To kill viruses by naming computer viruses
Twenty-five years ago, a high school student in Pittsburgh wrote a prank program that spread through a floppy disk in the operating system of the Mac and showed a crooked poem. This virus named "Elk Cloner" is regarded as the first virus in the computer field.
Viruses have gradually evolved from a joke to the number one killer that harms computers. Nowadays, computer viruses are increasing in both types and destructiveness. Some tricky viruses are difficult for even virus experts to solve immediately, let alone our ordinary users.
Although the capabilities of the current anti-virus software have been greatly improved, it is still in a passive stage. Only after the virus appears can it be checked and killed. However, many viruses now have self-protection functions and can not open anti-virus software or prevent anti-virus software from opening. So often I found a virus but couldn't kill it with anti-virus software. Faced with this problem, many people will choose to kill the tool or manually kill the virus. But to use this method of antivirus, you must first understand what kind of virus you are? Only by knowing this can we find the corresponding special killing tool.
In the face of countless viruses, how can we all know it? In fact, it is very simple. Viruses also have their own naming rules. After understanding these rules, you can easily face these viruses and find special killing tools to completely remove the viruses.
Let's take a look at the naming rules of the virus:
The general format of the virus: <virus prefix>. <Virus name>. <Virus suffix>.
The virus prefix refers to the type of a virus, which is used to distinguish the ethnic classification of the virus. Different types of viruses have different prefixes. For example, our common Trojan virus prefix Trojan, the worm virus prefix is ​​Worm, etc. There are other.
The virus name refers to the family characteristics of a virus, which is used to distinguish and identify the virus family. For example, the family names of the previously famous CIH viruses are all unified "CIH", as well as the recently oscillating wave worm. The family name is "Sasser".
Virus suffix refers to the characteristics of a virus variant and is used to distinguish a certain variant of a specific family of viruses. It is generally represented by 26 letters in English. For example, Worm.Sasser.b refers to the variant B of the oscillating wave worm virus, so it is generally called "oscillating wave B variant" or "oscillating wave variant B". If there are many variants of the virus (which also shows that the virus is tenacious ^ _ ^), you can use a combination of numbers and letters to indicate the variant identification.
In summary, the prefix of a virus is very helpful for us to quickly determine which type of virus the virus belongs to. By judging the type of virus, you can make a rough assessment of this virus (of course, this requires the accumulation of some knowledge about common virus types, which is beyond the scope of this article). Through the virus name, we can use the method of searching information to further understand the detailed characteristics of the virus. The virus suffix lets us know which variant of the virus is now in your machine.
The following is an explanation of some common virus prefixes (for the Windows operating system we use most):
1. System virus System virus prefixes are: Win32, PE, Win95, W32, W95, etc. The general public characteristic of these viruses is that they can infect the * .exe and * .dll files of the windows operating system and spread through these files. Such as CIH virus.
2. The prefix of the worm is: Worm. The common feature of this virus is to spread through the network or system vulnerabilities. Most worms have the characteristics of sending out poisonous emails and blocking the network. Such as shockwave (blocking the network), small postman (sending poisonous mail), etc.
3. The prefix of Trojan virus and hacker virus is Trojan, and the prefix name of hacker virus is generally Hack. The common feature of Trojan virus is to enter the user's system and hide it through the network or system vulnerabilities, and then disclose the user's information to the outside world. The hacker virus has a visual interface that can remotely control the user's computer. Trojan horses and hacker viruses often appear in pairs, that is, the trojan horse is responsible for invading the user's computer, and the hacker virus will be controlled by the trojan horse virus. These two types are now more and more integrated. General Trojans such as the QQ message tail Trojan Trojan.QQ3344, and you may encounter more Trojan horse viruses for online games such as Trojan.LMir.PSW.60. Here to add, the virus name includes PSW or what PWD and the like Generally speaking, this virus has the function of stealing passwords (these letters are generally the abbreviation of "password" in English) Some hacking programs such as: Network Owner (Hack.Nether.Client) and so on.
4. Script virus The prefix of script virus is: Script. The common feature of script virus is that it is written in scripting language and spread through web pages, such as red code (Script.Redlof)-it is not our boss code brother ^ _ ^. Script viruses will also have the following prefixes: VBS, JS (indicating what kind of script was written), such as Happy Hour (VBS.HappyTIme), 14th (Js.Fortnight.cs), etc.
What is 2.4g wireless module?
2.4g line module operating frequency in the range of 24400-2484mhz, can communicate through the scanning protocol, air rate up to 1Mbps, output power up to +4dBm, the module has the advantages of low power consumption, cost-effective. Movingcomm's current 2.4g antenna modules are: IOT04, IOT05, IOT09, IOT18, IOT60, etc. Users can choose a variety of modules with a transmission distance of 50-500 meters according to cost considerations.
Second, the role of 2.4g wireless module
Function 1, for the formation of a star topology wireless communication network, and must be a multi-point star topology, some extraordinary places need wireless communication. On the one hand, the transmitting and receiving module is cheap, and the cost of forming the star topology is relatively low. On the other hand, the transmitting and receiving module can adopt the modular design, which is small in size, easy to use and easy to integrate. For the wireless network with low communication speed and close distance, the transmitting and receiving module is very practical.
Function 2, for wireless multi-channel (parallel) control. Such as complex remote-controlled robots, some places require multi-channel (parallel) control. One method is to use the receiving module to directly connect to the decoder, and then connect to the relays and other electronic components to drive the subsequent controlled object; the other method is to use the receiving module to connect to the single chip microcomputer, and after the data is disposed of, the single chip microcomputer is connected to the relays and other electronic components to drive the subsequent controlled object. Usually a pair of transmitting and receiving modules can achieve up to six parallel wireless control, if the required number of channels is greater than six, you can use multiple pairs of transmitting and receiving modules, and work at the same time to meet the actual needs.
Function 3, used for general serial port, RS232 antenna data transmission, there are usually many control instruments and equipment using serial port, and communication with these devices must meet the requirements of serial port. In some extraordinary places, when the industrial control site must use the antenna transmission mode, it is natural to choose the transmitting and receiving modules mentioned in this article, but it must be explained here that to use this communication mode, the corresponding software must be prepared at the transmitting end and the receiving end respectively to achieve the conversion of file formats, in order to achieve the purpose of wireless communication, if the communication system is full-duplex. It can be achieved by using two pairs of transmitting and receiving modules, working simultaneously.
Third, 2.4g wireless module application field
2.4G wireless module is widely used in wireless health sports products, wireless mouse and keyboard, product information push, wireless remote sensing, wireless ranging system, alarm security system, smart home, toy control, tire pressure monitoring and other fields. With the 2.4G wireless module, all the whole house wireless smart home can be linked together, you can control all the smart home devices through the link of the network, and then you can control the switch of all the whole house wireless home, adjust the brightness of the lamp, adjust the rise and fall of the curtain, etc., through the continuous innovation of technology, The whole house wireless smart home can be controlled by a small white robot voice, can be controlled by a smart scene panel, can be controlled by sensors and so on.
Four, 2.4g wireless module how to choose antenna
In general, the 2.4g wireless module requires an impedance of 50 ohms, a red wire used with 2.4g, a 2.4g folded rod antenna, a 2.4g gold-plated straight head rod antenna, a 2.4g gold-plated elbow rod antenna, and a 2.4g small suction cup antenna. These antennas are special antennas designed for 2.4g wireless communication system, antenna standing wave ratio performance is good, small size, clever structure, easy installation, stable performance, with good anti-vibration and aging ability.
2.4G Router Module,M2 Wifi Module,2.4 Ghz Wifi Module,Mini Wifi Module
Shenzhen MovingComm Technology Co., Ltd. , https://www.szmovingcomm.com