Worms and prevention of worms

  
                

With the development of technology, computer viruses are even more rampant. We can only know each other and know how to win! Recently, worms are very popular, so we must pay attention to them. The following small series gives you a detailed analysis of the hazards and preventive measures of worms.

First, what is the worm?

The virus Virus.Win32.Alman.b is a variant of the virus Virus.Win32.Alman.a. Every time this virus infects a file, the virus characteristics will change once. The antivirus engine wants to repair the infected file through the feature code killing, which is very difficult.

Second, the performance and harm of worm

virus.win32.sipem.b This is a Trojan horse program, stealing passwords. . . Achieve self-starting, allowing a malicious attacker to remotely control the computer and steal passwords and personal data after the virus runs. And a large amount of system resources are used to cause the machine to run slowly.

This virus is highly mobile and can infect other secure files on your computer. Conventional antivirus is difficult to remove, and there is even a phenomenon that prevents antivirus software from opening. Long-term operation can cause irreparable damage to the disk. Simply reinstalling the system with such a virus does not help. A one-click restore may not completely eliminate such viruses.

Third, how to prevent such viruses?

1, install anti-virus software, develop the habit of anti-virus after each boot. Regular full scans, stubborn Trojans. (For some viruses, it is very latent)

2. Do a good job of backing up important files, and then perform anti-virus check on the carrier and computer before opening important backup files.

Open the file without poisoning the computer to avoid infection.

3, when the virus is first run, it will be prompted to pay attention to the type of virus that kills the soft prompt (different from some crack patches and cracking software we use). In case of this virus, delete it immediately and perform a full scan, especially the system files.

4, some viruses may be bundled, when using unknown installation packages or software, when it is impossible to make a judgment whether it is a virus and it is not necessary, it can be isolated in the 360 ​​sandbox. Use it after confirming that the software or files are safe.

5, install a secure browser does not directly use unprotected, or IE browser that comes with windows to browse unknown web pages

6, regular repair of windows system vulnerabilities does not give the virus to take advantage of machine.

Fourth, if you accidentally deal with this virus?

1, early for the poisoning time is not long, the disk is not damaged, serious file infection can be used 360 or Kingsoft Internet Security's own system first aid kit for a full-scale stubborn Trojan killing and repair. (This operation is too time consuming. It is recommended to let the computer handle it before going to bed at night.) Immediately after processing, restart the computer and perform regular antivirus (full scan). After the anti-virus is completed, open the soft-killing patching function to fix and update the vulnerability.

Restart again after you finish.

2, for users with longer poisoning time, enter the pe and re-distribute all the disks, reinstall with the original windows system (do not use the ghost image file - this system is installed Because the lack of boot files may make the system unusable, you can use the ghost system to restore after installation.

3, for the long-term operation of the virus, the disk may have been damaged seriously. At this time, the above two methods are not applicable, you need to replace the hard disk. Finally, it is recommended to keep backups of important data as much as possible in case of emergency.

After a small series of analysis, I believe that everyone has a certain understanding of the worm, we must pay attention to prevent, so as not to invade the computer, causing bad effects.

Copyright © Windows knowledge All Rights Reserved