You are here: hacking technology > the virus to be related > Content
Hot Articles
Recommend Articles
New Articles
08 year the first half of the year ten big virus machine dog Cheng Duwang
  Add date: 07/14/2008   Publishing date: 07/14/2008   Hits: 41
Total 2 pages, Current page:1, Jump to page:
 
on July 9, 2008, Jinshan issued officially "in 2008 In the first half of the year China Computer virus Epidemic situation And Internet Safe Report", and announced in 2008 in the first half of the year ten big virus, the machine dog, the disk driver, the FLASH crack virus qualifies. But because the machine dog virus its harm degree as well as the infection percentage surmounts other virus, becomes in 2008 which is worthy of the reputation the first half of the year “poisonously” king.
It is known that the Jinshan poisonous tyrant whole world counter-virus monitor center basis virus harm degree, the viral infection percentage as well as user's attention, calculates the composite index, obtains in 2008 finally in the first half of the year the most dangerous ten big viral/wooden horse. Places the first three virus respectively is the machine dog, the disk driver, the AV end matter. In ten big virus, the AV end matter, the OnlineGames series robber number wooden horse virus's infection percentage and the harm degree are high, but because the two represent a series of virus, but by no means sole virus, therefore the machine dog relies on 6.2% infection percentages, 5 levels of harms are listed as heads of the ten big viral.
The report showed that from 08 year the first half of the year ten big virus, in wooden horse's statistical data demonstrated that in ten big virus has six big virus for the downloading virus. But looked from the viral quantity, a downloading kind of virus occupies increases the virus, the wooden horse total in the first half of the year 20.3%, becomes a rate of rise quickest kind of virus.
The Jinshan poisonous tyrant counter-virus expert Li invincible army indicated that the downloading virus has become the wooden horse threat the source. Take “the poisonous king” the machine dog virus as an example, this virus's main harm is acts as Trojan Horse downloading, is similar with the AV end matter virus, the virus through the revision registry, lets the majority popular security softwares expire, then downloads each kind of robber number tool or the crack crazily, the computer brings the serious threat for the user.
The Li invincible army pointed out that the machine dog virus may through the special technical direct rewriting system file, the virus driver snatches before the system return to original state card driver load, this command many Internet bars or the school engine room manager has a headache. Penetrates the Internet bar return to original state software, the return to original state card, causes the Internet bar system to restart the return to original state not to be able in any event to restore to the primitive secure state. To the network management, the system return to original state card when the computer restarts, to disk file's revision auto-reduction before the protection condition is the low cost management. But after “machine dog” virus, even if the system returns to original state, also cannot the actuation file delete which reads in the machine dog.  

 
Other pages: : 1 * 2 * Next>>
Prev:Trojan-Downloader.Win32.Agent.feq analysis Next:Win32.Troj.OnlineGamesT.se.65536 virus analysis

Comment:

Category: Home > the virus to be related