Today, everything I talk about is about personal computer security, as well as what I know. I think everyone has had this experience. We are all studying the HACK technology. A small number of people often give us Trojan viruses. The most amazing thing now is webhorse, as long as there are vulnerabilities in our system, no one is spared (harm to others )! Many will hack some WEB hosts and attack
Attack/intrude into the other computer. However, when we attack someone else, someone else will attack our computer.
I think those people are also not vegetarian. General anti-virus software and firewalls can also be easily broken through.
After all, there is no perfect defense in the world. No computer can have no vulnerabilities at all. So we all intrude into XX websites and personal plans.
Computer. However, compared with our technologies in this field, we lack methods and awareness to defend against our own computers. Today, I will show you what I personally know.
Write some methods and knowledge to share with you.
Security Software: anti-virus software, firewall, virus, Trojan, and rogue software cleanup. (It is best to install these security products on Windows.
Product)
Windows system updates are important for computer security. system updates must be enabled and computer vulnerabilities must be fixed.
Necessary computer settings, such as disabling potentially dangerous services such as telnet, ftp, 3389, and netbios; Setting a strong password for administrator users
Do not use weak passwords. delete other useless user accounts, disable guest users, and delete default share $ admin $ cdef $ ipc.
There are also some common security knowledge, you must know: Some Trojan viruses are well concealed, and the first thing is to do with virus-free removal, so do not set the system security
All of them are placed on anti-virus software, and do not rely too much on software. Learn to manually scan and kill computer viruses and Trojans. Computer viruses and Trojans
The sequence is divided into: Key record, remote control, and back-category. Because anti-virus software is highly concealed, it is usually loaded to the startup item, so that the system
You can secretly start the virus and Trojan during the next startup. Now I want to talk about several startup methods of virus and Trojan Horse: loading to win. ini, note
In general, even if a virus Trojan is killed, the entry point of the program is changed, and the process insertion technology is used.
The virus Trojan killing tool can effectively clear viruses and Trojans. However, if none of the above methods can clear viruses and Trojans,
You can try to clean up the virus and trojan programs manually, but many friends still don't know how to clean them. Today
I will introduce how to manually clean up viruses and Trojans. There are a few hidden areas of the virus and Trojan program: Registry, Introduction
The sector, win. ini, and system32 directories are hidden by virus Trojans. In general, you must first Delete the startup of the virus Trojan program.
Next, delete the source file of the virus Trojan program, and clear the Boot Sector and memory.
Intrusion is generally directed at important information on your computer or extensive intrusion (large-scale scanning ). So we had better deal with the data in our computers.
Data Encryption can effectively protect your data from being downloaded and read by others.
In addition, we recommend that you have security awareness. For example, if your computer is infected with a Trojan program (the key record program here), you first run some
After a few minutes, your program suddenly fell out, so do not log on to the account, because it is very likely that your computer has been infected with the disease.
Virus Trojans, infected with such trojans do not need to worry too much, as long as you do not log on to the account, you are not afraid of anything, some Trojans are global, only
If you enter the trojan program in the text box on Windows, it will be recorded and sent out. Some Trojans record the specified program.
The trojan won't work when running the specified program.
When you suspect that your computer is infected with a virus or Trojan program, you can first use the exclusive tool to kill the virus or check whether there is any suspicious attack.
Whether the Suspicious Port is opened. Generally, hidden Trojans are not exposed. You have found a suspicious Trojan program.
Search the table and computer system disk, delete the Registry Startup project, and delete the source files in the partition. Then check the memory and
It should be okay to export the sector.
There are also some attacks against hackers. We all know what to do before the HACK technology intrusion. First, we will scan for vulnerabilities in our computers.
You can use security tools to check whether your computer has security vulnerabilities. For example, by default, sharing is disabled, IPC sharing, and ADMIN sharing. And
File and printer sharing. This vulnerability has the remote buffer overflow vulnerability.
The system administrator password should be a high-strength password. Do not use weak passwords. If you do not need the remote connection service, you must disable it: telnet,
Ftp, 3389, and so on.
Because I don't often use those software, my hobby is computer programming. Although I am still in the learning stage, I do not need to use common software. I suggest you
Do not rely too much on software. Some people who have used the software for several years do not even know the principle of the software implementation.
If you have learned a computer language, it will be very helpful for you to learn HACK technology in the future, but it will be very helpful for hackers to use tools.
The limitations of doing things are also very limited.
Let's go back to computer defense. It's not easy to defend against your computer. What I mentioned above is just a general intrusion. However
It may also be useless to be a real hacker. I believe that the real hacker must master more than one undiscovered vulnerability. Because he has not published
This vulnerability is rarely known. Does MS know?
The following describes common methods of virus and Trojan Horse spoofing to improve your security awareness.
WEB Trojans, I think we all know that some websites are infected with Trojans after being hacked. As long as the user opens the corresponding page, Trojan
This vulnerability is automatically downloaded and executed by the browser. (Therefore, it is best to enable the WEB monitoring function of anti-virus software on the local computer ).
Do not easily accept files and images sent by strangers. software may be maliciously bundled with trojan programs.
Try to download software from some large and professional websites and check for viruses before opening the software.
You have to block the temptation! Do not click the connection address that someone else sends you when the pie is not lost in the sky.
Trojan program ).
Because most of the current vulnerabilities are targeted at IE. If it is not necessary, do not use IE. I personally recommend using the Firefox browser.
Enable the download and update of anti-virus software, or regularly download updates to the anti-virus software to keep the latest virus database. Otherwise, your anti-virus
The software can be set up in the same way.
Key values of startup items for some virus Trojans in the registry:
<CCID_NOBR> <CCID_CODE> 1. HEKY_LOCAL_MACHINESOFTWAERMICROSOFTWindowsCURRENTVERSIONRUN
2. HKEY_CURRENT_USERSOFTWAERMICROSOFTWindowsCURRENTVERSIONRUN
3. HKEY_USERS.DEFAULTSOFTWAERMICROSOFTWindowsCURRENTVERSIONRUN </CCID_CODE>
If you have time to learn more about the internet horse, this is a very dangerous thing. You may have heard about it, but you do not know it yet. The so-called understanding of the virus can prevent intrusion.