什么是计算机病毒?

A computer virus is a special computer program that tries to replicate itself by modifying other computer programs and try to infect as much as it can. Computer viruses are unintended programs that generally run without user acceptance by hiding themselves.

计算机病毒是一种特殊的计算机程序,它试图通过修改其他计算机程序来复制自身,并尝试尽可能多地感染。 计算机病毒是意想不到的程序,通常会通过隐藏自身而在未经用户接受的情况下运行。

Computer viruses are created by hackers or Black Hat Hackers in order to gain admin control or use the target system resources in different ways to get gain. Viruses can be infected in different ways like social engineering, USB drives, downloading and running unknown apps from the internet, etc.

计算机病毒是由黑客或黑帽黑客创建的,目的是获得管理员控制权或以不同方式使用目标系统资源来获得收益。 病毒可以通过各种方式感染,例如社会工程学,USB驱动器,从互联网下载和运行未知应用程序等。

计算机病毒如何运行和起作用? (How Computer Virus Operate and Work?)

Computer viruses are created by the black hat hacker as a special program that is very different from regular programs or applications. But even they are specially created they try to imitate a regular application that can not be detected by the users and virus protection programs called antiviruses.

黑帽黑客将计算机病毒创建为特殊程序,与常规程序或应用程序完全不同。 但是,即使它们是特别创建的,它们也试图模仿用户无法检测到的常规应用程序以及称为防病毒程序的病毒保护程序。

A computer virus operates in two different styles. The first type of computer virus will try to replicate itself after infecting the target system. The second type of computer virus is more stealth where after infection it does not take action. It generally waits for some time or action to start.

计算机病毒以两种不同的方式运行。 第一种计算机病毒在感染目标系统后将尝试自我复制。 第二种计算机病毒是隐形的,在感染后它不起作用。 它通常等待一段时间或开始执行操作。

计算机病毒的历史 (History of The Computer Virus)

Even computer viruses created in the 1940s are not like today computer viruses. The first modern computer virus is named as Creeper and created on ARPANET in the early 1970s. It was a simple program that is self-replicated on TENEX operating system. Creeper virus also provided the message “I’m creeper, catch me if you can! “. The creeper virus is deleted with the Reeper program which is also called first old-style antivirus.

即使是1940年代制造的计算机病毒也不像今天的计算机病毒。 第一个现代计算机病毒被称为Creeper,并于1970年代初在ARPANET上创建。 这是一个简单的程序,可以在TENEX操作系统上进行自我复制。 爬行者病毒还提供了以下信息:“我是爬行者,请赶快抓住我! ”。 爬虫病毒通过Reeper程序删除,该程序也称为第一种老式防病毒软件。

The second popular computer virus is named as Elk Cloner which is written in 1981 by Richard Skrenta. This computer virus was infecting PC’s which has Apple DOS 3.3 operating systems and spread via floppy disk.

第二种流行的计算机病毒称为Elk Cloner ,该病毒由Richard Skrenta于1981年编写。 该计算机病毒正在感染具有Apple DOS 3.3操作系统并通过软盘传播的PC。

LEARN MORE  What Is White Hat Hacker?
了解更多什么是White Hat Hacker?

The term Computer Virus is first officially used by Fred Cohen in 1984 in an academic paper named Computer Viruses - Theory and Experiments.

Computer Virus ”一词于1984年由Fred Cohen在名为“ Computer Viruses - Theory and Experiments的学术论文中首次正式使用。

计算机病毒的类型 (Types of Computer Viruses)

There are different types of computer viruses with different methods, actions, behaviors, etc. These are used to categorized computer viruses into different types.

有不同类型的计算机病毒,它们具有不同的方法,操作,行为等。这些病毒可用于将计算机病毒分类为不同类型。

Boot Sector Virus mainly resides in the master boot record MBR of the computer system or operating system. This means they are loaded during OS start and this makes them very hard to detect and remove. They are generally spread through removable media, CDROM, USB Drive, Floppy Disk.

Boot Sector Virus主要驻留在计算机系统或操作系统的主引导记录MBR中。 这意味着它们是在操作系统启动期间加载的,这使得它们很难检测和删除。 它们通常通过可移动媒体,CDROM,USB驱动器,软盘传播。

Direct Action Virus is a computer virus type which is called a non-resident virus because it mainly runs on computer memory. This type of viruses generally store itself to the specific file types and starts itself after a computer reboot.

Direct Action Virus是一种计算机病毒类型,称为非居民病毒,因为它主要运行在计算机内存上。 这种类型的病毒通常会将其自身存储为特定的文件类型,并在计算机重新启动后自行启动。

Resident Virus is the opposite of the Direct Action Virus where it stores and hides into different paths. They are hard to find and remove.

Resident Virus与直接操作病毒相反,后者直接存储并隐藏在不同路径中。 他们很难找到和删除。

Multipart Virus is a virus that behaves in different ways like Boot Sector Virus, Direct Access Virus or Resident Virus.

Multipart Virus是一种行为不同的病毒,例如引导扇区病毒,直接访问病毒或常驻病毒。

Polymorphic Virus is like a biological virus that can change its structure and behavior. This type of computer virus is very different to detect and remove because of its multiple type views.

Polymorphic Virus就像一种生物病毒,可以改变其结构和行为。 由于具有多种类型的视图,因此这种类型的计算机病毒在检测和清除方面有很大的不同。

Overwrite Virus is a simple virus where it simply deletes or overwrites to the existing files. The destruction of this virus is very high because it will delete all data, files, and folders instantly without providing time to take against the action.

Overwrite Virus是一种简单的病毒,它仅删除或覆盖现有文件。 该病毒的销毁率很高,因为它将立即删除所有数据,文件和文件夹,而没有时间采取相应措施。

LEARN MORE  Yara - Identify and Classify Malware Samples
了解更多Yara-识别和分类恶意软件样本

Spacefiller Virus is also called as Cavity Virus where it will fill up empty disk spaces. This type of computer virus does not cause any damage to the system.

Spacefiller Virus也称为Cavity Virus ,它将填充空磁盘空间。 这种类型的计算机病毒不会对系统造成任何损坏。

Macro Virus is created with some scripting language to run on the target operating system. Macro Virus can also run on different applications like Word, Presentation and Excel tools.

Macro Virus是使用某种脚本语言创建的,可以在目标操作系统上运行。 Macro Virus也可以在Word,Presentation和Excel工具等不同应用程序上运行。

计算机病毒的感染方式 (Infection Ways of Computer Viruses)

Computer viruses can infect in different ways to other computers. Spreading way is also deciding the virus type and behavior.

计算机病毒可以通过其他方式感染其他计算机。 传播方式还决定了病毒的类型和行为。

Floppy Disk is the oldest way to spread and infect other computers. By today as the floppy disk is not used anymore this way is absolute.

Floppy Disk是传播和感染其他计算机的最古老的方法。 直到今天,由于不再使用软盘,这种方式才是绝对的。

Internet or Web Site is the most popular way to spread a virus via a specially crafted and social engineering web page.

Internet or Web Site是通过特制的社交工程网页传播病毒的最流行方法。

USB Drive is another popular computer virus infection way that was popular in the 2000s and early 2010s.

USB Drive是另一种流行的计算机病毒感染方式,在2000年代和2010年代初期很流行。

防范计算机病毒的步骤 (Protection Steps From Computer Viruses)

There is a lot of ways to protect computers from different types of viruses. Below we will list some of the most efficient and useful ways to prevent virus infection.

