Network security from entry to the jail, upgrade Daguai Collection (6) Trojan / virus

Disclaimer: This article is a blogger original article, follow the CC 4.0 BY-SA copyright agreement, reproduced, please attach the original source link and this statement.
This link: https://blog.csdn.net/qq_30787727/article/details/100056084

Seven, RAID, Redundant Disk Array

RAID0, banding pattern (striped)> = 2 Disk

RAID1, mirror mode (mirrored)> = 2 Disk

RAID10, strip mirror mode +> = 4 disks

RAID5, balanced mode (one parity disk)> = 3 Disk

RAID6, balanced mode (two parity disk)> = 4 disks

 

 

Virus and Trojan Protection

First, the Trojans

1, the computer Trojan

A legitimate program included in the illegal program

3, Trojan horse Hazard

File Operations

Modify the registry

Steal passwords

Keyloggers

System Operation

4, common Trojan

Glacial

GDUFS ghost

Great white shark

Gray pigeons

 

First, computer viruses and biological viruses similarities and differences

The same point: parasitic, infectious and destructive

Differences: artificially prepared

Second, the characteristics of computer viruses

Unauthorized execution of

Invisibility

Infectiousness

Latent

Destructive

Can be triggered 

Third, computer viruses - classification

File type

Boot sector type

Macro viruses

VBS script virus

worm

Fourth, network computers against viruses

Strong destructive

Spread and strong

Wide diffusion

Spread fast

It is difficult to eradicate

  • Script virus

1, the script virus using .asp, .htm, .html, .vbs, .js types of files spread-based VB Script and Java Script scripting language

2, the script virus characteristics

Hidden

Spread wide

Multi-variant virus

Broilers (host) check result of the communication

netstat -nao

Guess you like

Origin blog.csdn.net/qq_30787727/article/details/100056084