To kill viruses by naming computer viruses
Twenty-five years ago, a high school student in Pittsburgh wrote a prank program that spread through a floppy disk in the operating system of the Mac and showed a crooked poem. This virus named "Elk Cloner" is regarded as the first virus in the computer field.
Viruses have gradually evolved from a joke to the number one killer that harms computers. Nowadays, computer viruses are increasing in both types and destructiveness. Some tricky viruses are difficult for even virus experts to solve immediately, let alone our ordinary users.
Although the capabilities of the current anti-virus software have been greatly improved, it is still in a passive stage. Only after the virus appears can it be checked and killed. However, many viruses now have self-protection functions and can not open anti-virus software or prevent anti-virus software from opening. So often I found a virus but couldn't kill it with anti-virus software. Faced with this problem, many people will choose to kill the tool or manually kill the virus. But to use this method of antivirus, you must first understand what kind of virus you are? Only by knowing this can we find the corresponding special killing tool.
In the face of countless viruses, how can we all know it? In fact, it is very simple. Viruses also have their own naming rules. After understanding these rules, you can easily face these viruses and find special killing tools to completely remove the viruses.
Let's take a look at the naming rules of the virus:
The general format of the virus: <virus prefix>. <Virus name>. <Virus suffix>.
The virus prefix refers to the type of a virus, which is used to distinguish the ethnic classification of the virus. Different types of viruses have different prefixes. For example, our common Trojan virus prefix Trojan, the worm virus prefix is ​​Worm, etc. There are other.
The virus name refers to the family characteristics of a virus, which is used to distinguish and identify the virus family. For example, the family names of the previously famous CIH viruses are all unified "CIH", as well as the recently oscillating wave worm. The family name is "Sasser".
Virus suffix refers to the characteristics of a virus variant and is used to distinguish a certain variant of a specific family of viruses. It is generally represented by 26 letters in English. For example, Worm.Sasser.b refers to the variant B of the oscillating wave worm virus, so it is generally called "oscillating wave B variant" or "oscillating wave variant B". If there are many variants of the virus (which also shows that the virus is tenacious ^ _ ^), you can use a combination of numbers and letters to indicate the variant identification.
In summary, the prefix of a virus is very helpful for us to quickly determine which type of virus the virus belongs to. By judging the type of virus, you can make a rough assessment of this virus (of course, this requires the accumulation of some knowledge about common virus types, which is beyond the scope of this article). Through the virus name, we can use the method of searching information to further understand the detailed characteristics of the virus. The virus suffix lets us know which variant of the virus is now in your machine.
The following is an explanation of some common virus prefixes (for the Windows operating system we use most):
1. System virus System virus prefixes are: Win32, PE, Win95, W32, W95, etc. The general public characteristic of these viruses is that they can infect the * .exe and * .dll files of the windows operating system and spread through these files. Such as CIH virus.
2. The prefix of the worm is: Worm. The common feature of this virus is to spread through the network or system vulnerabilities. Most worms have the characteristics of sending out poisonous emails and blocking the network. Such as shockwave (blocking the network), small postman (sending poisonous mail), etc.
3. The prefix of Trojan virus and hacker virus is Trojan, and the prefix name of hacker virus is generally Hack. The common feature of Trojan virus is to enter the user's system and hide it through the network or system vulnerabilities, and then disclose the user's information to the outside world. The hacker virus has a visual interface that can remotely control the user's computer. Trojan horses and hacker viruses often appear in pairs, that is, the trojan horse is responsible for invading the user's computer, and the hacker virus will be controlled by the trojan horse virus. These two types are now more and more integrated. General Trojans such as the QQ message tail Trojan Trojan.QQ3344, and you may encounter more Trojan horse viruses for online games such as Trojan.LMir.PSW.60. Here to add, the virus name includes PSW or what PWD and the like Generally speaking, this virus has the function of stealing passwords (these letters are generally the abbreviation of "password" in English) Some hacking programs such as: Network Owner (Hack.Nether.Client) and so on.
4. Script virus The prefix of script virus is: Script. The common feature of script virus is that it is written in scripting language and spread through web pages, such as red code (Script.Redlof)-it is not our boss code brother ^ _ ^. Script viruses will also have the following prefixes: VBS, JS (indicating what kind of script was written), such as Happy Hour (VBS.HappyTIme), 14th (Js.Fortnight.cs), etc.
Solar Flood Lights Outdoor,Solar Powered Flood Lights,Solar Powered Outdoor Flood Lights,60W Solar Flood Lights
Jiangmen Biaosheng Solar Energy Technology Co., Ltd. , https://www.bsprosolar.com