Tuesday, September 14, 2010

In the first half of the 12 most dangerous "killer"


July 14, well-known information security company Rising company released "Mainland China reported outbreaks of computer viruses in the first half of 2003", the report shows the first half of the domestic computer virus disaster presents new features and development trend, "Red terminator "sequential ranking in 12 new and old viruses are currently the main threat to computer users.

The most extensive damage during the first half of 2003 the 12 viruses of the following:

1. Red terminator (Script.RedLof)
2. Love the back door (Worm.LovGate)
3.FUNLOVE (PE_FunLove)
4. Unknown email viruses
5. Nimda (Worm.Nimda)
6. Cover letter (Worm.Klez)
7.CIH (Win32.Cih)
8, WYX (Wyx)
9. Laura (Win32.Xorala)
10. Hard drive killer (Worm.OpaSoft)
11. Trash (Worm.Lentin)
12. Great Promise (Worm.SoBig)
(Note: related, viruses that file to "Rising virus database" search)

Report this epidemic is through the Rising global virus monitoring network (domestic part), the National Anti-Virus Service Network and Rising online antivirus and other departments submitted joint monitoring statistics. From this report, the first half of the domestic computer virus disaster presents the following six characteristics.

A new virus emerging, the extent damage growing

According to statistics, 82% of computer viruses disaster nearly two years by the emergence of new viruses and their variants and are therefore to remind users to buy anti-virus products must pay attention to the product of the new virus update capability, and in the course of in the anti-virus software must be time to upgrade. At the same time as the popularity of the network, the virus spread rapidly increase the speed and breadth, RISING "online antivirus" User feedback shows that average user experience first half of the amount of virus was 2.11.

Second, 12 major virus group caused more than 50% of virus disasters

"Red terminator" and the top 12 viruses and their variants is the most destructive virus, according to statistics of all disasters in the first half, nearly 53% from these "major killer" due. Be noted that most of these viruses showed "varying population" posture, which caused the disaster in the first half of this year, most of them are new variants of these viruses cause, even for the CIH and FUNLOVE this is an old virus, The new variety is endless, so should not these "old Killer" lightly.




[Next]

Third, the worm into the mainstream

Since 2002, through the mail system and network vulnerabilities to spread the worm virus began to become the new Pang, number far exceeds the mainstream of the system once the virus, and this year has been more development, not for not folding Button mainstream virus. Forbes.com said the virus in more than half a worm, its rapid development suggests that Le domestic network construction has accelerated, network security has not Jishi to keep up, network anti-virus will become a network management focus.

4, hybrid virus become a trend

From the first half of the developing trend of the virus, the virus showed characteristics of more and more mixed trend. This category are represented by the Nimda virus, the virus, it is a network vulnerability in the "worm" is an infected file "system the virus." "Great Promise" virus, a member of the family is all set, "worms", "hackers", the "backdoor" virus, and many other features in one, so their ability to greatly enhance the dissemination and destruction.

Fifth, the rapid development of e-mail virus

銆??鐢靛瓙閭欢鏃犵枒鏄洰鍓嶄簰鑱旂綉鏃朵唬鏈?富瑕佺殑淇℃伅娌熼?鏂瑰紡锛岃繖绉嶆柟寮忓鑷翠簡閭欢鐥呮瘨杩呴?澧為暱锛屼竴浜涜爼铏梾姣掋?鏈ㄩ┈鐥呮瘨銆佹伓鎰忕▼搴忕瓑鐥呮瘨绾风悍鍒╃敤璇ュ钩鍙拌繘琛屼紶鎾紝鐟炴槦鍙嶇梾姣掍笓瀹堕娴嬪苟蹇犲憡鐢ㄦ埛:閭欢浼犳挱鏄粖鍚庣梾姣掍紶鎾殑涓昏鏂瑰紡,涓嶈鎵撳紑闄岀敓鐨勯偖浠躲?缁欑郴缁熸墦琛ヤ竵鏄渶濂界殑闃茶寖鎺柦銆?br />
銆??鍏?鏈煡鐥呮瘨涓嶅蹇借

銆??鍦ㄤ笂姒滅殑鎵?湁鐥呮瘨涓紝鏈煡閭欢鐥呮瘨鍦ㄦ暟閲忎笂浠?.8%鐨勬瘮渚嬩綅灞呯鍥涳紝铏界劧鍏跺畠绉嶇被鐨勬湭鐭ョ梾姣掑鏈煡鑴氭湰鐥呮瘨銆佹湭鐭ョ郴缁熺梾姣掔瓑娌℃湁涓婃锛屼絾鐤儏涔熶笉瀹逛箰瑙傘?杩欒鏄庢湁鐩稿綋涓?儴鍒嗙敤鎴峰湪琚祦琛岀梾姣掑洶缁曠殑鍚屾椂杩樺湪蹇嶅彈鐫?湭鐭ョ梾姣掑甫鏉ョ殑鐑︽伡銆傚悓鏃讹紝杩欎篃涓烘湭鐭ョ梾姣掓煡鏉?妧鏈殑鐮旂┒鎻愪緵浜嗘洿澶х殑搴旂敤绌洪棿锛岀憺鏄熷叕鍙哥殑鏈煡琛屼负鍒ゆ柇鎶?湳宸茬粡鍙互寰堟湁鏁堝湴闃叉不鏈煡鐥呮瘨锛屼絾鍓嶆彁鏄敤鎴蜂竴瀹氳鎵撳紑閭欢鐩戞帶銆?鐟炴槦鍙嶇梾姣掑伐绋嬪笀璁や负,浠?003骞翠笂鍗婂勾鐥呮瘨鐤儏鎶ュ憡涓樉绀虹殑鎯呭喌鏉ョ湅锛岀敤鎴烽渶瑕佸仛鐨勪笉浠呬粎鏄畨瑁呭悎鏍肩殑鍙嶇梾姣掍骇鍝侊紝鏇撮噸瑕佺殑鏄鎻愰珮鑷韩鐨勯槻鑼冩剰璇嗐?杩欎綅宸ョ▼甯堢户缁В閲婇亾,瀵逛簬涓汉鐢ㄦ埛鍏跺疄鎿嶄綔骞朵笉澶嶆潅,棣栧厛鏄強鏃跺崌绾ф潃姣掕蒋浠?鍏舵鏄湪浣跨敤璁$畻鏈烘椂





相关链接:



How to quickly assess the adoption of CMMI



Background to REN Zhengfei



M4v



Picked INVENTORY And Barcoding



Easy Gallery And Cataloging Tools



Video Mpg



Call Center Strategy, Direction And Goals



Convert flv to 3gp



Source Editors comments



Three 3G Licenses Which Zhang's Most "money" Way?



swf to flv



When the embedded 3G experience



Flash5 ActionScript Advanced Programming Guide (6)



Evaluate Access Control



Assembly language of high-level language features



Carefully key in SECRET



Visual Studio08 now open to MSDN users



No comments:

Post a Comment