1 thought on “What are the common methods of computer virus invasion”
Mercedes
The computer virus is invisible, but it is always threatening our computer security. There are many types of viruses, both types, characteristics, or invasion methods. They also need to defend their common invasion in order to protect the security of computers and property. So what are the common methods of invasion?
. Infection virus through communication software In recent years, through QQ, Yahoo! Messenger, Window and other communication software to spread the virus rate, it has increased sharply. the trend of. So what causes this phenomenon? In fact, the answer is simple, that is, IM software supports viewing the departure information. The chat software of Windows Live Messenger as an example. In the main interface of the program, click the "Tools" → "Options" above, in the "Options" dialog box, select the left "file transmission" tag on the left side. , Then check the "Use the following procedures for virus scanning" check box, and click the "Browse" button to specify the location of ACAST! Scan and detect. . P2P network scattered dissemination The resources and services in the P2P network are scattered on all nodes. Therefore, the realization of information transmission and service are directly between nodes. Invasion, thereby avoiding possible bottlenecks. However, there are many hidden dangers in P2P's network security. For example, when downloading the so -called lifting patch, users are often the traps of the Trojan horses under the malicious people. If they are not careful, they will cause the computer to be invaded. Essence It, like BIT, Emule (eDonkey) P2P software. By default, each user is allowed to download resources each other. Settings will cause the software to share their personal privacy, and people who are shared by P2P can be downloaded casually. This is also a common thing in addition to the above viruses and Trojan traps. If you want to defend here, you can install firewall software to prevent spy software from secretly transmitting personal privacy data without permission. 3. Precursing regular website mails . Although you did not provide your mailbox address to anyone, you will receive a certain number of spams every day, and many of these letters are counterfeit. The mail content links of well -known websites such as Taobao, 163, Sina, Sina, and other websites are generally the address of the "fishing" website. Once they enter, they will lose banks or game accounts. . Fourth, accidentally start the Trojan horse program Is that some friends may not wait to go online to find patch repair after seeing the vulnerability signal sent by the system, for fear that the hacker will invade at this time. In fact, there is no more terrible thing at this time, that is, some Trojan springs have disguised yourself as a patch, and you are waiting for you to "self -invested". For example, a virus file called UPDATE KB4468-X86.exe. If the system does not install anti-virus software, it is believed that it is difficult to connect it with the virus in an experienced computer master. The consequences will be unimaginable. . Virus is passed between search engines In the virtual world of the Internet, when you often encounter QQ friends, or when you send the URL information from your classmate mailbox. I am embarrassed to read the information from my friends, and I am afraid of computer poisoning when I read it. Of course, there are many experienced friends who analyze the content of the website through search engines, but propose to users for a certain website to propose to users The warning often misjudges the situation to make users be invincible. Therefore, everyone is better to install the McAfee tool, so that when the user uses a search engine to conduct web search, the software will help you analyze the security of the search results in advance. If you want to know more about the website, as long as you move the mouse to the website to the website Above the text, you can display the more comprehensive information of its website and whether the website is safe, so that users can rest assured that they can enter the self -determined safety site. 6. The U disk virus automatically runs I I believe many friends have encountered it. Double -click each partition (such as double -clicking C drive, D drive, E drive, etc.) Only the abnormal situation of the resource manager can open. As the name suggests, this is a virus in the computer. In fact, this virus is called a U disk virus. This virus is transmitted by mobile storage devices such as a U disk, mobile hard disk, and memory card. If you want to remove this type of virus, you can find it. Professional clearing U virus software to help. If: Campus network security maintenance skills The campus network is divided into internal and external networks, which means that they can go to school in the inner network or the Internet at the same time. College students usually play games and shopping. Schools Itself has its own server to maintain; In the environment, first of all at the campus network and its Internet access, you need to set up firewall equipment to prevent external attacks and often update against foreign attacks; Due to the safety of all users of the campus network, we need to strengthen the reinforcement. In addition to the firewall, we need to increase the analysis and detection of external data such as IPS and IDS such as IPS and IDS to ensure the safety of the campus network. Good protection measures, the internal protection measures must be taken, because some student computers may take home or infected outside, so the internal core switches must be set up for VLAN isolation. The intranet may have DDOS attacks or ARP virus, so we need to install anti -virus software for the server or computer, especially the school server system, etc., safe and authentic security software to protect the security of important computers; Security SERVER version, often repair vulnerabilities and update security software. Ordinary computers are generally dial -up. If there is an abnormal upper device monitoring, it generally does not affect other computers. Do a good job of safety precautions and plan. Related reading: 2018 network security event: . Intel processor exposes "Meltdown" and "SPECTRE vulnerability" January 2018, Intel processor exposed "Meltdown" (fuse) (fuse) The