Computer security knowledge First: What is the process? The process is the running instance of the application program and a dynamic execution of the application program.Seemingly profound, we can simply understand that it is * as the execution program of the system currently running.Execution programs currently running in the system include: the system manages the individual computer and completes all kinds of necessary programs; the additional programs that users open and execute, of course, also include illegal programs that users do not know, but run automatically (they may be viral programs). The more harmful executable viruses also appear in the form of "processes" (some viruses may not be displayed in the process list, such as "macroviruses"), so timely inspection and accurate killing of illegal processes plays a key role in manual antivirus. Second: What is a Trojan Horse? Trojan horse virus originated from the famous Trojan horse strategy in the Trojan War in ancient Greece. As its name implies, Trojan horse virus is a network virus camouflaging latent, waiting for the opportunity to come out to harm. Infectious mode: Send it by email attachment and tie it up in other programs. Virus characteristics: will modify the registry, resident memory, install backdoor programs in the system, boot loaded with Trojan horse. Trojan Horse Virus Destruction: Trojan Horse virus attack in the user's machine to run client programs, once the attack, you can set the back door, regularly send the user's privacy to the Trojan Horse program specified address, generally at the same time built-in can enter the user's computer port, and can arbitrarily control the computer, delete files, copy, change passwords and other illegal* Preventive measures: users should be vigilant, do not download and run programs of unknown origin, and do not open email attachments of unknown origin at will. Third: What is a computer virus? A computer virus is a program, an executable code.Like biological viruses, computer viruses have unique replication capabilities.Computer viruses can grow fast Delays are often difficult to eradicate.They can attach themselves to various types of files.When files are copied or transferred from one user to another, they follow suit Spread with documents. In addition to the ability to replicate, some computer viruses have other common features: a contaminated program can transmit viral vectors.When you see viral vectors, it seems They may have destroyed files, reformatted your hard drive, or triggered other types of disasters when they were just displayed in words and images.If the virus is not Parasitic to a polluting program, it can still cause you trouble by occupying storage space and reduce the overall performance of your computer. The definition of computer virus can be given from different angles.One definition is that programs that can "infect" other programs by spreading them through disks, tapes, and networks.The other is a latent, infectious and destructive program that can replicate itself and exist with the help of certain carriers.It is also defined as an artificially manufactured program that lurks or parasitizes in storage media (such as disk, memory) or programs in different ways.When a certain condition or time is ripe, it will copy and spread spontaneously, so that computer resources are destroyed by different programs and so on.These statements borrow from the concept of biological viruses in a sense. The similarity between computer viruses and biological viruses is that they can invade computer systems and networks and endanger normal work of "pathogens".It can destroy all kinds of computer systems, and at the same time it can replicate itself, which is infectious.Therefore, a computer virus is a set of programs or instructions that can be latent in a computer storage medium (or program) through some way and activated when a certain condition is reached, which can destroy computer resources. Fourth: What is a worm virus? Worm virus is a kind of computer virus.Its infectious mechanism is to replicate and spread through the network, and the way of transmission is through the network and e-mail. For example, in recent years, "Nimda" virus, which is very harmful, is a kind of worm virus.This virus takes advantage of Microsoft Windows* as a vulnerability in the system. After the computer is infected with this virus, it will con
Computer security knowledge
Tips: Current document can only be previewed at most page8,If the total number of pages in the document exceeds page 8,please download the document。
Uploaded by admin on 2019-10-15 12:52:15