Comparison of nine popular anti-virus software (Figure) – Office supplies indust
"Three technology, seven management" is a maxim of network security field, the intention is: 30% of network security systems rely on computer equipment and technical support for information security, while 70% rely on user awareness of safety management and management model updates. Specific to the online version of antivirus software, the third by anti-virus technology, seven by the network for centralized management. Perhaps this statement may not be accurate, but it can stress the network to centralized management to emphasize the importance of network anti-virus system.
, In principle, computer viruses and antivirus software is "spear" with the "shield" of the relationship between the anti-virus technology is accompanied by a computer virus in the form of continuously updated and updated. That is, the emergence of online version of antivirus software is accompanied by the emergence of network virus appears. Therefore, "China Computer Newspaper," Joint China Software Testing Center on the current market, nine popular online version of antivirus software to the test.
Award assessment New features of Internet viruses under
The date of the virus from there give IT industry a huge damage, with the continuous development of IT technology and network technology updates, virus infection, epidemic, deceptive, harmful, latent and refractory and other aspects are also growing. Internet environment for computer viruses, we believe that the development of the following main features:
Communication network now network applications (such as email, file downloads, web browsing) to spread a computer virus has become the main way. Recent wide spread of the virus, such as "Love Bug", "Code Red", "Nimda", without exception, have chosen the network as the main route of transmission.
Use of the operating system and application vulnerabilities such viruses are the "Code Red" and "Nimda." Since IE browser flaw, making infected "Nimda" virus, not by hand to open the mail in the case of attachment can activate the virus, but had even been a lot of anti-virus experts believe that e-mail with virus attachments if not open the attachment, the virus will not harm. "Code Red" is the use of Microsoft's IIS server software vulnerabilities to spread.
Variety of transmission modes such as "Nimda" virus, the availability of communication channels, including documents, e-mail, Web servers, network shares and so on.
Virus production technologies and new and traditional virus is different is that many new viruses is the use of current programming languages and programming the latest technology, and easily modified to produce new varieties, and avoid anti-virus software searches. In addition, the new virus using Java, ActiveX, VBScript techniques, can be hidden in the HTML page, the trigger in the surf. "Kakworm" virus, although as early as last January was found, but its prevalence has been high, due to its use of ActiveX controls that defects in transmission, with IE5 or Office2000 computer may be infected. The emergence of the virus had infected mail attachments without opening a direct message to delete anti-virus method fails completely. More worrying is that once the virus has been given the other characteristics of malicious computer viruses, it is likely to harm than any existing computer viruses.
Lure of computer viruses is now full use of people's curiosity. For example, once rampant temporary "Naked Wife" virus, its subject is English, the "Naked Wife", the message body as "my wife has never been so", e-mail attachment in carrying a "naked wife" executable file, users to perform the file, the virus is activated. Another example is the "Anna Kournikova" virus epidemic is the use of "Tennis beauty" Anna Kournikova's looks.
HIV virus in various forms, through the analysis shows that although the continuous generation of new virus, virus attack, but earlier is still very common, to the cartoon picture, ICQ and other aspects of development. In addition, the new virus more adept at disguise, such as the theme of change in the transmission of many viruses disguised as common procedure, or within the virus code is written to the file length without change, to paralysis of computer users. Home virus attachment is not a HTML document, but a malicious VB script, if executed, will be the user's address book to all e-mail address to send infected e-mail copy.
Against diverse viruses that primarily attack the traditional single, and "Code Red" and "Nimda" will cause network congestion or even paralyzed, direct harm to the network system; other hazards from the virus in the victim opened the back door , for some sectors, opened the back door the harm, such as leaks and so on, which may exceed the harm caused by the virus itself.
It is due to computer viruses, these features led to the emergence of a new generation of network anti-virus software, is the so-called lanceolate necessarily shield benefit.
I am an expert from carwash.cn, while we provides the quality product, such as tram wash systems , china car wash wax, car wash,and more.