Computer virus performance 1. Prompt some irrelevant words. HOT SALE,All In One Pc,All In One Pc Gaming,All In One Pc As Monitor,All In One Pc For Business Guangzhou Bolei Electronic Technology Co., Ltd. , https://www.nzpal.com
The most common is to prompt some irrelevant words, such as opening a Word document infected with a macro virus. If the attack conditions are met, it will pop up a dialog box showing "This world is too dark!", And ask you to enter "too correct" Press the OK button.
2. Send out a piece of music. Mischievous computer viruses, the most famous are the foreign "Yangkee" computer virus (Yangkee) and the Chinese "Liuyanghe" computer virus. The "Yangji" computer virus attack uses the built-in speaker of the computer to play "Yangji" music, and the "Liuyang River" computer virus is even more extreme. When the system clock is September 9th, the song "Liuyang River" is played, and when the system clock is It was the melody of "Dongfanghong" on December 26th. Most of these types of computer viruses are "benign" computer viruses, which only emit music and occupy processor resources when they occur.
3. Generate specific images. Another type of mischievous computer virus, such as the small ball computer virus, will continuously drop the small ball graphic from the top of the screen when it attacks. Most computer viruses that simply generate images are also "benign" computer viruses, which only destroy the user's display interface during the attack and interfere with the user's normal work.
4. The hard drive light keeps flashing. The hard drive light flashes to indicate a hard drive read and write operation. When there are a lot of continuous operations on the hard disk, the light of the hard disk will keep flashing, such as formatting or writing very large files. Sometimes the hard drive light will keep blinking when a hard drive sector or file is read repeatedly. Some computer viruses will format the hard disk at the time of the attack, or write many junk files, or repeatedly read a certain file, resulting in the loss of data on the hard disk. Computer viruses with this type of attack are mostly "malignant" computer viruses.
5. Perform game algorithms. Some mischievous computer viruses take certain algorithms and simple games to interrupt the user's work. They must play to win the user's work. For example, the once-popular "Taiwan One" macro virus broke out when the system date was 13th, and a dialog box popped up asking the user to do arithmetic problems. This type of computer virus is generally a "benign" computer virus, but there are also "malignant" computer viruses that destroy after a user loses.
6. The Windows desktop icon changes. This is generally a manifestation of a mischievous computer virus. Change the default icon of Windows to other style icons, or change the icons of other applications and shortcuts to the default icon style of Windows, to confuse users.
7. The computer suddenly freezes or restarts. Some computer virus programs have compatibility problems, and the code is not strictly tested, which may cause unexpected situations when they occur; or a computer virus has added a sentence in the Autoexec.bat file: Format c: statements such as this require a system restart. In order to implement the destruction.
8. Send e-mail automatically. Most e-mail computer viruses use the method of automatically sending e-mails as a means of transmission, and some e-mail computer viruses send a large number of useless letters to the same mail server at a specific time to achieve the normal service of blocking the mail server Features.
9. The mouse is moving by itself. There is no operation on the computer, nor any demonstration programs, screen savers, etc., and the mouse on the screen is moving, the application is running, and there is a phenomenon of being remotely controlled. In most cases, the computer system is controlled by a hacker program. In a broad sense, this is also a phenomenon of computer virus attacks. It should be pointed out that some are obvious phenomena of computer virus outbreaks, such as prompting irrelevant words, playing music, or displaying specific images. There are some phenomena that are difficult to determine directly as the performance of computer viruses. For example, when the hard disk light keeps flashing, when multiple applications with large memory consumption are running at the same time, such as 3D MAX, Adobe Premiere, etc., and the performance of the computer itself is relatively weak Next, when starting and switching applications, the hard drive will continue to work, and the hard drive light will continue to flash.
Most computer viruses are "malignant" computer viruses. "Malignant" computer viruses often bring great losses after the attack. The following are some of the consequences caused by the attack of the malignant computer viruses
1. The hard disk cannot be started, and the computer virus cannot damage the boot sector of the hard disk after data loss. The computer system cannot be started from the hard disk. Some computer viruses modify the key content of the hard disk (such as file allocation table, root directory area, etc.), so that the data originally saved on the hard disk is almost completely lost.
2. System files are lost or destroyed. Normally, system files will not be deleted or modified unless the computer operating system is upgraded. However, some computer viruses deleted the system files or destroyed the system files during the attack, making it impossible to start the computer system normally in the future. The system files Command.com, Emm386.exe, Win.com, Kernel.exe, which are usually vulnerable to attack, User.exe and so on.
3. Confusion in the file directory There are two situations in the directory. One is to actually destroy the directory structure, use the directory sector as an ordinary sector, fill in some meaningless data, and it can never be recovered. In another case, the real directory area is transferred to other sectors of the hard disk. As long as the computer virus exists in the memory, it can read the correct directory sector and provide the correct when the application needs to access the directory The directory entry makes it seem like it is normal. But once there is no computer virus in the memory, the usual directory access method will not be able to access the original directory sector. This damage can still be recovered.
4. Some documents are lost or destroyed. Similar to the loss or destruction of system files, some computer viruses will delete or destroy documents on the hard disk when they occur, causing data loss.
5. Some documents automatically add passwords. Some computer viruses use encryption algorithms to save the encryption key in the body of the computer virus program or other hidden places, and the infected files are encrypted. If this computer virus resides in the memory, Then when the system accesses the infected file, it automatically decrypts the document, making it imperceptible to the user. Once this computer virus is cleared, it is difficult to recover encrypted files.
6. Modify the Autoexec.bat file and add Format C: an item to cause the hard disk to be formatted when the computer restarts. After the computer system works stably, users rarely notice the changes in the Autoexec.bat file, but this file will be automatically run every time the system is restarted. Computer viruses modify this file to destroy the system.
7. The BIOS programs of some motherboards that can be upgraded with software are confusing and the motherboard is destroyed. Similar to the phenomenon after the outbreak of the CIH computer virus, the BIOS on the system motherboard was overwritten and destroyed by the computer virus, which made the system motherboard unable to work properly, thereby making the computer system obsolete.
8. The network is paralyzed and unable to provide normal services. From the above, we can understand that anti-virus computer virus software must be real-time. When the computer virus enters the system, it must be immediately reported to the police and cleared, so as to ensure the safety of the system. It's too late.