two new vulnerabilities of "SPECTRE" (ghost), including AMD, ARM, Intel system and processors, all devices released for almost 20 years are affected. The affected devices include mobile phones, computers, servers, and cloud computing product. These vulnerabilities allow malicious programs to steal information from the memory space of other programs, which means that the information that includes passwords, account information, encrypted keys, and even other information that can be theoretically stored in memory may be leaked. . GitHub encountered a large -scale Memcached DDOS attack In February 2018, Github, a well -known code custody website, encountered a large -scale MEMCACACHED DDOS attack in history, with a peak of traffic as high as 1.35 TBPS. However, five days have passed, and the DDOS attack has reached a record again. A US service provider encountered a high peak of DDOS attacks, reaching 1.7 TBPS! Attackers used the exposed MEMCACHED server to attack. Researchers at network security companies have found that as of the end of February 2018, China has 25,000 MEMCACHED servers exposed to the Internet. . Apple iOS IBOOT source code leak In February 2018, some people on the open source code sharing website github (software project custody platform) shared the core component source code of the iPhone operating system. The leaked code belongs to the iOS security system An important part of the component -SBOOT. IBOOT is equivalent to the BIOS system of Windows computer. The IBOOT source leak may cause hundreds of millions of iOS devices to face security threats. Jonathan Levin, a developer of iOS and MacOS system, said that this is the worst leak in iOS history. . The Pyeongchang Winter Olympics in South Korea encountered a hacker attack In February 2018, the opening ceremony of the Pyeongchang Winter Olympic Games in South Korea encountered a hacker attack on the day. ) The official website of the Olympic Games could not work normally. Many viewers could not print tickets for the opening ceremony and eventually failed to enter normally. . Cryptocurrency mining software attacks the paralysis of European wastewater treatment facilities mid -February 2018, industrial network security enterprise Radiflow stated that four servers in the operation technology network connected to European wastewater treatment facility operation technology network encountered Invasion of cryptocurrency mining malware. The malware directly dragged down the HMI server CPU in the wastewater treatment equipment, causing the European wastewater treatment server to be paralyzed. Radiflow said that the accident was the first to attack the operating technology network of key infrastructure operators for the first time of cryptocurrency malware. Because the infected server is an human -machine interaction (referred to as HMI) equipment, the reason why the wastewater treatment system is paralyzed is because this malware will seriously reduce the operating speed of HMI. Divirus invasion related articles: 1. Introduction to the computer virus "Flame" . How to prevent extortion of virus 3. How to make computer virus and other rogue software invade the computer r r r r r r r r r r r 4. Main classification of computer virus 5. What to do if the computer is in the computer.exe Trojan horses
The computer virus is invisible, but it is always threatening our computer security. There are many types of viruses, both types, characteristics, or invasion methods. They also need to defend their common invasion in order to protect the security of computers and property. So what are the common methods of invasion?
. Infection virus through communication software
In recent years, through QQ, Yahoo! Messenger, Window and other communication software to spread the virus rate, it has increased sharply. the trend of. So what causes this phenomenon? In fact, the answer is simple, that is, IM software supports viewing the departure information.
The chat software of Windows Live Messenger as an example. In the main interface of the program, click the "Tools" → "Options" above, in the "Options" dialog box, select the left "file transmission" tag on the left side. , Then check the "Use the following procedures for virus scanning" check box, and click the "Browse" button to specify the location of ACAST! Scan and detect.
. P2P network scattered dissemination
The resources and services in the P2P network are scattered on all nodes. Therefore, the realization of information transmission and service are directly between nodes. Invasion, thereby avoiding possible bottlenecks. However, there are many hidden dangers in P2P's network security. For example, when downloading the so -called lifting patch, users are often the traps of the Trojan horses under the malicious people. If they are not careful, they will cause the computer to be invaded. Essence
It, like BIT, Emule (eDonkey) P2P software. By default, each user is allowed to download resources each other. Settings will cause the software to share their personal privacy, and people who are shared by P2P can be downloaded casually. This is also a common thing in addition to the above viruses and Trojan traps. If you want to defend here, you can install firewall software to prevent spy software from secretly transmitting personal privacy data without permission.
3. Precursing regular website mails
. Although you did not provide your mailbox address to anyone, you will receive a certain number of spams every day, and many of these letters are counterfeit. The mail content links of well -known websites such as Taobao, 163, Sina, Sina, and other websites are generally the address of the "fishing" website. Once they enter, they will lose banks or game accounts.
. Fourth, accidentally start the Trojan horse program
Is that some friends may not wait to go online to find patch repair after seeing the vulnerability signal sent by the system, for fear that the hacker will invade at this time. In fact, there is no more terrible thing at this time, that is, some Trojan springs have disguised yourself as a patch, and you are waiting for you to "self -invested". For example, a virus file called UPDATE KB4468-X86.exe. If the system does not install anti-virus software, it is believed that it is difficult to connect it with the virus in an experienced computer master. The consequences will be unimaginable.
. Virus is passed between search engines
In the virtual world of the Internet, when you often encounter QQ friends, or when you send the URL information from your classmate mailbox. I am embarrassed to read the information from my friends, and I am afraid of computer poisoning when I read it. Of course, there are many experienced friends who analyze the content of the website through search engines, but propose to users for a certain website to propose to users The warning often misjudges the situation to make users be invincible. Therefore, everyone is better to install the McAfee tool, so that when the user uses a search engine to conduct web search, the software will help you analyze the security of the search results in advance. If you want to know more about the website, as long as you move the mouse to the website to the website Above the text, you can display the more comprehensive information of its website and whether the website is safe, so that users can rest assured that they can enter the self -determined safety site.
6. The U disk virus automatically runs
I I believe many friends have encountered it. Double -click each partition (such as double -clicking C drive, D drive, E drive, etc.) Only the abnormal situation of the resource manager can open. As the name suggests, this is a virus in the computer. In fact, this virus is called a U disk virus. This virus is transmitted by mobile storage devices such as a U disk, mobile hard disk, and memory card. If you want to remove this type of virus, you can find it. Professional clearing U virus software to help.
If: Campus network security maintenance skills
The campus network is divided into internal and external networks, which means that they can go to school in the inner network or the Internet at the same time. College students usually play games and shopping. Schools Itself has its own server to maintain;
In the environment, first of all at the campus network and its Internet access, you need to set up firewall equipment to prevent external attacks and often update against foreign attacks;
Due to the safety of all users of the campus network, we need to strengthen the reinforcement. In addition to the firewall, we need to increase the analysis and detection of external data such as IPS and IDS such as IPS and IDS to ensure the safety of the campus network. Good protection measures, the internal protection measures must be taken, because some student computers may take home or infected outside, so the internal core switches must be set up for VLAN isolation. The intranet may have DDOS attacks or ARP virus, so we need to install anti -virus software for the server or computer, especially the school server system, etc., safe and authentic security software to protect the security of important computers;
Security SERVER version, often repair vulnerabilities and update security software. Ordinary computers are generally dial -up. If there is an abnormal upper device monitoring, it generally does not affect other computers. Do a good job of safety precautions and plan.
Related reading: 2018 network security event:
. Intel processor exposes "Meltdown" and "SPECTRE vulnerability"
January 2018, Intel processor exposed "Meltdown" (fuse) (fuse) The two new vulnerabilities of "SPECTRE" (ghost), including AMD, ARM, Intel system and processors, all devices released for almost 20 years are affected. The affected devices include mobile phones, computers, servers, and cloud computing product. These vulnerabilities allow malicious programs to steal information from the memory space of other programs, which means that the information that includes passwords, account information, encrypted keys, and even other information that can be theoretically stored in memory may be leaked.
. GitHub encountered a large -scale Memcached DDOS attack
In February 2018, Github, a well -known code custody website, encountered a large -scale MEMCACACHED DDOS attack in history, with a peak of traffic as high as 1.35 TBPS. However, five days have passed, and the DDOS attack has reached a record again. A US service provider encountered a high peak of DDOS attacks, reaching 1.7 TBPS! Attackers used the exposed MEMCACHED server to attack. Researchers at network security companies have found that as of the end of February 2018, China has 25,000 MEMCACHED servers exposed to the Internet.
. Apple iOS IBOOT source code leak
In February 2018, some people on the open source code sharing website github (software project custody platform) shared the core component source code of the iPhone operating system. The leaked code belongs to the iOS security system An important part of the component -SBOOT. IBOOT is equivalent to the BIOS system of Windows computer. The IBOOT source leak may cause hundreds of millions of iOS devices to face security threats. Jonathan Levin, a developer of iOS and MacOS system, said that this is the worst leak in iOS history.
. The Pyeongchang Winter Olympics in South Korea encountered a hacker attack
In February 2018, the opening ceremony of the Pyeongchang Winter Olympic Games in South Korea encountered a hacker attack on the day. ) The official website of the Olympic Games could not work normally. Many viewers could not print tickets for the opening ceremony and eventually failed to enter normally.
. Cryptocurrency mining software attacks the paralysis of European wastewater treatment facilities
mid -February 2018, industrial network security enterprise Radiflow stated that four servers in the operation technology network connected to European wastewater treatment facility operation technology network encountered Invasion of cryptocurrency mining malware. The malware directly dragged down the HMI server CPU in the wastewater treatment equipment, causing the European wastewater treatment server to be paralyzed.
Radiflow said that the accident was the first to attack the operating technology network of key infrastructure operators for the first time of cryptocurrency malware. Because the infected server is an human -machine interaction (referred to as HMI) equipment, the reason why the wastewater treatment system is paralyzed is because this malware will seriously reduce the operating speed of HMI.
Divirus invasion related articles:
1. Introduction to the computer virus "Flame"
. How to prevent extortion of virus
3. How to make computer virus and other rogue software invade the computer r r r r r r r r r r r
4. Main classification of computer virus
5. What to do if the computer is in the computer.exe Trojan horses