1. Anti-virus software scanning method
This is probably the first choice of most of our friends, and I am afraid it is the only choice. Now there are more and more types of viruses, and more and more concealed methods The brighter it is, it brings new difficulties to virus detection, and it also brings challenges to anti-virus software developers. However, with the improvement of the technology of computer program development languages and the increasing popularity of computer networks, the development and spread of viruses has become easier and easier, so there are more and more anti-virus software development companies. But the most famous ones are the anti-virus software of several systems, such as Kingsoft Internet Security, KV300, KILL, PC-cillin, VRV, Rising, Norton, etc. As for the use of these anti-virus software, there is no need to talk about it here, I believe everyone has this level!
Second, observation method
This method can only be accurately observed when you understand some symptoms of virus outbreaks and where you often live. For example, when the hard disk often crashes when booting, the system takes a long time to boot, the running speed is very slow, the hard disk cannot be accessed, the special sounds or prompts appear, and the above-mentioned failures in the first major point, we must first consider the virus in Make a mistake, but you can't go to the end. Didn't I say that the software and hardware failures may also cause those symptoms! For viruses, we can observe from the following aspects:
1, memory observation
This method is generally used for viruses found under DOS, we can use DOS Use the "mem/c/p" command to check the memory usage of each program, and find the memory usage of the virus (generally not alone, but attached to other programs). Some viruses occupy memory more concealedly. You can't find it with "mem/c/p", but you can see that the total basic memory of 640K is less than 1k or a few K.
2. System configuration file observation method
This kind of method is generally also suitable for hacker programs. This kind of virus is generally hidden in system.ini, wini.ini (Win9x/WinME ) And the startup group, there is a "shell=" item in the system.ini file, and "load=" and "run=" items in the wini.ini file. These viruses generally load themselves in these items The program, note that sometimes it is to modify the original program. We can run the msconfig.exe program in Win9x/WinME to view one by one.
3. Characteristic string observation method
This method is mainly aimed at some more special viruses. When these viruses invade, they will write corresponding characteristic codes. For example, CIH viruses will write strings like "CIH" in the invaded files. Of course we It is impossible to find out easily. We can use the hexadecimal code editor to edit the main system files (such as Explorer.exe) to find out. Of course, it is best to backup before editing, after all, it is the main system file. P>
4. Hard disk space observation method
Some viruses will not damage your system files, but only generate a hidden file. This file generally contains very little content, but it occupies a lot of hard disk space. Sometimes it’s so big that your hard drive can’t run general programs, but you can’t see it when you check it. At this time, we have to open the explorer and set the properties of the content to be viewed as a file with all properties ( This method shouldn’t require me to speak?), I believe this behemoth will be visible at that time, because viruses generally set it as a hidden attribute. Just delete it at that time. Examples in this regard are in my computer network maintenance. I have seen a few cases in the process of repairing personal computers. It is obvious that only a few commonly used programs have been installed. Why is there no display of a few gigabytes of hard disk space in the C drive? The above methods can generally show the virus quickly.
This article is published by www.internetweblist.com and does not represent the position of www.internetweblist.com/：http://www.internetweblist.com/Virus prevention/21814.html