In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
This article is to share with you what the main targets of computer viruses are. The editor thinks it is very practical, so share it with you as a reference and follow the editor to have a look.
The main objects destroyed by computer viruses are "programs and data". Computer virus refers to a group of computer instructions or program codes that destroy computer functions or data, affect the use of the computer and can replicate itself.
The main objects destroyed by computer viruses are "programs and data".
Computer virus (Computer Virus) is a group of computer instructions or program codes that programmers insert into computer programs that destroy computer functions or data, can affect the use of the computer, and can copy themselves.
Computer viruses are artificial, destructive, contagious and latent programs that destroy computer information or systems. It does not exist independently, but is hidden in other executable programs. After the virus in the computer, the light will affect the running speed of the machine, and if it is serious, the crash system will be destroyed; therefore, the virus will bring great losses to users. Usually, we call this destructive program a computer virus.
Computer viruses are contagious, concealed, infectious, latent, excitable, expressive or destructive. The life cycle of computer virus: development period, → infection period, → incubation period, → attack period, → discovery period, → digestion stage, → extinction period.
Characteristics:
As long as any virus invades the system, it will affect the system and applications to varying degrees. The light ones will reduce the computer work efficiency and occupy the system resources, while the serious ones can lead to data loss and system crash. The programmability of a computer virus means that, like other legitimate programs, it is an executable program, but it is not a complete program, but a program parasitic on other executable programs, only when other programs are running. the virus plays a destructive role. Once the virus enters the computer and is executed, it will search for other qualified environments, determine the target, and then make itself among them, so as to achieve the purpose of self-reproduction. Therefore, infectivity is an important condition for judging computer viruses.
Only when the virus meets its specific conditions, it will cause fatal damage to the computer, the computer or the system will not react immediately after poisoning, and the virus will be hidden in the system for a long time. For example, the most unforgettable is the attack of CIH on the 26th, in addition to the famous "Black Friday" on Friday of the 13th, and so on. Viruses are usually attached to normal hard drives or programs, and it is difficult for computer users to find them before they are activated. They use high programming skills to program, and are short and executable programs that have a devastating effect on the computer. Generally, no users take the initiative to execute virus programs, but viruses will have an effect after their conditions are ripe, or destroy programs, disrupt the work of the system, and so on. The unauthorized operation of a computer is a typical feature of a computer virus, which runs automatically without the permission of the operator.
Concealment:
Computer viruses are not easy to be found, because computer viruses have strong concealment, and they often exist in the form of hidden files or program codes. In ordinary virus detection and killing, it is difficult to achieve timely and effective detection and killing. The virus is disguised as a normal program, and computer virus scanning is difficult to detect. Moreover, some viruses are designed as virus repair programs to induce users to use them, so as to implant the virus and invade the computer. Therefore, the concealment of computer viruses makes computer security prevention in a passive state, resulting in serious security risks.
Destructive:
When the virus invades the computer, it is often extremely destructive, which can destroy the data and information, even cause a large area of computer paralysis, and cause great losses to computer users. Such as common Trojans, worms and other computer viruses, can invade the computer on a large scale, bringing security risks to the computer.
Contagion:
One of the major characteristics of computer viruses is contagious, which can invade the computer through U disk, network and other ways. After the invasion, it is often possible to spread the virus, infect the uninfected computer, and then cause a large area of paralysis and other accidents. With the continuous development of network information technology, the virus can achieve a wide range of malicious intrusion in a short period of time. Therefore, in the security defense of computer viruses, how to face the rapid virus infection has become an important basis for effective defense against viruses, and it is also the key to build a defense system.
Parasitic:
Computer viruses also have parasitic characteristics. Computer viruses need to be parasitic in the host in order to survive, to better exert their functions and destroy the normal function of the host. In general, computer viruses are parasitic in other normal programs or data, and on this basis, a certain medium is used to achieve transmission. In the actual operation of the host computer, once a certain setting condition is reached, the computer virus will be activated. With the start of the program, the computer virus will constantly assist and modify the host computer files, so that its destructive role can be brought into full play.
Enforceability:
Like other legitimate programs, a computer virus is an executable program, but it is not a complete program, but parasitic on other executable programs, so it enjoys all the rights that programs can get.
Triggering:
The characteristic of a virus that induces a virus to infect or attack because of an event or value.
Initiative of attack:
The virus attack on the system is active, no matter how strict the protection measures taken by the computer system, it is impossible to completely rule out the virus attack on the system, and the protection measures are at best a means of prevention.
The targeting of the virus:
Computer viruses are specific to specific computers and specific operating systems. For example, there are some for IBM PC and its compatible computers, some for Apple's Macintosh, and some for UNIX operating system. For example, the Globular virus is targeted at the DOS operating system on IBM PCs and their compatible computers.
Thank you for reading! This is the end of this article on "what are the main objects destroyed by computer viruses?". I hope the above content can be of some help to you, so that you can learn more knowledge. If you think the article is good, you can share it for more people to see!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.