Current location - Education and Training Encyclopedia - Graduation thesis - Virus source paper
Virus source paper
1 the connotation, types and characteristics of computer viruses

"Regulations on the Security Protection of Computer Information System in People's Republic of China (PRC)" clearly defines computer virus as "a set of computer instructions or program codes that are compiled or inserted in a computer program, destroy computer functions or data, affect the use of the computer, and can replicate themselves". Since Morris compiled the first "worm" virus program in 1980s, many different types of viruses have appeared in the world. In recent years, the following major viruses have been produced:

1. 1 Melissa virus. This virus is a word macro virus specifically targeting Microsoft email server MS Exchange and email sending and receiving software Out 1ookExpress. This is a denial of service attack virus that can affect computers running Microsoft word97, word2000 and Outlook. This virus is an attachment of Word document, which is carried and spread by email. Because this virus can replicate itself, once the user opens this attachment, the "beautiful killer" dysprosium virus will automatically replicate using Outlook and send it to the top 50 recipients according to the Outlook address book, thus overloading or damaging the e-mail server. The spread speed of "Beautiful Black Boy" virus can reach geometric progression. According to the calculation, if the "beautiful black boy" virus can spread at the theoretical speed, it only needs to reproduce five times, and all network users in the world can receive one copy. The most terrible thing about the "beautiful killer" virus is not only the rejection of the mail server, but also the repeated spread and diffusion of the mail, which makes the user's very sensitive and core confidential information inadvertently leaked out, and may not even know where it has spread. & gt Write a summary of I2 Nima variety W (worm). Nimayaw)。 The virus spreads through infected files, which can damage user files and prevent them from running. Because the file infected by the virus, the icon will turn into a panda with three incense sticks, so the virus is also called "panda burning incense". It is a worm that can run on the system of Win9x/NT/2000/XP/2003. This variant infects the EXE executable file on the user's computer. The infected computer will also have a blue screen, restart frequently, and the data files in the system hard disk will be destroyed. Viruses can spread through the local area network, and then infect all computer systems in the local area network, eventually leading to the paralysis of the whole local area network. 1.3 mobile phone virus. Maybe many people haven't heard of it, and even if they do, they won't feel much harm. In recent days, Jinshan Anti-virus Center released a Trojan mobile phone virus named SymbOS. Doomboot.G, very concealed. Once a mobile phone user is recruited. It will be a disaster for your mobile phone. The information in the mobile phone will be completely destroyed, and the mobile phone will be in a dead state and cannot be started normally. This kind of harm is not much weaker than computer virus. 1.4 Valentine's Day (vbs. Valentine). Vbs。 Valentine virus is a virus that can write love letters. It will encrypt itself using the script encryption engine and insert it into the HTML file. When the virus runs, it will generate a virus file named Main.htm. And copy it to the system directory. And search all email addresses in the outlook address book, and send a virus email titled "Feliz s”Valentin .. The content of" Feliz s "is very suitable for access. To these addresses. The virus attacks on 14 every month. When it attacks, it will overwrite all the files on the hard disk with the contents of a Spanish love letter, and change all the file extensions that have been overwritten to. . Txt, will make the user's system completely collapse. 15 sanhe lover (VBS. San) virus. VBSSan virus is a virus that will delete your files and wish you a happy Valentine's Day. When the virus runs, it will produce a file named Loveday 14-a.hta, which is a compiled virus format and can be automatically executed by the system. The virus will put this Valentine's Day file in the startup directory of the system, and the virus will run automatically every time it is opened. The virus attacks on the 8th, 14, 23rd and 29th of every month. When it attacks, it will keep all the root directories of drive C, only delete all files and subdirectories under these root directories, and create a directory named "Happy Saint-Valentine" for demonstration. In addition to the system crash, users can only smile bitterly. 1.6 CIH virus. It is reported that the CIH virus has caused great losses to computer users in China. Recently, an upgraded version of CIH virus, CIHvl-2 virus, appeared. CIHvl-2 virus will attack the hard disk and bios chip of pc, causing system crash and even damaging hardware.

CIHvl-2 virus regularly attacked the bios chip and hard disk of the infected computer on April 26th. After the outbreak of the virus, the data on the hard disk will be significantly reduced, and the computer cannot be turned on or restarted. CIH virus mainly infects. Exe files of windows 95 or 98 through the Internet or pirated software. After the infected file is executed, CIH virus will infect other programs that come into contact with the executed file. After the virus was triggered on April 26th, it covered the most decisive part of the hard disk with junk code and tried to rewrite the bios. If the bios is writable, like most computers at present, the BIOS will be destroyed by viruses. Once the bios is destroyed, the system will be unusable because it cannot be started.

In fact, the CIH virus has a particularly strong attack ability on the hard disk, which may lead to the data loss of the hard disk E, and even make the hard disk have to be low-level.

Computer virus is not a new product that appeared recently. In fact, as early as 1949, a few years before the first commercial computer appeared, john von neumann, the pioneer of computer, put forward a paper in his paper Theory and Organization of Complex Automata, which outlined the blueprint of virus programs. At that time, most computer experts could not imagine that this self-replicating program was possible, but a few scientists quietly studied the concept put forward by Van Newman. 10 years later, in Bell Labs of AT&T Company, these concepts were formed in a very strange video game called "Core War".

