Your computer contains various signs of viruses and malware programs


















Artikelinhalt Artikeleigenschaften Diesen Artikel bewerten. Virusinfektion geleistet werden? Was ist der Unterschied zwischen Malware und Viren? Hinweis: Verwenden Sie Windows 11, Windows 10?

Anstatt die Bildschirme im abgesicherten Modus zu sehen, gibt der Computer eine Eingabeaufforderung aus, in der nach dem Windows Produktcode gefragt wird? Beheben von Problemen mit schwarzem Bildschirm.

Sie verwenden diese Tools auf eigenes Risiko. Alle anzeigen Alle ausblenden. Andrew Lambert. Dienstprogramm Link Verbindung Hosts-Perm.

For more information about how to remove a computer virus and spyware, see the following article in the Microsoft Knowledge Base: - Microsoft resources and guidance for removal of malware and viruses.

Note A computer virus may prevent you from accessing the Microsoft Update website to install the latest updates. We recommend that you set the Automatic Updates service to run automatically so that a computer is not missing any important updates.

Microsoft offers a free online tool that scans and helps remove potential threats from your computer. To perform the scan, go to the Microsoft Safety Scanner website. Note the name of the rogue security software. For this example, we'll call it XP Security Agent When you are prompted, use the arrow keys to highlight Safe Mode with Networking , and then press Enter.

Click the Start button and check whether the rogue security software appears on the Start menu. If it's not listed there, click All Programs and scroll to find the rogue security software's name.

Right-click the name of the rogue security software program, and then click Properties. In the Properties dialog box, check the path of the rogue security software program that is listed in Target. Note The folder name frequently is a random number. In the Program Files window, click Program Files in the address bar. Scroll until you find the rogue security software program folder. For example, XP Security Agent Go to the Microsoft Safety Scanner website. If you suspect that your computer is infected with rogue security software that was not detected by using Microsoft security solutions, you can submit samples by using the Microsoft Malware Protection Center submission form.

Microsoft Defender Offline is an anti-malware tool that helps remove difficult to eliminate viruses that start before Windows starts. Starting with Windows 10, Microsoft Defender Offline is built-in. Click Download the 32 bit version or Download the 64 bit version , depending on which operating system that you are running.

If you're unsure of which operating system that you are running, see Is my PC running the bit or bit version of Windows. When you are prompted, press a key to select an option to use to start your computer, such as F12, F5, or F8, depending on the kind of computer that you are using. Use the arrow key to scroll to the drive where you installed Microsoft Defender Offline file. Microsoft Defender Offline starts and immediately scans for malware.

Confirm that the Windows firewall is turned on. See Turn Microsoft Defender Firewall on or off for instructions on how to do that on modern versions of Windows. In the Search box, type firewall, and then click Windows Firewall. In the left pane, click Turn Windows Firewall on or off you may be prompted to enter your administrator password.

Viruses also have the ability to spread on their own and infect other computers. A computer virus is a type of malware with the ability to self-replicate. Computer viruses can spread in a variety of ways. They can hide in email attachments, infected websites, executable files, or pop-up ads. In addition, USB drives and other removable storage devices can contain viruses and spread them to your computer.

Some viruses begin replicating as soon as they get onto your device, and other require a trigger for the virus code to activate. Although antivirus software can protect your computer from viruses, its effectiveness is limited. There are now many viruses that can evade antivirus software, which makes detecting the malware more challenging. Viruses are an extremely prevalent form of malware affecting household computers.

The Microsoft Security Intelligence Report and Consumer Reports found that in the United States, over 16 million households experienced a computer virus in the past two years. In recent years, viruses and other forms of malware have been increasingly targeting governments, healthcare organizations, and businesses. There are many different ways that viruses can infect your computer.

Here are some of the most common ways:. Computer viruses often spread by email. This can happen by opening an email attachment, or in some cases by simply viewing the email.

Some viruses are also delivered in the HTML body of the email. As a result, many email services disable HTML until you confirm you know the sender.

Instant messaging services such as Skype and Facebook Messenger can be used to spread viruses. The most common method is by sending an infected link in a chat message. People are more likely to click on a link from someone they know, and virus developers are well aware of this. Dropbox, SharePoint, and other file-sharing services are another means to spread viruses. If a user uploads an infected file to a file-sharing account, the virus will spread to anyone else with access to that account.

Although Google Drive and some other services do scan files for viruses, they only scan files smaller than 25MB. Sometimes cybercriminals resort to sending pop-up ads to trick users into thinking their PC has a virus. Similarly, a computer virus isn't itself a standalone program. It's a code snippet that inserts itself into some other application. When that application runs, it executes the virus code, with results that range from the irritating to the disastrous.

In everyday conversation and the popular press, people often use virus and malware interchangeably. But strictly speaking a virus is a specific type of malware that fits the definition above.

The two other main types are Trojans , which masquerade as harmless applications to trick users into executing them, and worms , which can reproduce and spread independently of any other application. The distinguishing feature of a virus is that it needs to infect other programs to operate.

Imagine an application on your computer has been infected by a virus. We'll discuss the various ways that might happen in a moment, but for now, let's just take infection as a given. How does the virus do its dirty work? Bleeping Computer provides a good high-level overview of how the process works.

The general course goes something like this: the infected application executes usually at the request of the user , and the virus code is loaded into the CPU memory before any of the legitimate code executes. At this point, the virus propagates itself by infecting other applications on the host computer, inserting its malicious code wherever it can.

A resident virus does this to programs as they open, whereas a non-resident virus can infect executable files even if they aren't running. Boot sector viruses use a particularly pernicious technique at this stage: they place their code in the boot sector of the computer's system disk, ensuring that it will be executed even before the operating system fully loads, making it impossible to run the computer in a "clean" way.

Once the virus has its hooks into your computer, it can start executing its payload, which is the term for the part of the virus code that does the dirty work its creators built it for. These can include all sorts of nasty things: Viruses can scan your computer hard drive for banking credentials, log your keystrokes to steal passwords, turn your computer into a zombie that launches a DDoS attack against the hacker's enemies, or even encrypt your data and demand a bitcoin ransom to restore access.

Other types of malware can have similar payloads, of course: there are ransomware worms and DDoS Trojans and so forth. In the early, pre-internet days, viruses often spread from computer to computer via infected floppy disks.



0コメント

  • 1000 / 1000