Any Bing poison has its appearance. For example, many Bing poisons will infect the folder and turn the folder into an EXE executable. When you double-click the folder, the folder will not be opened, but will trigger the operation of Bing poison.

Now, he opened the attachment, but the attachment didn't respond. Maybe it was a prank. The attachment didn't do anything, or maybe it was Bing poison!

There is bing poison. What should I do?

For ordinary people, the best way is to turn off the computer immediately, remove the hard disk, hang it on other computers and use anti-virus software to kill viruses. However, if it is a new Bing virus, there is no such Bing virus feature library in the Bing virus library of the anti-virus software, and they can't be killed at all. Moreover, they are the top computer system experts in the world, How could you be frightened by a little Bing poison?

When they find that there is a Bing virus, they naturally have to study at the first time what kind of damage this Bing virus will bring to the computer system, see whether their system startup add-on is artificially added with more startup options, see whether some file names are modified, and so on.

Gates is seriously looking for it. As long as he finds out what the other party has done, it can be easily solved.

However, he didn't find anything. His computer didn't seem to be damaged, so Gates had to pick up the phone: "Hello, Robert, what's in the email you just sent me?"

"Send an email to you? No," Robert said strangely. "No."

No, Is this email sent automatically? Gates immediately understood: "pay attention, everyone in the whole company should pay attention not to open any e-mail or click on the attachment of the e-mail! There is a kind of Bing virus that we have not seen, which is spreading in our computer network!"

If the Bing poison was first sent to gates, it might be able to avoid this large-scale spread, but now it is not the case. Gates is not the first recipient. Many people in the company naturally open it without any doubt when they see the email sent by their colleagues. When they open it, they find nothing, I just thought this email was a prank, or the email was sent incorrectly, and the attachment was not a running program. Therefore, I didn't pay special attention at all and continued to do my work.

After all, they didn't find that their computers were poisoned by Bing. After a computer was poisoned by Bing, at least they had to show the phenomenon that the system slowed down? Or the files are damaged, but now, without any problems with their computers, they naturally continue to work. They don't know that their computers have not only become victims, but also risked their own name to send e-mails to more friends. As long as they have been sent before, this Bing virus will continue to be sent. Now, With the headquarters of Microsoft as the source, the whole Bing virus has begun to spread to all computers equipped with Microsoft operating system, and the speed is quite fast.

When Gates issued this warning, everyone was stunned. They had been poisoned by Bing? Didn't you find it?

My computer has not been affected.

"Everyone, put down their existing work immediately, look for the trace of this Bing poison, and be sure to find it from our computer system!" Gates said.

He is clear about the recent cyber attack on Hanxin technology company. Now, is this Bing poison the other party's revenge? However, if the other party retaliates, how to retaliate? What are the characteristics of this Bing poison?

What does it destroy?

No one knows.

A whole day has passed and a night has passed. Everyone is red eyed. People at Microsoft are also the best in computer programs. Now, they are analyzing the whole computer system to find out where they are infected.

But they got nothing.

Time is still passing.

When everyone couldn't hold on, and even thought that Gates made a mountain out of a molehill, a small prank, or even a purely meaningless move, gates found something himself.

"Look here."

Gates carefully compared all the files inside the computer. When he found the file Win32, he found that the file was wrong.

"What's the matter?"

No one found anything wrong.

"This file, 108 bytes more than our normal file!" Gates said.

The size of each file is determined. Now, as the writer of the system, the file has 108 more bytes. He can see it.

Robert, on the other side, disagreed: "now, our hard disk is often just a few gigabytes, which will not occupy much space. If we can create a Bing poison on such a small byte, I really admire them."

Robert doesn't think it's so useful. No matter how smart a programmer writes a Bing poison, it can't be less than 500 bytes. That's a very clever way. Now, 108 bytes can produce a Bing poison?

No, of course not.

"What if it's just a fragment? The other party divides a binding virus of more than 500 bytes into several segments and hides them in our system files?" Gates said.

In addition to sabotage, computer Bing poison can also be hidden. How to hide yourself is a technical job. The most common way is to use hidden folders, which are low-level and high-level practices. Naturally, they are hidden in system files. After all, generally, no one pays attention to system files. For them, that pile of useless and rotten files.

Clip? How many segments?

"Find and compare all the files!"

Sure enough, when they took action, they finally got a harvest. On their file, they saw that a piece of code was added, each of which was 108 bytes!

108, what's the point?

No one knows.

When they find paragraph 8, paragraph 9, or even paragraph 10, it means that a 1080 byte Bing poison is presented in front of them.

"It's too hidden to be found at all," murmured Robert. "But it's in the hidden stage now? We haven't found any damage to our computer system yet. We just need to design a patch and remove these program segments."

The computer Bing poison may not happen immediately, but may also be hidden. If gates is not highly vigilant, his computer may give up after receiving an email and can't open the attachment. He won't notice that the computer has been poisoned at all. In this way, the concealment is very high. In the future, it may happen at a fixed time, which makes people get caught, and I don't know why.

Is that the case now?

If so, they still have time to remedy and patch the system quickly.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like