The game of core war is like this: both sides write a set of programs and input them into the same computer. These two programs chase each other in the computer memory system. Sometimes they put down some checkpoints, and sometimes they stop to repair (rewrite) a few lines of instructions destroyed by the other side; When it is trapped, it can copy itself once and get out of danger. Because they all wander in the memory core of the computer, it is named Core Wars.

In those days, computers were not connected, but independent of each other, so there would be no virus plague. If a computer is "infected" and out of control, the staff only need to turn it off. However, when computer connection gradually becomes a part of social structure, a self-replicating virus program is likely to bring endless harm. Therefore, for a long time, computer workers who know how to play the "core war" game have made an unwritten rule in Yan Shouyi that the contents of these war procedures should not be made public.

This rule was broken in 1983. Ken Thompson was the winner of the Outstanding Computer Award that year. At the award ceremony, he made a speech, which not only publicly confirmed the existence of computer viruses, but also told all listeners how to write their own virus programs. All his colleagues are frightened, but the secret has spread. 1984, the more complicated the situation. This year, A.K.Dewdney, a columnist of Scientific American, wrote the first article about "Core Wars" in May. Any reader can receive his program by sending two dollars to open a battlefield in his home computer.

Pay attention to "personal hygiene" when dealing with the original virus, and you will not be "sick"

When computer viruses were first born, the original technical principle was to use one program to occupy a lot of computer system resources and hinder the operation of other programs; From then on, using abnormal program code, illegal operation, hindering the normal operation of the computer and destroying the information and data in the computer began.

The initial transmission route of the virus is self-replication, through floppy disks, later CD-ROMs and other media; The original virus is self-destructive, that is, it destroys the computer and its own running environment. Once the computer hard disk is completely formatted, all kinds of viruses naturally disappear. The initial manifestation of virus is executable files, such as suffix such as E XE, COM and DLL. If the file suffix of the infected virus file is modified, the virus cannot be infected, which means that the virus has strong regularity. With a little training, you can quickly master the law of discovering virus outbreaks.

The initial characteristics of all viruses determine that computer users' habits become the key to antivirus-as long as they pay attention to "personal hygiene", they will not "get sick". So for some extreme computer users, anti-virus software is just an insurance mechanism, not a necessity; For more users, the meaning of anti-virus software is more like a therapeutic drug after illness.

New viruses cannot be prevented automatically.

The virus after the red team is essentially different from the original virus-just like the difference between AIDS, anthrax and cold virus, as long as you are healthy and pay attention to personal hygiene, you won't catch a cold; However, no matter how healthy you are and how standardized your personal behavior is, you can't avoid being infected with serious viruses such as AIDS and anthrax. Aids and other viruses are no less harmful than the red team, far greater than the common cold virus; Spreading through normal channels is not as obvious as the original virus; What's more, the Red Team, like anthrax, spreads very fast and has extremely tenacious vitality. Therefore, a large number of users who use traditional methods to prevent viruses have been greatly hurt.

The emergence of this virus has prompted more and more users to change their traditional usage habits and arm themselves with the real-time monitoring function of anti-virus software, which has promoted the recent hot sale of anti-virus software.

This thermal effect and the emergence of sexual virus technology put forward new requirements for anti-virus software and enterprises. Just as cold patients and people infected with AIDS and anthrax have different requirements for medical equipment and medical service institutions, the current anti-virus software is no longer a simple software, but an overall service system with components on the software platform. This requires that the antivirus software itself has sufficient technical level and function to carry such complicated services and demands.

Finally, virus technology is constantly changing, so information security and anti-virus products and services must also change, and people's habits of using computers will also change fundamentally. I think to form a good habit of using computers, at least now we should pay attention to the following matters:

1, usually ready to use floppy disk, write-protected. Check the computer for problems, or kill virus. It is best to do it in an environment without virus interference, so as to thoroughly find out the real cause or completely solve the virus invasion.

2. Important materials must be backed up.

3. Try to avoid using computer removable disks on machines without antivirus software. Most people think that you can prevent viruses without using other people's disks, but it is also very important not to use other people's computers casually, or you may bring a lot of viruses home.

4. When using new software, check it with antivirus program first, which can reduce the chance of poisoning.

5. Prepare a software with anti-virus, anti-virus, detoxification and important functions, which will help to eliminate the virus.

6. When the computer has unknown music coming or falling and the light on the hard disk is always on, it should be turned off immediately. I found that the light on the H disk of the computer has been flashing, and there may be a virus formatting the hard disk.

7. If the hard disk data has been damaged, there is no need to format it in a hurry, because the virus can't destroy all the hard disk data in a short time. You can use the detoxification program of post-disaster reconstruction to analyze and reconstruct the damaged state. Because it is possible to rebuild the hard disk, the probability of saving it is quite high.

8. Don't open unknown letters.

9.* * * Enjoy the directory with password.

10. Upgrade operating system patches and antivirus programs in time.

1 1. Please respect the intellectual property rights of original products and support excellent domestic software.

I hope you can be satisfied!

Reward points to give! ! !