July 14, well-known information security company Rising company released "Mainland China reported outbreaks of computer viruses in the first half of 2003", the report shows the first half of the domestic computer virus disaster presents new features and development trend, "Red terminator "sequential ranking in 12 new and old viruses are currently the main threat to computer users.
The most extensive damage during the first half of 2003 the 12 viruses of the following:
1. Red terminator (Script.RedLof)
2. Love the back door (Worm.LovGate)
3.FUNLOVE (PE_FunLove)
4. Unknown email viruses
5. Nimda (Worm.Nimda)
6. Cover letter (Worm.Klez)
7.CIH (Win32.Cih)
8, WYX (Wyx)
9. Laura (Win32.Xorala)
10. Hard drive killer (Worm.OpaSoft)
11. Trash (Worm.Lentin)
12. Great Promise (Worm.SoBig)
(Note: related, viruses that file to "Rising virus database" search)
Report this epidemic is through the Rising global virus monitoring network (domestic part), the National Anti-Virus Service Network and Rising online antivirus and other departments submitted joint monitoring statistics. From this report, the first half of the domestic computer virus disaster presents the following six characteristics.
A new virus emerging, the extent damage growing
According to statistics, 82% of computer viruses disaster nearly two years by the emergence of new viruses and their variants and are therefore to remind users to buy anti-virus products must pay attention to the product of the new virus update capability, and in the course of in the anti-virus software must be time to upgrade. At the same time as the popularity of the network, the virus spread rapidly increase the speed and breadth, RISING "online antivirus" User feedback shows that average user experience first half of the amount of virus was 2.11.
Second, 12 major virus group caused more than 50% of virus disasters
"Red terminator" and the top 12 viruses and their variants is the most destructive virus, according to statistics of all disasters in the first half, nearly 53% from these "major killer" due. Be noted that most of these viruses showed "varying population" posture, which caused the disaster in the first half of this year, most of them are new variants of these viruses cause, even for the CIH and FUNLOVE this is an old virus, The new variety is endless, so should not these "old Killer" lightly.
[Next]
Third, the worm into the mainstream
Since 2002, through the mail system and network vulnerabilities to spread the worm virus began to become the new Pang, number far exceeds the mainstream of the system once the virus, and this year has been more development, not for not folding Button mainstream virus. Forbes.com said the virus in more than half a worm, its rapid development suggests that Le domestic network construction has accelerated, network security has not Jishi to keep up, network anti-virus will become a network management focus.
4, hybrid virus become a trend
From the first half of the developing trend of the virus, the virus showed characteristics of more and more mixed trend. This category are represented by the Nimda virus, the virus, it is a network vulnerability in the "worm" is an infected file "system the virus." "Great Promise" virus, a member of the family is all set, "worms", "hackers", the "backdoor" virus, and many other features in one, so their ability to greatly enhance the dissemination and destruction.
Fifth, the rapid development of e-mail virus
銆??鐢靛瓙閭欢鏃犵枒鏄洰鍓嶄簰鑱旂綉鏃朵唬鏈?富瑕佺殑淇℃伅娌熼?鏂瑰紡锛岃繖绉嶆柟寮忓鑷翠簡閭欢鐥呮瘨杩呴?澧為暱锛屼竴浜涜爼铏梾姣掋?鏈ㄩ┈鐥呮瘨銆佹伓鎰忕▼搴忕瓑鐥呮瘨绾风悍鍒╃敤璇ュ钩鍙拌繘琛屼紶鎾紝鐟炴槦鍙嶇梾姣掍笓瀹堕娴嬪苟蹇犲憡鐢ㄦ埛:閭欢浼犳挱鏄粖鍚庣梾姣掍紶鎾殑涓昏鏂瑰紡,涓嶈鎵撳紑闄岀敓鐨勯偖浠躲?缁欑郴缁熸墦琛ヤ竵鏄渶濂界殑闃茶寖鎺柦銆?br />
銆??鍏?鏈煡鐥呮瘨涓嶅蹇借
銆??鍦ㄤ笂姒滅殑鎵?湁鐥呮瘨涓紝鏈煡閭欢鐥呮瘨鍦ㄦ暟閲忎笂浠?.8%鐨勬瘮渚嬩綅灞呯鍥涳紝铏界劧鍏跺畠绉嶇被鐨勬湭鐭ョ梾姣掑鏈煡鑴氭湰鐥呮瘨銆佹湭鐭ョ郴缁熺梾姣掔瓑娌℃湁涓婃锛屼絾鐤儏涔熶笉瀹逛箰瑙傘?杩欒鏄庢湁鐩稿綋涓?儴鍒嗙敤鎴峰湪琚祦琛岀梾姣掑洶缁曠殑鍚屾椂杩樺湪蹇嶅彈鐫?湭鐭ョ梾姣掑甫鏉ョ殑鐑︽伡銆傚悓鏃讹紝杩欎篃涓烘湭鐭ョ梾姣掓煡鏉?妧鏈殑鐮旂┒鎻愪緵浜嗘洿澶х殑搴旂敤绌洪棿锛岀憺鏄熷叕鍙哥殑鏈煡琛屼负鍒ゆ柇鎶?湳宸茬粡鍙互寰堟湁鏁堝湴闃叉不鏈煡鐥呮瘨锛屼絾鍓嶆彁鏄敤鎴蜂竴瀹氳鎵撳紑閭欢鐩戞帶銆?鐟炴槦鍙嶇梾姣掑伐绋嬪笀璁や负,浠?003骞翠笂鍗婂勾鐥呮瘨鐤儏鎶ュ憡涓樉绀虹殑鎯呭喌鏉ョ湅锛岀敤鎴烽渶瑕佸仛鐨勪笉浠呬粎鏄畨瑁呭悎鏍肩殑鍙嶇梾姣掍骇鍝侊紝鏇撮噸瑕佺殑鏄鎻愰珮鑷韩鐨勯槻鑼冩剰璇嗐?杩欎綅宸ョ▼甯堢户缁В閲婇亾,瀵逛簬涓汉鐢ㄦ埛鍏跺疄鎿嶄綔骞朵笉澶嶆潅,棣栧厛鏄強鏃跺崌绾ф潃姣掕蒋浠?鍏舵鏄湪浣跨敤璁$畻鏈烘椂
相关链接:
How to quickly assess the adoption of CMMI
Background to REN Zhengfei
M4v
Picked INVENTORY And Barcoding
Easy Gallery And Cataloging Tools
Video Mpg
Call Center Strategy, Direction And Goals
Convert flv to 3gp
Source Editors comments
Three 3G Licenses Which Zhang's Most "money" Way?
swf to flv
When the embedded 3G experience
Flash5 ActionScript Advanced Programming Guide (6)
Evaluate Access Control
Assembly language of high-level language features
Carefully key in SECRET
Visual Studio08 now open to MSDN users
No comments:
Post a Comment