Malicious Code refers to code that has no effect but brings danger. The safest definition is to regard all unnecessary code as malicious. Unnecessary code is better than Malicious code has a broader meaning and includes any software that may conflict with an organization's security policy.
has the following common characteristics:
(1) Malicious purpose (recommended learning: web front-end Video tutorial)
(2) It is a computer program itself
(3) It takes effect through execution
Some prank programs or game programs cannot be regarded as malicious code . There are many documents discussing the characteristics of filterable viruses. Although there are many of them, the mechanisms are relatively similar and within the protection scope of anti-virus programs. What is more noteworthy are non-filterable viruses.
The existence of browser vulnerabilities is due to the limitations of programmers' abilities, experience and security technology at the time, and there will inevitably be deficiencies in the program. Unforeseen errors occur when the program encounters a problem that seems reasonable but cannot actually be handled.
When hackers carry out network attacks, the main target is not the operating system. The main target of the attackers is the browser used in the operating system. It is said that Microsoft's IE browser is in the tenth It is not an exaggeration to say that ambush in the Internet is not an exaggeration. Computer hackers often use IE browser vulnerabilities to carry out virus attacks, causing many users to suffer losses.
Web browser is one of the most widely used software in the entire network environment. Although various manufacturers continue to work hard to launch new, better-performing, and more secure web browsers - for example, Google has launched a browser called "Google Chrome", and Microsoft is currently testing a new browser called "Google Chrome". "Gazelle" browser, however web browser attacks and vulnerabilities remain unresolved.
In 2009 alone, the "Common Vulnerabilities and Risks" organization (CVE) reported more than 300 browser vulnerabilities, with dozens of products from each browser manufacturer.
According to statistics from relevant security experts, 80% of computer poisonings come from users browsing web page traps. It can be seen that web page attacks have become one of the main means of hacker intrusion. Once this kind of attack is successful, the user's computer will experience abnormalities such as the system slowing down, forced access to a website, the default browsing homepage being changed, and the browser title being changed.
The above is the detailed content of What do web page malicious codes usually use to implement implantation and attack?. For more information, please follow other related articles on the PHP Chinese website!