AnalysisofcomputervirusandpreventionmeasuresAtpresent,computervirusescanpenetrateintotheinformationsocietyinvariousfields,tothecomputersystemhasbroughtgreatdamageandpotentialthreats.Inordertoensurethesafetyandsmoothflowofinformation,andthereforethestudyofcomputerviruspreventionmeasuresareimminent.Inthispaper,thecharacteristicsofthecomputerfromstartingtoexploreapreliminarydealwithcomputervirusesandmeasures.Withthecomputereveryaspectofsociallifeinthewideuseofcomputertechnologytoguardagainstvirusattacksandhasbeenexpanding.Itisreportedthatcountriesintheworldfromcomputervirusattacksandhundredsofmillionsofseriouslydisturbedthenormallifeofhumansociety,tothecomputernetworksystemandbroughtgreatdamageandthepotentialthreat.Atthesametime,thevirustechnologyinthefieldofwarhavebroadapplicationintheGulfWar,therecentKosovowar,bothsideshavetousecomputervirusestoattackenemyandundermineeachother'scomputernetworksandweaponscontrolsystems,toacertainThepurposeofpoliticalandmilitarypurposes.Itisforeseeablethatwiththecomputer,usetheInternetconstantlypopular,in-depth,toguardagainstcomputerviruseswillbemoreandmorecountriesattachgreatimportanceto.Computervirusesareagroupofinfectionbycopyingitselftoothersoftwareprograms.Whentheprogramruns,theembedvirusinfectionandalsorunningotherprograms.Somenon-virusandmaliciouscodeattacks,buttheviruscarryingtheviruscode,onceagoodpre-stimulatingenvironmentcanbeinfectedanddestruction.Sincethe80'sMorrispreparedthefirst"worm"virusprogramsofar,theworldhasappearedinavarietyofdifferenttypesofvirus.Computerviruseshavethefollowingcharacteristics:First,thecovertattacksonstrong.HIVinfectioncanbequietlycomputersystemswithoutbeingdetected,tobefound,oftenhaveseriousconsequences.Second,thereproductionability.Oncetheinfectedcomputer,youcanquickly"disease."Thecurrentthree-dimensionalviruswillcausealotofvariants.Third,thewidemodeoftransmission.Viafloppydisk,wiredandwirelessnetworks,hardwaredevicessuchasmulti-channelautomaticcomputerintrusion,andcontinuetospread.Thefourthisalongincubationperiod.Virusescanbehiddeninthelongcomputersystemsandnotattackuntiltheymeetcertainconditions,stimulatethedamage.Thefifthisgreatdestructivepower.Oncethecomputervirusattack,rangingfrominterferencewiththenormaloperationofthesystem,whileheavydamagetothediskdata,deletefiles,resultingintheparalysisoftheentirecomputersystem.Sixaretargeted.Theperformanceofcomputervirusescanaccuratelybedesignedtomeetthedifferentcircumstancesandtimingoftherequest.Foralongtime,thetargetcomputerwasdesignedmainlytothepursuitofinformationprocessingandimprovethefunctionoflowerproductioncosts,andtheemphasisonsecurityissuesisnotenough.Computersystemsofthevariouscomponents,interface,converteachotheratvariouslevels,therearemanyloopholesandweaknesses.Eventhelackofhardware-basedsecurityasawhole,softwareisalsoeasierfortheexistenceofhiddendangersandpotentialthreats.Onthecomputersystemoftestingisstillalackofautomatedtestingtoolsandsystemsoftwaremeansacompleteinspection,thevulnerabilityofcomputersystemsforcomputerviruseshavespreadandprovidedanopportunity;theworldontheWorldWideWeb(www)sothatthe"globalvillage"Fortheimplementationofacomputervirustocreatethespace;Thenewcomputertechnologyintheelectronicsystemincontinuoususeforcomputervirusestoachievetheobjectiveconditionsprovided.Foreignexpertsbelievethenumberofdistributedprocessing,re-programmi...