Saturday, January 22, 2011
Weak current College】 【Win 7 block virus execute method to share.
<br> <br> Often heard some professional IT staff that "many computer users installed anti-virus software on that computer safe Daji, point anti-virus concept, that this will not be poisoned?" <br> <br> To not .poisoning and, more importantly, to further understand how the virus works, as well as your anti-virus protection. Here, hope for general business computer users, can provide adequate concept of "anti-virus". Maybe not "guarantee", but .at least you for the computer happened to have a sketch of it! <br> <br> Exquisite delicate splash program <br> <br> Use a computer must be powered on, turn on the power supply until the operating system loader is complete ., this is the so-called "boot program." Since the virus most will try to make yourself "part of" on procedure (for parasites and infections), so you have to know what this entire program: <br> <br> .1. power on, if the hardware is all normal for the next steps <br> <br> 2.BIOS (basic input / output system) to perform routine system check, and then to preset storage installations take over the post procedure <br .> <br> 3. in accordance with industry-accepted specifications, preset boot device (typically hard drives) for software-on procedure, in order to load the operating system kernel, drivers, ... <br> <br> 4. .after loading the operating system core, you can also load according to the set, users specify the various permanent programs (anti-virus software, IM software ...)< br> <br> Above every post program, from this step to the .next steps that will leave a "hook". For example, the BIOS on motherboards to execute the system stored media splash program, it will go from a fixed location, this post command fixed location? we don't know what the average person, .but this position and the convergence is an open specification. <br> <br> So, write operating systems to the knowledge of the location of the storage media post, write disk maintenance program of people know that to write tools that people know and write .viruses of human ... Of course, also know as a so-called "open model viruses". <br> <br> However, this "open model has very rare virus", mainly because of the power-on, load the .operating system are quite large and complex, this virus is so complicated power-on State also work correctly. At present most of the virus, most of them choose to this piece for the operating system. <br> <br> No possibility of. ... <br> <br> Whether it's Windows, MacOS, Linux or BSD, the operating system to start loading the intricate progressive steps constitute a ring then a ring. The operating system usually must set processor mode of operation, loading the system kernel ., drivers, and mapping interface, and then add to the program, then the right of use to the consumer. If these "smart" but also "fragile" on procedure a little mistake, the system could not be loaded, the user will say ."Oh I hung up the computer when the machine has / / cannot be opened / died ... Various remarks, notably: <br> <br> ● Driver problem <br> <br> • A problem with the core program <br .> <br> • Storage OS core program disk problems <br> <br> ● Users having problems with the permanent program <br> <br> As long as there is a small link error, it is possible to let the operating system does .not load-Fortunately this situation does not always happen. <br> <br> At this point, the concept sounds seemed so simple? <br> <br> Please introduce the concept of "memory" <br> <br> Regardless of .which operating system, and so on is completed, users can perform a variety of application software. For example, you can perform a browser, a word processing program, movie playback program ... The specific behavior is to use the mouse in the application's .icon, press the left mouse button twice, Yes, it's that "easy". <br> <br> Just ordinary people often forget is: computer has a very important "component", known as "memory". When users press the power ., Executive power on the program, this is a very important step is the core of the operating system: "from the storage media is loaded into memory." <br> <br> The core of the operating system is loaded into memory, according .to the design and development firms, will continue to maintain its core and consumer application properly, this process is delicate and fragile. In addition, because the program is "people", if you write programs in "graffiti" (whether intentional or unintentional) ., application there may cause the operating system core program is corrupted and when the machine. <br> <br> As for viruses? <br> <br> Virus will want to have the following capabilities: <br> <br> ● Resident .in memory, by disguising himself as a part of the operating system <br> <br> ● Camouflage, it is best to let anyone, any software is found not to <br> <br> • As far as possible not to interfere with .the operation of the original program to avoid being detected <br> <br> ● Possible ways to make your own (virus) go to someone else (not computer) who <br> <br> • If necessary, you can make some useful .for author (or fun) of things, including the theft of a subsidy, destructive ... <br> <br> Executable file learning more <br> <br> Well, if the virus to their accumulation into memory, first of all .it had to let you go "do" it. <br> <br> The question is, which one will perform a virus so silly - if the virus's forehead wrote "I am a virus to Oh to Oh, for me," .you can touch it? ironclad does! <br> <br> Therefore, virus writers will try to, deliberate of users unconsciously performed to achieve the purpose of "infection". <br> <br> Therefore, "executable files", became .the most viruses "The main goal of the parasitic". <br> <br> The so-called executable file, that is what we call the "program" and "software", usually this kind of software is one (or several) .archives. Said earlier, the software will be loaded into memory before it can be used to perform, use of, the software's author will use the development tools will be "original program" compiled into "executable files", and then shipped to users so .that users can perform. <br> <br> Previously, the executable file only fixed several formats: extension is. COM,. EXE,. BAT, and these are executable files. The Windows7 times, this is not the same. However, .Windows later introduce a lot of "rare" executable file formats. For example,. DLL is "dynamic link library", it is also a "must be attached in the main program" beneath an executable file;. SCR is a screen saver, .it is a special feature of the executable file;. MSI (WindowsInstallerPackage) fluxes are common in the "Setup", but ... It is also an executable file; some narrative, such as. VBS,. JS ... They are .executable files. <br> <br> Here is a "executable files" in the list of extensions, see this type of extension to be careful, harmful things might hide in it. <br> <br> Execution is the most dangerous thing .