有很多方法可以保护计算机免受不同类型的病毒的侵害。 下面我们将列出一些预防病毒感染的最有效和有用的方法。

  • Using licensed applications and software and preventing cracks

    使用许可的应用程序和软件并防止出现裂缝
  • Downloading software from well-known sites

    从知名站点下载软件
  • Using antivirus software

    使用防病毒软件
  • Updating antivirus software regularly

    定期更新防病毒软件
  • Using Antivirus software for the Browser and Internet Surf protection

    使用防病毒软件进行浏览器和Internet Surf保护
  • Enabling different operating system protection mechanisms

    启用不同的操作系统保护机制
  • Not opening suspicious emails

    不打开可疑电子邮件
  • Not downloading and running email attachments we do not completely trust

    不下载并运行我们不完全信任的电子邮件附件

病毒感染的迹象(Signs Of Virus Infection)

  • Slower system performance

    较慢的系统性能
  • Unintended popup occurrences

    意外弹出事件
  • Randomly running programs

    随机运行的程序
  • Executable files in interesting and non-normal paths

    有趣和非正常路径中的可执行文件
  • New files and applications installed without user intention

    在没有用户意图的情况下安装了新文件和应用程序
  • Filling disk interestingly

    有趣地填充磁盘
  • Removing and Deleting files without user intention

    无需用户意图即可删除和删除文件
  • Opening a random and harmful web page automatically

    自动打开一个随机的有害网页
  • Can not print properly

    无法正确打印
  • Unusual errors and interruptions

    异常错误和打扰
LEARN MORE  How To Install and Use ClamAV Antivirus Software In Linux, Ubuntu, Debian, Mint, Kali, Fedora, CentOS, RHEL
了解更多如何在Linux,Ubuntu,Debian,Mint,Kali,Fedora,CentOS,RHEL中安装和使用ClamAV防病毒软件

删除计算机病毒(Removing Computer Viruses)

After detecting a computer virus we need to remove the computer virus without effecting or with less damage to the system. The most popular way is removing a computer virus is by using antivirus software. Antivirus software is capable of detecting and removing the antiviruses easily. But in some rare situations, the detection and removal can be tricky because of the computer virus complexity. In this case, formatting the system completely can be a more efficient way and restoring from the backups.

检测到计算机病毒后,我们需要在不影响系统或对系统造成较小损害的情况下删除计算机病毒。 最受欢迎的方法是使用防病毒软件删除计算机病毒。 防病毒软件能够轻松检测和删除防病毒软件。 但是在某些罕见的情况下,由于计算机病毒的复杂性,检测和清除可能很棘手。 在这种情况下,完全格式化系统可能是一种更有效的方法,并且可以从备份中还原。

病毒vs木马vs恶意软件 (Virus vs Trojan vs Malware)

With the advancement of the computer-related cyber attacks, the new attack types and threads are created and named. The virus is a very old thread where trojan and malware terms are a lot of newer terms used in cybersecurity. In this part, we will compare them for different aspects and show similarities and differences.

随着与计算机有关的网络攻击的发展,创建并命名了新的攻击类型和线程。 该病毒是一个非常古老的线程,其中木马和恶意软件术语是网络安全中使用的许多较新术语。 在这一部分中,我们将比较它们的不同方面,并显示出相似之处和不同之处。

Virus is actually a type of the malware where Malware the term is a generic term used to define different type of threads like Spyware , Worms , Trojans . So viruses and trojans are some types of malware.

Virus实际上是一种恶意软件,其中“恶意软件”一词​​是一个通用术语,用于定义不同类型的线程,如SpywareWormsTrojans 。 因此,病毒和木马是某些类型的恶意软件。

Trojan is similar to the viruses where it is more stealth and mainly created to steal personal and financial information without harm. Their main aim is being run without unnoticed for a long time by getting valuable information from the targets to the attackers. So a trojan will not show detectable signs or harm the target system which will make it visible.

Trojan类似于病毒,它们更具有隐身性,主要是为了窃取个人和财务信息而不会造成伤害。 他们的主要目的是通过从目标到攻击者获取有价值的信息来长时间运行,而不会引起人们的注意。 因此,特洛伊木马程序不会显示可检测到的迹象或损害目标系统,从而使其可见。

翻译自: https://www.poftut.com/what-is-a-computer-virus/

你可能感兴趣的:(python,java,操作系统,linux,jvm)