Counting the five invisible viruses in the webpage

  

To ask the fact that everyone is doing the most work or amateur life, there is no doubt that it must be online, but only if it is online, there is a virus invasion, so how can it be effective? The prevention of viruses is very important, because only by understanding the characteristics of the virus can effectively reject it outside the network, the following, for everyone to introduce the five kinds of "invisible virus" in the webpage code to ensure that friends online Security.

The stealth virus is roughly divided into the following categories:

Web virus one: CPU usage

By continuously consuming the system resources of the machine, the CPU usage is up to 100. %, so that the computer can no longer process other users' processes.

“Stealth Killer 1” The typical prank of code is to create an infinite loop through JavaScript. This type of code can appear on a malicious website or as an email attachment. Most mail client programs now automatically call the browser to open HTM/HTML type files. This way, as soon as you open the attachment, there will be countless new browser windows on the screen. Finally, you have to restart your computer.

Avoiding methods: For such problems, you can only open attachments to emails sent by strangers, especially extensions with .vbs, .htm, .doc, .exe extensions

Web Virus 2: Illegal Reading of Local Files

This type of code typically involves reading local files on a web page through calls to Activex, JavaScript, and WebBrowser control.

“Invisible Killer 2” The code is more subtle than the "Invisible Killer 1", and the average person is not easy to find that the invisible code is reading the files on their hard disk. “Invisible Killer 2” can also use the browser's own vulnerability to achieve its killing, such as IE 5.0 IFrame vulnerability. A few lines of code can read any file that IE can open on your local hard drive.

Avoidance: You can do this by turning off JavaScript and keeping an eye on Microsoft's security patches.

Web virus three: Web spoofing

The attacker first hacks into the DNS server responsible for domain name resolution of the target machine, and then resets the DNS-IP address to one. He has already taken the superuser privilege. Host.

This type of attack is currently rare in the country, but if it succeeds, the damage is very large and can be costly. The attack method is: fake the same environment as the target machine on the host where he has taken the super user right to trick you into surrendering your username and password, such as our email or even the online bank account number. password. Because you are facing an environment like yesterday, when you skillfully type in the username and password, you didn't even think of a real host.

Copyright © Windows knowledge All Rights Reserved