In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
Editor to share with you what the harm of computer viruses, I believe that most people do not know much, so share this article for your reference, I hope you will learn a lot after reading this article, let's go to know it!
The harm of computer virus is shown as follows: affecting the execution of programs and destroying user programs and data. A computer virus is a set of computer instructions or program code that the programmer inserts into the computer program that destroys the computer function or data, which can affect the use of the computer and can copy itself; the computer virus can destroy the user program and data, so that the program can not be executed.
Computer virus (Computer Virus) is a group of computer instructions or program codes that programmers insert into computer programs that destroy computer functions or data, can affect the use of the computer, and can copy themselves.
Computer viruses are artificial, destructive, contagious and latent programs that destroy computer information or systems. It does not exist independently, but is hidden in other executable programs. After the virus in the computer, the light will affect the running speed of the machine, and if it is serious, the crash system will be destroyed; therefore, the virus will bring great losses to users. Usually, we call this destructive program a computer virus.
Computer viruses are contagious, concealed, infectious, latent, excitable, expressive or destructive. The life cycle of computer virus: development period, → infection period, → incubation period, → attack period, → discovery period, → digestion stage, → extinction period.
Harm
It is very important to enhance the awareness of the prevention of computer viruses and realize that the viruses are destructive and destructive. Nowadays, computers have been used in various industries, computers and computer networks have become an important part of people's lives, and viruses will destroy and tamper with computer data, and theft will cause serious network security problems. affect the efficiency of the use of the network.
(1) if the virus is activated, the computer will have a great reaction; most viruses will directly destroy the important information and data of the computer when they are activated, it will directly destroy the CMOS settings or delete important files, format the disk or rewrite the directory area, and rewrite the files with "junk" data. A computer virus is a piece of computer code, which must occupy the memory space of the computer, and some large viruses still copy themselves inside the computer, resulting in a substantial reduction in computer memory. when the virus is running, it also preempts the interrupt, modifies the interrupt address and adds the virus's "private goods" in the interrupt process, which interferes with the normal operation of the system. After the virus invades the system, it will automatically collect users' important data, steal and leak information and data, resulting in a large number of leakage of user information, bringing inestimable losses and serious consequences to users.
(2) consume memory and disk space. For example, if you do not access the disk, but the disk light flashes wildly, or when you are not running many programs, you may find that the system has taken up a lot of memory, which may be caused by the virus; many viruses are resident in memory in the active state, and some file viruses can infect a large number of files in a short time, and each file is lengthened to varying degrees, resulting in a serious waste of disk space. Normal software often needs to be tested by many people for many times to improve, and computer viruses are usually sent out quickly after individual people finish on a computer, so the harm that the virus brings to the computer is not only the virus expected by the manufacturer, but also caused by some computer virus errors.
(3) computer viruses cause serious psychological pressure on users. The proliferation of viruses makes users nervous and always worried about being infected by the virus. Because most people do not know much about the virus, once there are phenomena such as computer crashes and abnormal software operation, people often suspect that these phenomena may be caused by computer viruses. According to statistics, it is a common phenomenon for computer users to suspect that "the computer has a virus". More than 70% of the computer users are worried that their computers have invaded the virus, but in fact, all the phenomena that occur in the computer are not caused by the virus.
Classification of computer viruses
According to the existing media classification, computer viruses can be divided into three types: guided virus, file virus and mixed virus; according to the link mode, they can be divided into three types: source virus, embedded virus and operating system virus; according to the system classification of computer virus attack, it can be divided into attack DOS system virus, attack Windows system virus, attack UNIX system virus. Today's computer viruses are constantly pushing through the old and bringing forth the new, including some unique new viruses that are temporarily unable to be classified according to conventional types, such as Internet viruses (spread through the Internet, some carry more and more virus data), e-mail viruses and so on.
These are all the contents of this article entitled "what are the dangers of computer viruses?" Thank you for your reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.