Problems with Win 7 can be fixed automatically

  


How do we refuse to invade our computers? There are ways.

After the kernel of the operating system is loaded into the memory, according to the design of the developer, it will constantly maintain the normal operation of its core and user applications. This process is equally delicate and fragile. In addition, because the program is written by "people", if the person writing the program"scramble" (whether intentional or unintentional), the application may cause the operating system kernel program to be destroyed and cause a crash.

Just what most people often forget is that there is a very important "component" in the computer, called "memory". When the user presses the power and executes the boot process, an important step of the program is to load the core of the operating system from the storage medium into the memory.

As for the virus?

The virus will want to have the following capabilities:

Stay in memory and disguise yourself as part of the operating system

In the process of disguise, it is best not to let anyone, any software find it

Try not to interfere with the operation of the original program, so as not to be aware of it

Attach yourself (virus) to someone else (other computer)

If necessary, do something useful (or fun) for the author, including stealing money, causing damage … …

Executable file learning

Well, if the virus wants to hide itself in memory, first of all it has to let you go & rdquo; execute & rdquo; it.

The question is, who will be stupid to execute the virus - if the virus's forehead says "I am a virus, come and do it, execute me", then you will touch it? Iron will not!

So, the writer of the virus will find ways to let the user unwittingly perform it in order to achieve the purpose of "infection".

So, & rdquo; executable file & rdquo;, has become the main target of most viruses & quoquo; parasitic rdquo;

The so-called executable file is what we call "program" & rdquo;, & rdquo; software & rdquo;, usually this kind of software is also composed of one (or several) files. As mentioned above, the software has to be loaded into the memory to be executed and used by the user. Therefore, the author of the software will use the development tool to compile the "original program" into a "executable file" and then ship it to The user allows the user to perform it.

Previously, executable files were only fixed in several formats: the extensions were .COM, .EXE, .BAT, which are executable files. In the era of Windows 7, this has not changed. However, Windows later introduced a number of executable file formats that are relatively rare. For example, .DLL is a dynamic link library, which is also an executable file that must be attached to the main program. SCR is a screen saver, it is also a special function. Execution file; .MSI (WindowsInstallerPackage) is usually found in the "installer", but … … it is also an executable file; some narrative files, such as .VBS, .JS … …, they are also executable files .

There is a list of extensions for the "executable files", and you should be careful when you see such extensions, and harmful things may be hidden in them.

Execution is the most dangerous thing

The problem is that Windows defaults to hide the extension of the file it recognizes, so, to be honest, you don't know what you are doing.

It doesn't matter, you just have to imagine: when you double-click the left mouse button on an icon - you must be doing something.

When you do something - you must remember: this is the "RedFlag" signal that users should pay attention to. If there is something you must be alert to, except for the "someone asks you password", this is another thing.

So, you must remember:

“Be careful when performing a trick. ”

It's that simple.

Because, many viruses will be attached to the executable file, and you will be poisoned as soon as it is executed. Not only that, but before the poisoned computers are cleaned, they will continue to infect the files in the computer, or send out virus letters, or infect other files on the server … … and these viruses will also modify the system settings, let Users & rdquo; even if it is found that the cleaning work has become difficult - sometimes almost impossible.

So, sometimes, a poisoned computer has to be reloaded, because all executable files are infected and cannot be recovered.

The Internet is more ” The Gate of Hell&#;>

But, I’m afraid there is something really hard to defend against - that is the web page!

When you use the browser Even with any web page, honestly …… the door to hell is open. Because web pages allow you to do a lot of things, perform a lot of functions -- and mostly auto and you don't know. The normal webpage will of course not be yours, or you will be poisoned …… However, the abnormal webpage is actually quite awkward!

In fact, you must know that the browser itself is a ” The executor & rdquo; itself is a tool designed to perform various functions & rdquo;. Not only that, the operating system still has the so-called "compatibility" problem, but the browser itself is designed to be so-called "cross-platform", preferably all browsers have the same ability to make the page Developers can write a feature -- it can be used by all users around the world -- gosh! Reality of the world is no different. However, this also allows web virus writers to have a chance … … Is there any way to make these virus writers more troublesome? Of course, write a cross-platform universal virus!

There are many forms of web-based viruses, and some will use the so-called "narration" (t) to constantly bounce annoying windows, some will secretly put the virus on your computer, and some will directly perform some damn action &hellip ;… And to be honest, this type of problem is more troublesome than executable file poisoning because the user simply can't know.

So, anti-virus software (or so-called InternetSecurity) is extremely important in this case.

How to prevent viruses from being executed

So, can you prevent the flow of viruses by the user's care? We systematically think about it, under each link, we What can be done, the bottom is some common "anti-blocking method" & rdquo; enumeration:

Each program must undergo some kind of certification

In order to prevent users from executing The dirty things are executed, so the operating system vendor stipulates that every program you execute must check it. Oh, do you think it's funny? No, the iPhone is like this - although it doesn't mean to be anti-virus, but the closed system is quite safe - because all software is approved.

Each program (as long as it is considered dangerous) requires the user to agree to execute

Windows Vista /Windows7 has a UAC underneath, as long as it is dangerous to judge your program I want you to "determine", this will make the virus "more difficult to infect you", but the average person has not been affected by it, may be angry to turn off this feature first. But to be fair, it is necessary to prevent poisoning. This is also a necessary evil.

Copyright © Windows knowledge All Rights Reserved