To ask the fact that everyone is doing the most work or amateur life, there is no doubt that it must be online, but only if it is online, there is a virus invasion, so how can it be effective? The prevention of viruses is very important, because only by understanding the characteristics of the virus can effectively reject it outside the network, the following, for everyone to introduce the five kinds of "invisible virus" in the webpage code to ensure that friends online Security.
The stealth virus is roughly divided into the following categories:
Web virus one: CPU usage
By continuously consuming the system resources of the machine, the CPU usage is up to 100. %, so that the computer can no longer process other users' processes.
“Stealth Killer 1” The typical prank of code is to create an infinite loop through JavaScript. This type of code can appear on a malicious website or as an email attachment. Most mail client programs now automatically call the browser to open HTM/HTML type files. This way, as soon as you open the attachment, there will be countless new browser windows on the screen. Finally, you have to restart your computer.
Avoiding methods: For such problems, you can only open attachments to emails sent by strangers, especially extensions with .vbs, .htm, .doc, .exe extensions
Web Virus 2: Illegal Reading of Local Files
This type of code typically involves reading local files on a web page through calls to Activex, JavaScript, and WebBrowser control.
“Invisible Killer 2” The code is more subtle than the "Invisible Killer 1", and the average person is not easy to find that the invisible code is reading the files on their hard disk. “Invisible Killer 2” can also use the browser's own vulnerability to achieve its killing, such as IE 5.0 IFrame vulnerability. A few lines of code can read any file that IE can open on your local hard drive.
Avoidance: You can do this by turning off JavaScript and keeping an eye on Microsoft's security patches.
Web virus three: Web spoofing
The attacker first hacks into the DNS server responsible for domain name resolution of the target machine, and then resets the DNS-IP address to one. He has already taken the superuser privilege. Host.
This type of attack is currently rare in the country, but if it succeeds, the damage is very large and can be costly. The attack method is: fake the same environment as the target machine on the host where he has taken the super user right to trick you into surrendering your username and password, such as our email or even the online bank account number. password. Because you are facing an environment like yesterday, when you skillfully type in the username and password, you didn't even think of a real host.
Network has become an indispensable tool in our life, and users with notebooks often use wireless ne
The friend has recently lost the password of the router. If you want to reset the password, you need
Recently, many users have turned to the computer to listen to music and watch the video and found th
u disk is an indispensable tool in our office life, but it will inevitably encounter some problems i
How to change the user access to the shared folder
Windows network firewall where to set up teach you network firewall settings
How to solve the problem when Thunder downloads to 99%?
Teach you how to detect ARP virus in your computer
The solution to the problem of the ound.000 folder
How to completely remove the use of the computer
How does the printer scan files to the computer?
How to maintain the CPU can make the computer work faster?
Windows XP users see if you have made such an error too
Microsoft WinMinware included in Windows 7 reveals more details
In the long run, the experience of an excellent operating system is the most needed
Win10 Edge browser sets bing as the default search engine method
Windows7 crashes fixed screen some solutions
How to solve the Windows 7 sound card service does not work properly
Win7 system files are being used. Cannot delete the solution
How to upgrade win7 to win10 free? Win7 free upgrade win10 detailed graphic steps
Win7 system installation Office2010 prompts the lack of MSXML components how to do?