
这是什么病毒啊?有什么危害? 50
用反间谍专家查出来的,已经删了,这样就没事了吗?Net-Worm.Win32.Bobic.k_226...
用反间谍专家查出来的,已经删了,这样就没事了吗?
Net-Worm.Win32.Bobic.k_226 展开
Net-Worm.Win32.Bobic.k_226 展开
14个回答
展开全部
下个360安全卫士,杀一下毒,再重起一下,再下个360保险箱,它能保护程序,实在不行找网通或电信公司的人来修一下
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
中病毒是很正常的事,杀毒软件解决就Ok了.
只是替你感到不值,为了怕中病毒,什么网站也不去,真没意思
只是替你感到不值,为了怕中病毒,什么网站也不去,真没意思
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
Net-Worm.Win32.Bobic.k
Type Worm
Type Description A Worm is a malicious program that spreads itself without any user intervention. Worms are similar to viruses in that they self-replicate. Unlike viruses, however, worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network. Worms can also spread through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable. Some Worms may be used to compromise infected machines and download additional malicious software.
Category Worm.Generic
Category Description A Worm is a malicious program that spreads itself without any user intervention. Worms are similar to viruses in that they self-replicate. Unlike viruses, however, worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network. Worms can also spread through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable. Some Worms may be used to compromise infected machines and download additional malicious software.
Level High
Level Description High risk threats are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware. These threats may also collect and transmit personally identifiable information (PII) without your consent and severely degrade the performance and stability of your computer.
Advice Type Remove
File Traces
worm.exe
Type Worm
Type Description A Worm is a malicious program that spreads itself without any user intervention. Worms are similar to viruses in that they self-replicate. Unlike viruses, however, worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network. Worms can also spread through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable. Some Worms may be used to compromise infected machines and download additional malicious software.
Category Worm.Generic
Category Description A Worm is a malicious program that spreads itself without any user intervention. Worms are similar to viruses in that they self-replicate. Unlike viruses, however, worms spread without attaching to or infecting other programs and files. A Worm can spread across computer networks via security holes on vulnerable machines connected to the network. Worms can also spread through email by sending copies of itself to everyone in the user's address book. A Worm may consume a large amount of system resources and cause the machine to become noticeably sluggish and unreliable. Some Worms may be used to compromise infected machines and download additional malicious software.
Level High
Level Description High risk threats are typically installed without user interaction through security exploits, and can severely compromise system security. Such threats may open illicit network connections, use polymorphic tactics to self-mutate, disable security software, modify system files, and install additional malware. These threats may also collect and transmit personally identifiable information (PII) without your consent and severely degrade the performance and stability of your computer.
Advice Type Remove
File Traces
worm.exe
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
还是用杀软查杀哈的好,我用的诺顿很不错,它的“脉动更新”功能会每隔
5
到
15
分钟自动下载最新病毒定义库和产品更新至用户计算机中,从而有效保护计算机免受变化多端的病毒攻击。占资源少,速度快,对于杀木马也很在行。现在还和qq医生合作呢!功能更是强大
5
到
15
分钟自动下载最新病毒定义库和产品更新至用户计算机中,从而有效保护计算机免受变化多端的病毒攻击。占资源少,速度快,对于杀木马也很在行。现在还和qq医生合作呢!功能更是强大
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
展开全部
建议安装卡巴斯基杀毒,具有强大的防火墙和杀毒清楚木马广告功能,瑞星徒有虚名,我原来用瑞星,中了病毒居然还不知道,一次我先用瑞星扫描硬盘只查杀一个病毒,之后用卡巴斯基杀毒,竟然查杀20个病毒,1:20啊!我从此只用卡巴斯基再也不用瑞星了!
已赞过
已踩过<
评论
收起
你对这个回答的评价是?
推荐律师服务:
若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询