock, memory capacity, disk type, etc., all of which have checksums. When some viruses are activated, the writing action in CMOS area can be operated by them, and the data in system CMOS is destroyed.

3.6 attack disk

The virus attacks the disk data, and the write operation is changed to read operation, and the disk is not written, and bytes are lost when writing to the disk.

3.7 speed drop

After the virus is activated, the program startup will delay the internal time. After the cycle count is included in the clock, the computer will be forced to idle, thus reducing the speed of the computer.

Four methods to prevent computer virus

4. 1 Precautions for computer usage habits

(1) Set the power-on password. The boot password is the minimum guarantee for me to start using the computer and allow it.

(2) Do not use unknown memory. Memories of unknown origin cannot be used at will. All required memory should be tested, and important data or files should be backed up in advance.

(3) Install anti-virus and antivirus software. Install antivirus software. For the anti-virus software installed for the first time, it is necessary to conduct a thorough virus scan on the machine, so as to ensure the health of the anti-virus software that is not infected by the virus. Scan the virus regularly and update the software in time.

(4) Non-bootable data disks cannot be placed in drive A. Non-bootable data disks cannot be placed in drive A at startup. Even if the data disk can't start the system, the startup virus may infect the hard disk from the data disk when you start, so in order to avoid this situation, you must pay special attention when you start.

(5) Don't * * enjoy files in the local area network. Try not to share files in the local area network. Computers will create holes in * * * files. For example, after connecting to the internet, used files will be presented to uninvited guests. Therefore, when using software, it is best to use genuine software and minimize the download and use of free software, game software and public software. Do not use software of unknown origin or pirated software.

4.2 Suggestions on preventing "mail virus"

Viruses are usually generated in emails and usually spread through attachments. Once the attached virus program runs, the computer will be infected with its virus. So don't open strange attachments that are not explicitly mentioned or explained in the email.

5 concluding remarks

In our future life or work, our dependence on computers will only increase. While developing and protecting computers and computer resources, it is particularly important to make good use of them. This is a long-term work with strong practicality and high theory. Although computer viruses are destructive, they always threaten the security of our computers. However, with the improvement of anti-virus technology and computer operating environment, we can believe that our computer operating environment will be cleaner and cleaner in the future by starting from ourselves, maintaining good computer habits and maintaining a high degree of anti-virus awareness.

refer to

[1] Deng Xiuhua. Harm and Prevention of Computer Network Virus [J]. Computer Knowledge and Technology (Technical Forum), 2005,3 (9):145-147.

[2] Sun Lihong. Understanding and prevention of computer virus [J]. zhanghua, 2014,33 (20): 312-316.

;