The computer usually needs to be maintained. Anti-virus software is the most commonly used method. It is also a necessary tool in every computer, but do you know that you can make eight mistakes when you use it simplely, so you should know about anti-virus. Misunderstanding, avoid walking into these misunderstandings.
1.DIR operation on infected floppy disk will cause the hard disk to be infected
If the computer's memory has no virus, it will only be infected after executing the program (file) with virus. computer. The DIR command is an internal command of DOS and does not need to execute any external programs (files). Therefore, DIR operations on infected floppy disks are not infected with viruses.
However, it should be noted that if there is a virus in the computer memory (or the computer has been infected), if the DIR operation is performed on the floppy disk that is not infected, the floppy disk depth system download may be infected. Said it may be infected because some viruses will not spread through DIR operations.
2. Change the file to read-only mode to avoid infection.
Some people think that setting the file to read-only by DOS's external command ATTRIB will be very effective against it.
Virus. In fact, to modify the properties of a file only need to call a few DOS interrupts, so the ATTRIB command is almost impossible to stop the infection and spread of the virus.
3. Viruses can infect write-protected disks
Since viruses can infect read-only files, many people think that viruses can also modify files on write-protected disks. In fact, the disk drive can determine whether the disk is write-protected and should be written to it. This is all controlled by hardware. You can physically remove the write-protection sensor from the PC, but you can't do it with software. .
If your floppy drive is normal, and the write protection of the floppy disk is not taken down once, it will never be infected. But if you take it down and use the poisoned machine DIR, you are completely infected. Note that this DIR is from the machine to the floppy disk, not the virus from the floppy disk to the machine.
Write protection and file read-only are different. The read-only mode of setting files is through the computer, so the virus can be plugged in, but the write protection must be done by humans. The virus can't get rid of write protection. The computer cannot overwrite the write-protected disk, which cannot be changed by any operation (unless you break the drive).
4. Anti-virus software can kill all known viruses
There are many ways to infect viruses. Some viruses will forcibly cover a certain part of the execution program and embed their own code to achieve no change. For the purpose of the length of the infected file, the code covered by such a virus cannot be recovered, so the virus cannot be safely killed. The virus destroys some of the contents of the file. After killing the virus, it is impossible to restore the original appearance of the file.
5. Use anti-virus software to protect against viruses
The anti-virus software currently on the market can only be used after the virus has flooded. But before the anti-virus, the virus has caused work delays, data damage or other more serious consequences. Therefore, you should choose a complete anti-virus system, which should include not only common check and virus killing functions, but also real-time anti-virus functions. It can monitor and track various operations on files in real time. Alert immediately, the only way to minimize the chance of being infected by a virus.
6. Disk file corruption is mostly caused by viruses
There are various reasons for file corruption, power supply voltage fluctuations, power loss, magnetization, poor disk quality, hardware errors, and other software. Mistakes, dust, soot, tea, and even a sneeze can cause data loss. The damage caused by the above files is more common and more serious than the damage caused by viruses.
7. If you back up the backup, the backup is useless
There are two cases: 1 floppy backup: the backup contains a boot virus. In this case, as long as you don't use this floppy disk to try to boot your computer, it will be as safe as a non-toxic backup. 2 tape backup: There will be no virus in the data file in the backup. If the executable file contains a virus, the execution file will be backed up, but the data file in the backup is still available for download by xp system.
8. Anti-virus software can prevent any virus anytime, anywhere
Obviously, this anti-virus software does not exist. New viruses are constantly appearing, requiring anti-virus software to be upgraded quickly. To fight the virus, we need a security policy and a complete anti-virus system, using backup as the first line of defense against anti-virus, anti-virus software as a second line of defense. At the same time, the timely upgrade of the software is the only way to strengthen the second line of defense. Anti-virus software is used to aid anti-virus, it can not be a bodyguard that is invulnerable.
I don't know if you read the article and you are scared. The seemingly easy anti-virus process is actually a hidden crisis. Therefore, everyone should take a good look at these misunderstandings and avoid making these mistakes during anti-virus.
Nowadays, more and more users need to stare at the computer for a long time due to work needs, which
When we do some projects, we often encounter such a situation, write some code under window
How to solve the problem of pinging the gateway? I believe many users have encountered this situatio
The graphics card driver is the communication bridge between the graphics card and the computer. If
How to solve the black screen problem of Windows system death
How to set up the computer time switch machine?
What drivers are needed to successfully install the system
VMbo installs xp or win7 with ghost
Black screen prompts the computer to boot Invalid partition table error how to solve?
Prevent mail server poisoning firewall debut
How to solve the problem that the target volume cannot be locked when installing the system?
Several backup tools under Linux system competition
Solve the problem of opening the dial-up connection after booting for a long time.
How does the Win7 system lock the IE browser homepage through the registry?
How to set WinXP desktop automatically back to the classic theme
How to hide the system reserved disk and its contents in win7/win8 system
Detailed steps to activate Windows 8
Windows Vista system makes service optimization easy
The difference between the 7 versions of the Win10 system is
Win10 Quick Access List Folder is not fixed method
Win7 system double-click the disk prompt "windows can not complete the format" repair method
How to delete the U disk usage history in the win7 Ultimate computer