Home> Common Problem> body text

What are the characteristics of malware not included?

青灯夜游
Release: 2022-09-29 10:18:56
Original
4999 people have browsed it

The characteristics of malware do not include "destroying user data". Malware is software that is between viruses and regular software. Its characteristics are: 1. Forced installation; 2. Difficulty to uninstall; 3. Browser hijacking; 4. Advertising pop-ups; 5. Malicious collection of user information; 6. Malicious Uninstall other software; 7. Malicious bundling; 8. Other malicious behaviors that infringe on the user's right to know and choose.

What are the characteristics of malware not included?

The operating environment of this tutorial: Windows 7 system, Dell G3 computer.

[Single-choice question] The characteristics of malware do not include ().

  • A. Forced installation

  • B. Malicious collection of user information

  • C . Destroy user data

  • D. Difficult to uninstall

Correct answer:C. Destroy user data

Malicious software (commonly known as "rogue software") refers to software that is installed and run on the user's computer or other terminal without the user's explicit prompt or permission, infringing upon the user's legitimate rights and interests, but does not include Chinese laws and regulations prescribed computer viruses.

Simply put: malware is software that is between viruses and regular software.

Some rogue software is just to achieve a certain purpose, such as advertising. Although these rogue software will not affect the normal use of the user's computer, an additional web page will pop up when the user starts the browser for promotional purposes.

Malicious software has the following characteristics (characteristics)

1. Forced installation:refers to without explicit prompting from the user Or allow the installation of software on users’ computers or other terminals.

  • a) Do not prompt the user during the installation process;

  • b) Do not provide clear options for the user to choose during the installation process;

  • c) Do not provide the user with the function to exit the installation during the installation process;

  • d) Prompt the user that the installation process is insufficient and incomplete. Clear; (Clear and sufficient prompt information includes but is not limited to software author, software name, software version, software function, etc.)

2. Difficult to uninstall:Yes This refers to the behavior of a program that is still active after being uninstalled, even if a universal uninstall method is not provided, or it is not affected by other software or destroyed by others.

a) No clear and universal uninstallation interface is provided (such as "Program Group" and "Add or Remove Programs" in "Control Panel" under Windows system);

b) Software uninstallation is additionally mandatory Conditions, such as connecting to the Internet, entering verification code, answering questions, etc.

c) It cannot be completely uninstalled without being affected by other software or artificially damaged, and there are still subprograms or modules running (such as in process mode);

3. Browser hijacking:refers to the behavior of modifying the user's browser or other related settings without the user's permission, forcing the user to access a specific website or causing the user to be unable to access the Internet normally.

  • a) Restrict users from modifying browser settings;

  • b) Unauthorized addition, deletion and modification of the content of websites visited by users;

  • c) Force users to access specific websites or be unable to access the Internet normally.

  • d) Modifying the relevant settings of the user's browser or operating system causes the above three phenomena.

4. Advertising pop-ups:refers to the use of advertisements installed on the user’s computer or other terminals without explicitly prompting the user or without the user’s permission. The behavior of software pop-up ads.

  • a) Users were not informed of the pop-up advertising behavior of the software during installation;

  • b) Pop-up ads cannot be turned off;

  • c) When an advertisement pops up, the user is not notified of the software information of the pop-up advertisement;

5. Malicious collection of user information: Refers to Maliciously collect user information without the user’s explicit prompts or permission.

  • a) When collecting user information, do not prompt users to collect information;

  • b) Do not provide users with the option to choose whether to allow information collection Options;

  • c) Users cannot view the information they collect;

6. Malicious uninstallation:refers to no The act of uninstalling other software without clearly prompting the user, without the user's permission, or misleading or deceiving the user.

  • a) False description of other software;

  • b) Giving error prompts for other software;

  • c) Delete other software directly.

7. Malicious bundling:refers to the act of bundling software that has been identified as malware.

  • a) During installation, install identified malware;

  • b) After installation, install or run other malware that has passed various ways to identify malware.

#8. Other malicious behaviors that infringe on users’ rights to know and choose.

For more related knowledge, please visit theFAQcolumn!

The above is the detailed content of What are the characteristics of malware not included?. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn