Monday, January 3, 2011

【 Weak current college 】 every computer you know?



1. Edition antivirus and pirated anti-virus software is the difference between genuine enjoyment through the network, but piracy upgrade service cannot.

2. all viruses are software or destructive programs, virus simply divided into worm viruses, destructive virus two types, worm-virus can reproduce themselves or through the use of system resources to slow down the speed of the system, causing the computer run faster and more slowly until the operating system crashes, destructive viruses through corrupted computer operating system file, causing the operating system does not start to run, or destroying the computer hard disk data files, resulting in various files on your hard disk does not have a previously using. the CIH virus can damage the motherboard CMOS, causing damage to the motherboard's software, the host cannot normally use, but the boards are now increased protection against this kind of failure CMOS software functionality, you can say that the virus has now unlikely damage hardware, can damage software, including the hard drive partition of partition table, operating system, software, games, MP3, video files, and so on, as already said, these are software, big deal to reinstall all the software on it.

3. a "Trojan horse" is that pretends to be deceptive program, it will attract users to download their own camouflage, which breaking or steal users ' critical files and information through this program, you can steal Trojan horse computer users in a variety of information, account, password, through the network automatically sent to the manufacturing of the Trojan horse, or dissemination of the mailbox or designated location; General Trojans targeted relatively strong, some are stolen game account password, and some stolen online bank account number, password, and some stolen chat software account password.

Once the Trojan horse, first disconnect from the network, because this is immortal also manipulate you, then you can patiently to clear it. There is to do a backup before deleting it, in case of a mistake.

4. malware is a virus and formal software software, also called rogue software.

Classification of rogue software

According to different characteristics and hazards, plagued by the majority of computer users of rogue software mainly has the following categories:

1. advertising software (Adware)

Definition: Adware is defined without user permission to download and install in the user's computer; or bundled with other software, through pop-up ads and other forms of reap business benefits program.

Danger: this type of software often forces installed and cannot be uninstalled; in the background collecting user information for profit, compromise user privacy; frequently pop-up ads that consume system resources, making it run slower.

2. spyware (Spyware)

Definition: spyware is a user unknowingly installed on their computer, to collect user information back door software-hazard: the user's private data and important information will be a "backdoor" captured and sent to a hacker, commercial companies, etc. These "backdoor" even enables users of the computer is a remote control, forming a huge "botnets", this is currently an important threat to network security.

3. browser hijacking

Definition: browser hijacking is a malicious program, through a browser plug-in, BHO (browser helper object), Winsock

LSP, etc. on the user's browser, enabling the user to tamper with the browser is not configured properly, were forcibly boot to a commercial Web site.

Hazard: when users browse the Web site be forced to install the plug-in, a normal user cannot be uninstalled, hijacked, users as long as the Internet will be forced to their assigned site, seriously affecting normal Internet browsing.

4, Act recording software (TrackWare)

Definition: behavior record software refers to steal without user license, and analyzeuser privacy data, record user-computer usage and Internet browsing habits and personal behavior of the software.

Hazard: the compromise user privacy, may be hackers use to online fraud.

For example: some software in the background logging user accessed a Web site and analysed, and some have even sent to specialized commercial companies or institutions, such institutions will thus encompass the user's hobbies, carrying out advertising or business practices.

5, malicious shareware (maliciousshareware)

Definition: a malicious shareware refers to some shared software in order to obtain benefits, the use of tricks, traps, and other ways to try to force users to register, or bundled software in various malicious plug-ins, for permission to be installed on the user machine. hazard: use the "trial trap" forcing the user to register, you may lose data such as personal information. Software integrated plug-ins may cause the users browser hijacked, privacy, theft, etc.

6, other

As the network's development, "rogue software" category is also increasingly fine, some new types of rogue software in emerging, classification criteria will be adjusted accordingly.

Recently, some "rogue software" by the user and the media concern. They are often using special means frequent pop-up ads Windows, compromise user privacy, serious disturbance to the user's daily work, data security and privacy. These software in software user provoked, many users accused them of "out-and-out malicious software".

Rogue software in the Chinese mainland, spread on the network that meet the following criteria (article 1) of the software of a salutation:

Use a variety of social and technical means, or secret, and resist the uninstall installed;

Forced to modify user software settings, such as the browser home page, the software auto-start option, security options;

Forced pop-up ads, or other interference users consume system resourcesAct;

Have against user information and property of potential factors or risks;

Without user permission, or use of user negligence, or lack of knowledge of the user, secret gathering personal information, secrecy and privacy.

These software may also be called malicious adware (adware), spyware (spyware), malicious shareware (maliciousshareware).

And viruses or worms, these software a lot is not a small group or individual secret to write and disseminate, but there are many well-known enterprises and organizations suspected of such software.






No comments:

Post a Comment