2010年8月7日星期六

Transmission of computer viruses

The first way: through the non-moving spread of computer hardware devices, these devices usually have a dedicated ASIC chips and computer hard drives.
The second way: to spread through removable storage devices such equipment, including floppy disk, tape, etc..
The third way: to spread through computer networks.
The fourth way: through point to point communication systems and wireless communication channels\

Infectious virus is the most basic characteristics of computer viruses, virus, infectious virus survival breeding conditions, if the virus does not spread channels, their destructive small, spreads narrow, difficult to cause pandemic.

Computer viruses must be "equipped" to be infected with a computer system, usually they are attached in a file.

Computer viruses spread primarily through the file copy, file transfer, file execution, manner, file copying and file transfer needs of transmission media, file execution is a necessary means of virus infection (Word, Excel and other macro virus Word, Excel calls indirectly implementation), so the file spread of the virus changes the media have a direct relationship.

According to the information reported, the computer virus appeared in the 70's, then as the computer has not yet widespread, the virus causing the damage and the impact on the public is not very big. In 1986 widespread virus in Pakistan think-tank, put the virus on the PC, the threat of real task in front of people. 1987 "Black," a large-scale epidemic in the countries around the world among IBM PC and compatible, causing considerable panic. The computer virus, like other computer viruses, the most basic features is that it's contagious. Through careful study of various computer mode of transmission, targeted to take effective measures against computer viruses will be able to take a favorable position in the struggle to better prevent virus attacks on computer systems.

Main mode of transmission of computer viruses are:

1. Floppy
Floppy disk as the most commonly used medium of exchange, the early computer applications in the spread of the virus played a huge role, because when the computer application is relatively simple, executable files and data file systems are small, many of the implementation of documents adopted by the floppy disk copy each other installation, so the virus can spread through the floppy disk file virus; In addition, the column in the floppy disk directory or boot the machine, the boot sector virus boot disk in the floppy disk with the cross-infection. Therefore, a computer virus, floppy disks have become the major parasitic "hotbed."

2. CD-ROM
CD-ROM because the capacity to store a large number of executable files, a large number of virus will hide in the CD, on a compact disc read-only, can not write, so the virus can not remove the disc. Profit making illegal copies of software production process, can not bear special responsibility for virus protection, there can never be truly reliable technical support possible to avoid the virus spread, transmission, prevalence and spread. At present, the proliferation of pirated CDs to the spread of the virus has brought great convenience.

3. Hard
As with the virus in the local hard disk or moved to other places for use, maintenance, etc., to clean infected floppy disk and then spread.

4.BBS
Electronic bulletin board (BBS) as the station is easy, less investment, so well loved by the public users. BBS is a computer enthusiast from the self-organized communication site, users can exchange files on the BBS (including free software, games, self process). As the BBS stations generally do not have strict security management, there was no restriction, which has had a number of virus writers spread the virus to provide a place. BBS stations between cities conducted through the central station transmission, spread wider area. With the popularity of BBS in China, to the spread of the virus were added to the new medium.

5. Network
Modern communications technology has made great progress in not remote distance, data, files, Dianziyoujian Keyifangbian to Wang Luo workstations in various cable between the Tong Guo, Guang Xian or Dianhua line Jinxingzhuansong, workstations, the distance can be placed side by side the Jisuan Ji Duan Zhi, can be up to thousands of kilometers, is the so-called "separated by Wandering us disappear," but also the spread of computer viruses provides a new "highway." Computer viruses can be attached to the normal file, the other end from the network when you get an infected program and your computer does not add any protective measures that run with it, open to the transmission of the virus. Modes of transmission of this virus is very popular in the computer network to connect countries is common, the domestic computer infected with "import" what the virus is no longer surprising things. Information in our international, we are international virus. With a large number of foreign virus into the domestic network.

With the Internet's popularity, to the spread of the virus has added a new way, and will become the first transmission. Internet pioneering the development of the virus can be devastating, even more rapid spread of the virus, anti-virus, even more arduous. Internet has brought two different kinds of security threats, a threat from the file to download, they are browsing or downloading files via FTP may exist in the virus. Another threat comes from e-mail. Most Internet e-mail system provides networks with transmission function of the message format document, therefore, documents or files being virus could flood through the gateway and mail server enterprise network. Network uses the simplicity and openness makes this threat more serious.

At present, Internet is the latest trend online virus: (1) criminals or the only good thing making anonymous personal web pages directly to download a large number of virus samples to facilitate the means of living. (2) As the virus sample to provide academic research institutions can also become tools of people with ulterior motives. (3) logged in as anonymous Internet possible the Zhuanmenguanyu virus writers have discussed academic nature of the electronic papers, journals, magazines and related Wangshang academic exchange activities, such virus-Association annual Hui, etc., may all be Guonei Wai anyone who wants to become a new virus creators learn from, theft, copying the target with the object. (4) a large number of scattered sites on the virus production tools, wizards, program, etc., so no programming experience and the foundation of the people to create new virus is possible. (5) New technologies, new virus makes almost all of the time unknowingly spread the virus unwittingly become a vehicle or a communicator.

Discussed above, the spread of computer viruses channels, with the various anti-virus technology and people's understanding of various characteristics of the virus, spread through various means of strict control from the virus would become less intrusive.

1 条评论:

  1. Great post computer viruses transmission. There are a lot more new viruses are entering into the cyber world. and We have to be more careful than before.

    回复删除