Hi ,
Pls Send All Kinds Of Tips And Tricks Which Help All Of Us To Get Rid Of Viruses. I Heartily Welcome All To Share Your Knowledge And To Help Others In Subjects Like, How To Treat A Infected File Or System? How To Recover The Infected File? New Virus Alerts, Etc etc...
Subscribe to:
Post Comments (Atom)
3 comments:
What is a Computer Virus ?
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation.
A virus might corrupt or delete data on your computer, use your e-mail program to spread itself to other computers, or even erase everything on your hard disk.
Viruses are most easily spread by attachments in e-mail messages or instant messaging messages. That is why it is essential that you never open e-mail attachments unless you know who it's from and you are expecting it.
Viruses can be disguised as attachments of funny images, greeting cards, or audio and video files.
Viruses also spread through downloads on the Internet. They can be hidden in illicit software or other files or programs you might download.
To help avoid viruses, it's essential that you keep your computer current with the latest updates and antivirus tools, stay informed about recent threats, and that you follow a few basic rules when you surf the Internet, download files, and open attachments.
Once a virus is on your computer, its type or the method it used to get there is not as important as removing it and preventing further infection.
Computer viruses tend to grab our attention. On the one hand, viruses show us how vulnerable we are. A properly engineered virus can have an amazing effect on the worldwide Internet. On the other hand, they show how sophisticated and interconnected human beings have become.
For example, experts estimate that the Mydoom worm infected approximately a quarter-million computers in a single day in January 2004. Back in March 1999, the Melissa virus was so powerful that it forced Microsoft and a number of other very large companies to completely turn off their e-mail systems until the virus could be contained. The ILOVEYOU virus in 2000 had a similarly devastating effect. That's pretty impressive when you consider that the Melissa and ILOVEYOU viruses are incredibly simple.
In this article, we will discuss viruses -- both "traditional" viruses and the newer e-mail viruses -- so that you can learn how they work and also understand how to protect yourself. Viruses in general are on the wane, but occasionally a person finds a new way to create one, and that's when they make the news.
Computer viruses are called viruses because they share some of the traits of biological viruses. A computer virus passes from computer to computer like a biological virus passes from person to person.
There are similarities at a deeper level, as well. A biological virus is not a living thing. A virus is a fragment of DNA inside a protective jacket. Unlike a cell, a virus has no way to do anything or to reproduce by itself -- it is not alive. Instead, a biological virus must inject its DNA into a cell. The viral DNA then uses the cell's existing machinery to reproduce itself. In some cases, the cell fills with new viral particles until it bursts, releasing the virus. In other cases, the new virus particles bud off the cell one at a time, and the cell remains alive.
A computer virus shares some of these traits. A computer virus must piggyback on top of some other program or document in order to get executed. Once it is running, it is then able to infect other programs or documents. Obviously, the analogy between computer and biological viruses stretches things a bit, but there are enough similarities that the name sticks.
When you listen to the news, you hear about many different forms of electronic infection. The most common are:
* Viruses - A virus is a small piece of software that piggybacks on real programs. For example, a virus might attach itself to a program such as a spreadsheet program. Each time the spreadsheet program runs, the virus runs, too, and it has the chance to reproduce (by attaching to other programs) or wreak havoc.
* E-mail viruses - An e-mail virus moves around in e-mail messages, and usually replicates itself by automatically mailing itself to dozens of people in the victim's e-mail address book.
* Trojan horses - A Trojan horse is simply a computer program. The program claims to do one thing (it may claim to be a game) but instead does damage when you run it (it may erase your hard disk). Trojan horses have no way to replicate automatically.
* Worms - A worm is a small piece of software that uses computer networks and security holes to replicate itself. A copy of the worm scans the network for another machine that has a specific security hole. It copies itself to the new machine using the security hole, and then starts replicating from there, as well. We'll take a closer look at how a worm works in the next section.
Trojan horse Small Computer Virus(autorun virus)Read carefully
During the infected PC, when I double click on my drives, it will automatically open out a new Window. When I right click on the drive, it appeared in some double byte characters, instead of Open and Explore options. When I scanned using AVG, it shows the above Trojan horse has created as autorun.bat and autorun.vbs in my system drive and system windows file. And it is infected with "Trojan horse Small" 2.ZZ and 2.AA.
Virus
I scan the entire harddisk to look for autorun.bat and autorun.vbs and remove them manually. Then I use regedit to remove the following keys...
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}]
"BaseClass"="Drive"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell]
@="Open"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\AutoRun]
"Extended"=""
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\AutoRun\command]
@="C:\\"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\explore]
@="×ÊÔ´¹ÜÀíÆ÷(&X)"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\explore\Command]
@="WScript.exe .\\autorun.vbs"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\open]
@="´ò¿ª(&O)"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\open\Command]
@="WScript.exe .\\autorun.vbs"
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion
\Explorer\MountPoints2\{130377b4-0586-11db-bf8c-806d6172696f}
\Shell\open\Default]
@="1"
Post a Comment