Current location - Education and Training Encyclopedia - Graduation thesis - Harm of network malicious code and its solution
Harm of network malicious code and its solution
What is the harm of malicious code?

1. Do not use computer.

Description of the phenomenon: although online hooligans don't use this trick very much, once they are recruited, the consequences are really unimaginable! Browsing the webpage containing this malicious code will lead to "system shutdown", "running" and "logout", registry editor, DOS program and any program will be banned, the system will not be able to enter "real mode" and the drive will be hidden.

Format hard disk

Description: This kind of malicious code is characterized by using IE to execute ActiveX function, which allows you to format the hard disk unintentionally. As long as you browse the web page containing it, the browser will pop up a warning that "the current page contains unsafe ctiveX, which may cause you harm" and ask you whether to implement it. If you choose "Yes", the hard disk will be quick format, because the window is minimized when formatting, and you may not notice it at all, and it will be too late when you find it.

3. Download and run the Trojan horse program.

Description: Browsing the web will also bump into a Trojan horse? Of course, due to the vulnerability of IE5.0 itself, such a new intrusion method is possible. The method is to take advantage of the vulnerability that Microsoft eml file can be embedded in exe file, put Trojan horse in eml file, and then point to it with malicious code. When surfers browse this malicious webpage, they will unconsciously download the Trojan horse and execute it without any warning!

4.

Registry lock

Phenomenon description: Sometimes the system is modified after browsing malicious web pages, but when you want to modify it with Regedit, you are prompted that you have no permission to run the program, and then you are asked to contact the administrator. Dizzy! What is the reason why you won't let me change things!

5. Default homepage modification

Description of the phenomenon: Some websites use loopholes in IE to modify visitors' IE, so as to increase visitors' visits and advertise. Generally, you should change your home page and the default home page. In order to prevent you from changing it back, even the default home button in IE option is grayed out. It's a habit of cyber hooligans.

6. Tampering with IE title bar

Phenomenon description: By default, the information in the title bar is provided by the application itself. However, in order to achieve the purpose of advertising, some online hooligans change the key value under the string value "Windows Title" to its website name or more advertising information, thus changing the title bar of IE. People want to see his things, and it is illegally modified. There are no adjectives except the word "shameless".

7. Tampering with the default search engine

Description: There is a tool button of search engine in the toolbar of IE browser, which can realize network search. After being tampered with, just click the search tool button and it will link to the website that netizens want you to go to.

8.IE right-click to modify

Description of the phenomenon: For propaganda purposes, some online hooligans have modified the function menu that pops up when you right click, added some messy things, and even blocked the right-click function in IE window to prohibit you from downloading.

Solution: Install antivirus software and network firewall.