w88 casino News Network (Reporter Bao Xiaolin)4month11Six thirty pm, Computer Network Association of w88 casino in Boxue Building308Hosted with "360Lecture on the theme of "Security Guards - Virus Prevention and Control". This lecture is one of the "Olympic Science and Technology Month" series of activities sponsored by the Computer Network Association, and invited360Xu Ming, Technical Director of Security Guard, was the keynote speaker. The lecture attracted many students who were interested in this aspect. While spreading virus prevention and control knowledge, he also recommended a popular security software to everyone.

A corner of the lecture

Speaker Xu Ming
The lecture mainly focused on the spread, harm and prevention of Trojan horses. First of all, Xu Ming explained the reasons for the popularity of Trojans, such as the low production cost of Trojans and their own industrial chain, etc., and explained it clearly with diagrams. Due to various reasons, Trojan horses are rampant on the Internet, seriously threatening Internet security. China's Internet security is facing a severe situation, Xu Ming analyzed. Through data analysis, Xu Ming pointed out that account-stealing Trojans are the most serious type of virus, accounting for 10% of the total number of Trojan viruses76.04%. He usesQQThe dangers of stolen accounts and online game accounts are taken as an example to emphasize the importance of maintaining personal privacy. So having the right security tool is a no-brainer. Afterwards, he introduced in detail360The most important function that security guards have to deal with this situation is the Trojan detection and killing function.
Concerning Trojans, Xu Ming introduced the basic characteristics of Trojans, Trojan hiding methods, account stealing Trojan technology, Trojan anti-killing methods and other professional knowledge in turn, revealing the reasons why the traditional killing system cannot cope with the rampant Trojans, and listed360The unique advantages of the Trojan detection and killing engine, such as fast detection and killing engine, file shredder, malware detection and killing, behavioral characteristics detection and killing, Trojan horse immunity, etc. are explained in a professional, detailed, clear and impressive manner.
When introducing the Trojan horse intrusion method, Xu Ming recommended it to computer users in a campus network environment360ArpFirewall, with clear illustrations of the pros and cons. Then, he introduced the prospects for the development of security technology such as active defense,360The development of safes, virtual machines, and security guards360The security guard structure includes defense system, killing system and recovery system.
Interactive session,360Security Guard’sZhao WeiThe lady asked many relevant questions to the audience, and the audience responded actively and received360A gift from the security guard. The scene immediately became lively, laughter continued, and the atmosphere was harmonious and warm. It can be said that learning is fun and enjoyable.


The interactive session was full of enthusiasm
In the question-and-answer session, Xu Ming patiently answered the questioners’ questions in detail, and the questioners also received corresponding prizes.

Xu Ming answers questions
Finally, the Computer Network Association expressed its gratitude to the speakers and looked forward to paying attention to the association's follow-up activities. At this point, the lecture officially ended with warm applause.