Harm of bitcoin virus poisoning
Yesterday, I went to the electronic reading room. Not long after I plugged in the USB flash drive, the teacher suddenly asked everyone to unplug the USB flash drive. Some students found that all the files in the USB flash drive could not be opened, and there were two more documents asking for money
so everyone rushed to check, as long as the U disk inserted in the school computer were poisoned, large-scale computer poisoning occurred in the evening
a lot of people's information and graation thesis are in the computer. I really feel that hacker's behavior is disgusting. For the sake of money, regardless of the future of students, teachers' lifelong scientific research achievements...
hope to catch criminals as soon as possible and give them severe punishment by law
this virus will scan windows devices with open 445 file sharing port. As long as the user's device is on the Internet, hackers can implant blackmail software, remote control Trojan horse, virtual currency mining machine and other malicious programs in computers and servers
some security researchers point out that this large-scale network attack seems to be deployed through a worm application, and wannacry can spread among computers. What's more terrible is that unlike most malicious programs, this program can replicate and spread on its own in the network, and most of the current viruses still need to rely on the successful users to spread by cheating them to click the attachment with the attack code
the attack has affected 99 countries and as many as 75000 computers, but because the virus uses anonymous network and bitcoin anonymous transaction to obtain ransom, it is very difficult to track and locate the originator of the virus
The virus in the "bitcoin virus" incident is known as "ransomware". By encrypting the files in the victim's computer, you can't open them completely to ask for ransom. This is a virus attack launched by lawless elements by using "eternal blue" leaked from NSA hacker's weapon library. It does not need any operation of users. As long as it is turned on and connected to the Internet, lawless elements can implant blackmail software into computers and servers
What's more terrible is that this is just the beginning. Now this blackmail virus has spread to all over the world, including many colleges and universities in China. You can see many students on the Internet showing pictures of their computers being attacked. I have to say that hackers are really well intentioned, even in simplified Chinese
(1) data backup and recovery measures are the important work to recover the loss in the event of blackmail, so it is necessary to make remote backup of important file data in time to prevent losses caused by virus infection
(2) make sure the firewall is on
(3) don't open unknown email or link easily.
Tencent computer housekeeper adopts the technology of checking and killing Tencent cloud, which can forcibly check and kill the latest Trojan horse programs, keep the computer away from the threat of viruses, and protect your computer in real time. It can also protect the Internet pages, system files, USB flash drives, browsers, etc. some viruses even tamper with computer files, All of them can protect your computer from being threatened and give you a clean Internet environment.
specific steps:
1. General search and kill, open Tencent computer manager - virus search and kill
2. Search and kill in safe mode, restart the computer, press F8, the screen displays WinXP system startup menu, press the key to move to "safe mode with command prompt", enter; Find the anti-virus software inside the computer to kill the virus.
Once the computer is infected with this bitcoin blackmail virus, all the file data on the computer will be forcibly encrypted. If it is not delivered in the form of bitcoin to the virus maker & lt; Ransom;, Then these files can't be decrypted and retrieved. Even if the ransom is paid this time, they may be decrypted next time; Patronize & quot& mdash;& mdash; That is to say, this virus is very important to & lt; Pay attention to data & quot; It's hard to estimate the harm that can be caused by the users, especially the enterprise users
How to avoid the harm of bitcoin blackmail virus< p> As soon as bitcoin blackmail virus came into being, it immediately caused an uproar around the world. Major network security organizations and well-known anti-virus software began to pay attention to this problemthere is a lot about & lt; Manually set the firewall to close the sensitive port of the computer, so as to resist the bitcoin blackmail virus; But this kind of method is more suitable for those who know computer better; Non white people;, For example, for a third rate programmer like me, this method is more suitable for me. I can't even use antivirus software
but for the general public, it may be necessary to deal with it in a simpler way
it has been several years since the advent of bitcoin extortion virus. In order to help users' computers fight against bitcoin extortion virus attacks, many anti-virus software have certain defense mechanisms. For example, 360 launched a & lt; Anti blackmail service;, If your data is encrypted by bitcoin extortion virus when 360 is installed on your computer, 360 will compensate for your ransom and recover your data
users who don't know how to use computers can choose to install anti-virus software to defend you against such viruses, but it depends on their hobbies to choose which one
restart the computer, press F8 to enter the safe mode - Open Tencent computer manager - anti-virus - full scan - stubborn Trojan blocker - in-depth scan - complete the restart of the computer.
Tencent computer manager is the first professional anti-virus software in China to adopt "4 + 1" core anti-virus engine,
with Tencent's self-developed second-generation anti-virus engine "eagle eye",
it takes less resources, and can eradicate stubborn viruses based on CPU virtual execution technology,
greatly improve the ability of in-depth investigation and killing.
Because of the lack of inscriptions and diamonds, the hero who wants to buy can't buy it. The match is naturally lower than the opponent. Inscriptions are very important in the game. A set of good inscriptions at full level can give your hero a qualitative leap< diamonds are also a common currency in the game. They can be used to buy heroes, lucky draw, and inscriptions. Generally, they are used as much as you can save. Next, I'll introce some places where you can get inscriptions and diamonds hidden in the glory of kings
1. Hero proficiency inscription rewardmany cute new players don't know, open the community in the game & mdash& mdash; My & mdash& mdash; Game data & mdash& mdash; Hero pool: you can find that there are two boxes under each hero. One is when the hero's proficiency reaches green, and the other is when the hero's proficiency reaches blue. You can get 50 and 200 inscriptions respectively. You can get each one three times a day. If you have never received it before, you should be able to collect a lot of fragments, and you can save all the fragments needed to buy a fifth level inscription in two days{ RRRRR}
