ShuDudu's Home was started in 2011, but the web data is lost, so now begin again, I would like to make some friends, I hope you like ShuDudu's home.
Current position: ShuDudu > Other >

How to distinguish hacking tools and virus

Wednesday on January 29th, 2020Other

The general format is: virus virus prefix virus name suffix.

Virus prefix refers to a type of virus, he is used to distinguish the virus of racial classification. The different types of the virus, its prefix is ??different. For example, our common prefix Trojan Trojan, worm prefix is ??Worm, and so there are others.

Virus name refers to the characteristics of a virus family, is used to distinguish and identify the virus family, such as the CIH virus, previously known family names are unified "CIH", there is so much noise Huan recent Sasser worm of the family name is "Sasser".

Virus suffix refers to the characteristics of a variant of the virus, is used to distinguish a specific variant of a family of viruses. Generally used in English to represent the 26 letters, such as the oscillation Worm.Sasser.b refers worm variant B, it is generally referred to as "Sasser variant B" or "Sasser variant B". If so many variants of the virus (also shows great vitality of the virus), you can use numbers and letters mixed representation variants identity.

In summary, a virus prefix for us to quickly determine what type of virus is the virus belongs to a very big help. By determining the type of virus, this virus can have a rough assessment (of course this requires the accumulation of knowledge of some common types of viruses, which are outside of the range). And by the virus name we can use to find information, etc. Learn more about the detailed characteristics of the virus. Virus suffix let us know now in your yard alone machine which variant of the virus.

Here comes some common virus prefix explanations (for our most used Windows operating system):

1, the viruses of the system prefix: Win32, PE, Win95, W32, W95 and so on. * .Exe and * .dll files are generally public properties of these viruses that can infect Windows operating system, and through the dissemination of these documents. Such as the CIH virus.

2, worm prefix is: Worm. The public properties of this virus is spread through the network or system vulnerabilities, a large proportion of worms have to send out infected e-mail, blocking the network features. Such as shock waves (blocking network), small Postman (send infected e-mail) and so on.

3, Trojan viruses, hackers, viruses prefix is: Trojan. Hackers, viruses prefix name generally Hack. Trojan virus is the public properties into the user's system over a network or system vulnerabilities and hide, and then disclose user information to the outside world. There is a hacker virus visual interface, the user can remotely control the computer. Trojans, hackers, viruses often occur in pairs, that Trojan horse virus is responsible for the user's computer intrusion, viruses and hackers will be controlled by the Trojan. Both types are now a growing tendency to integrate. Generally such as QQ Trojan horse tail message Trojan.QQ3344, there is more we could meet the Trojans for online games such as Trojan.LMir.PSW.60. Here add that the virus name or what there PSW generally like PWD indicates that the function of password-stealing virus (these letters are generally for the "password" in the acronym in English "password" of) Some hackers procedures such as: network dignity in (Hack.Nether.Client) and so on.

4, the script virus prefix is: public properties script virus is to use a scripting language, the spread of the virus through the pages, such as Code Red (.Redlof). Script viruses also have the following prefixes: VBS, JS (shows that is what kind of scripting), such as Happy Hour (VBS.Happytime), the fourteenth day (Js.Fortnight.c.s) and so on.

5, the macro virus is a virus of the script, because of its specificity, so here counted as a separate class. Macro viruses prefix is: Macro, the second prefix is: Word, Word97, Excel, Excel97 (and perhaps other) one of them. Those who were infected WORD97 WORD document and earlier as the second virus using Word97 prefix, the format is: Macro.Word97; who were infected later WORD97 version of the virus WORD document using Word as the second prefix, the format is: Macro.Word ; all previous versions only infects EXCEL97 and EXCEL documents of the virus using Excel97 as the second prefix, the format is: Macro.Excel97; who were infected later EXCEL documents EXCEL97 version of the virus using Excel as the second prefix, the format is: Macro. Excel, and so on. Public properties such viruses can infect OFFICE series of documents, and then spread through the OFFICE generic templates, such as: the famous Melissa (Macro.Melissa).

6, backdoor virus prefix is: Backdoor. Public properties such virus is spread through the network, open the back door to the system, to the user computer security risks. As many of my friends encountered 54 IRC backdoor Backdoor.IRCBot.

7, program viruses grown virus public characteristic is released from the body at one or several new viruses to the system directory, damage produced by the release of new viruses runtime. Such as: ice sower (Dropper.BingHe2.2C), MSN shooter (Dropper.Worm.Smibag) and the like.

8, the prefix destructive program virus is: Harm. Public properties of this virus is inherently attractive to ** user clicks the icon, when the user clicks this virus, the virus will cause damage directly to the user's computer. Such as: format the C drive (Harm.formatC.f), killer command (Harm.Command.Killer) and the like.

9, joke virus prefix is:. Joke also known virus hoaxes. Public properties of this virus is inherently attractive to ** user clicks the icon, when the user clicks this virus, the virus will make all kinds of damage to frighten the user, in fact, the virus does not make any damage to the user's computer. Such as: ghost (Joke.Girlghost) virus.

10, the bundling machine virus prefix: Binder Public properties of this virus is a virus of the program will use the specific binding of the virus and some applications, such as QQ, IE tied up, the surface is a normal file, when the user. when you run the bundled virus, it will run on the surface of these application, and then bundled together to run a virus hidden, thus causing harm to the user. Such as: bundling QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys) and the like. The above is more common virus prefix, sometimes we will see some other, but relatively rare, brief mention here:

11, DoS: will conduct DoS attacks against a host or server;

12, Exploit: automatically through overflow or other vulnerabilities to spread their own, or he himself is a tool used for overflow Hacking;

13, HackTool: hacking tools, perhaps itself does not destroy your machine, but can be used to advantage others to use your avatar to do damage to others.

Copyright Protection: ShuDudu from the original article, reproduced Please keep the link: https://www.shududu.com/other/How-to-distinguish-hacking-tools-and-virus.htm