<br> <br> The problem is that Windows preset will hide it recognize the file extension, therefore, to be honest, you don't know what you do. <br> <br> It doesn't matter, you just imagine .: when you are in an icon on both the left mouse button-you are what you want to perform. <br> <br> When you perform a what-you must remember: this is our "users should note that signal』 『RedFlag .. "If there is a something you definitely have to be vigilant, in addition to the" password "you have been asked about it, another thing is this. <br> <br> Therefore, you must remember to: <br> < .br> "Perform a what things must be careful." <br> <br> It's that simple. <br> <br> Because, many viruses attached inside the executable file, you perform the "poisoned". Moreover, the poisoning of .computer did not clean, they will continue to infected computer files, or send a letter, or a virus infection of other files on the server ... But this virus also modify system settings, allowing users to "even found wrong" cleanup work difficult .-sometimes it is almost impossible. <br> <br> So, sometimes, the entire computer to be poisoned by the reload is not, because all of the executable file is infected and cannot be restored. <br> <br> Internet is .the "Hell's Gate" <br> <br> However, I'm afraid there is a really difficult thing-that is the Web page! <br> <br> When you use a browser to go to any page, even frankly. ... Hell's gate opens. Because Web pages can help you make a lot of things, do one of the many features - but mostly automatically and you do not know. Normal Web pages, of course, not the whole you, or let your .poisoning ... However, not normal Web pages has many miles! <br> <br> In fact, you should know that the browser itself is a "performer", which is itself was designed to be "used to perform various functions" .tool. Moreover, the operating system there are so-called "compatibility" problem, but the browser itself was designed as a so-called "cross-platform", the best all browsers can have the same capacity, so that the page developer can .write a function-you can make all the users can use-gosh! the world is a Commonwealth of implementation is more than this. However, this also makes the page virus writers have the opportunity ... What style will allow these virus writers more .easy? of course write a cross-platform universal virus! <br> <br> Web page in the form of a virus, it will make use of so-called "narrative" (JavaScript) constantly bouncing annoying window, some will secretly put .viruses into your computer and will directly perform some bloody action ... And frankly, this kind of problem than executable file poisoning more cumbersome, because users cannot know. <br> <br> Therefore, the anti-virus software (or so- .called InternetSecurity) in this case is very important. <br> <br> Don't let the virus is executed method <br> <br> So, can only rely on users to be careful on proof of a frustrating? we systematically, .every link, we can do, below are some common "proof" of method "list: <br> <br> ● Each program to go through a certification <br> <br> In order not to let users perform to do dirty things ., so the operating system vendor to provide "you perform each program you want to give it checked". Oh, do you think it's funny? no, iPhone is so-although it is not intended to anti-virus, but this closed system is .also fairly safe-because all software shelves are approved by Apple. <br> <br> ● Each program (as long as was identified hazardous) have agreed to implement to users <br> <br> WindowsVista / 7 underneath a UAC, simply .tell your program of hazardous jumps out to you, "OK", which would allow virus "harder to silently infected you", but most people haven't affected their profits, may turn off the gas to this function. But to be fair, .RB and convenience, this is somewhat of a necessary evil. <br> <br> ● Install anti-virus software <br> <br> Anti-virus software "should be" you can proof the executable file virus, firewall software, " .should "be stopping attacks from the Internet and beyond, but you don't say" I do not perform dirty things I do notUsed with anti-virus software "-the best is, you'd better not go online. Some network worm is .just using so-called "vulnerability" directly into your computer's memory, and then your network online automatically paralysis. You even if you do nothing, there is the possibility of poisoning. So please be sure to use anti-virus software-whether it is .a free version or the paid version. <br> <br> ● Implementation of any "executable" things, you have to pay more attention to <br> <br> Indeed, many people throw the execution of the program-and passing to .the virus, which is the destruction of the biggest problems-why?, because this is "you go to the", so the virus caught it absolutely can do whatever they want, it will replace the system registry file to your computer's hard disk, .stealth, infection of various important archives ... Results? result is "light the reload, it died when the", so this may not be the "unique principle", but it is general users that know the most important principles. <br .> <br> <br> <br>.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment