How to prevent others from stealing your QQ number (stealing others' QQ passwords)

Source: Internet
Author: User

See --

1. Prerequisites: You need to download the Trojan Horse "glacier", "NetxRAY", and "ExeBind ". A glacier is a remote monitoring software and something like BO. As long as the other party runs the server program, his system will be open to you at any time! Currently, remote control is quite popular. NetxRAY can be used to view the IP address of the other party. Exebind can combine two exe files into one. Execute these files separately during running. How to use it? I don't want to teach. I will study it myself. Then, use exebind to merge the glacier server program with a normal program. For example, play.exe. Compress into a zip package.

2. Step 2: Apply for a new QQ number to do bad things. You cannot destroy the good reputation you 've worked so hard on the Internet! Even if you are a villain, you have to hide something ...... In addition, the name of this number should be a mm name, because this will make it easier for others to trust you and facilitate theft.

3. Third, find an attack! If you are a registered mm name, it is best not to take the initiative to contact them. When you say a few words in the chat room, someone will take the initiative to look for you. These people are not very technical, and even do not know what network security is, they have the lowest vigilance, it's a good prey! If you are a boy, it depends on your skills. Anyway, girls and boys can do the same. You just need to find a way to trust others. (I always don't think you can have a deep friendship. Otherwise, it's not about selling your friends! I have never done such a thing ......)

4. It's time for tension! Here, I will use an example to tell you how to obtain others' passwords: (the premise is that you are a newbie to the Internet, so that others' defense against you will be relaxed, and you can also use the following statements)

A. You must be very close to that person. It shows that you don't know anything about computers and networks and ask him some low-level questions, such: can an email bomb blow up my computer? (Me !) Then, let's say a few irrelevant words. Next, start with the question!

: My friend sent me a program. I don't understand it. What does Search do?

: Yes? I cannot see it. I don't know!

: Alas, what should I do?

: Sorry ---- at this time, he may say: I will help you look at it! Haha! He hooked up! If so, perform step B. Alas, this is not good for men ......

: I will send it to you. Can you help me check it out?

: Okay! ---- Haha, next step!

B. Send play.zip to him and tell him that you need to know how to use it immediately. He will be running right away!

C. Use NetxRAY to check his ip address. In the glacier, select "add host", which is his ip address. Use the default ip address for others.

D. If he executes the file, you can intrude into his machine!

E. First, download the *. pwl file in the windows directory to your machine. It will be useful in the future.

F. In the "command console", start the key record.

G. Send a message to him via a glacier (not qq). The message title is "qq", the type is "error", and the content is "qq will be closed due to internal system errors, please restart qq ". Why do you want to do this!

H. Check his process and shut down his qq. You will check the process later until qq starts for one minute, because he has already entered the password at this time, the glacier has recorded his key-hitting actions. You just need to stop the record and view it! Success!

Another way is to tell him that you sent a greeting card to him. You did it by yourself and asked him if he looked good and asked him to check it in his mailbox. If he uses online charging, you can press the key to record his E-mail password! Probably his Internet account!

As for the *. pwl file mentioned above, it is the file for windows to save the password. All the saved passwords are there. You only need to use a software to see it!

The last step is the most important! Continue to see:

You have obtained his qq passWord (it is likely that all his passwords are the same), and what you have done has been done. However, you cannot keep him infected with backdoor viruses, you should uninstall his server program so that it will not be attacked by others. This is basic (you can also add a password or change the port so that others cannot intrude into it ).

The above describes how to steal others' QQ passwords, so how can we prevent them? Today, when Trojans are rampant, you must have a software dedicated to trojan detection and removal to ensure that the QQ password is not stolen. Here we recommend a few good software for Trojan Horse detection and removal. First, we recommend that you use the Trojan horse detection tool, which can scan 8122 types of international Trojans and 1053 types of password theft Trojans to ensure that you can scan and kill the legendary password theft Trojan Horse, QQ-type parasitic Trojans, glacier-type file-related Trojans, password decoding, miracle shooters, and other game passwords are mailed to Trojans, built-in Trojan firewalls, and any hacker program that tries to send password emails must be confirmed by Iparmor, it not only detects and removes Trojans, but also checks hacker passwords. In addition, it is a good Trojan killer software made in China. The scan process scans the hard disk to scan the Registry to detect suspicious module vulnerabilities and intelligently upgrades the trojan firewall. As well as 360 of 360 Trojans, 360 Trojans, and Trojans, including various popular Trojan scanning and removal tools, can quickly and accurately scan and kill Trojans. All Trojans, including Boniu, robot dogs, gray pigeons, scanning waves, and drive disks, can be scanned and killed in a 360 system first aid kit.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.