A Web page that causes browser resources to occupy high

Source: Internet
Author: User

With the expansion of computer and network applications, the danger of computer information security and the losses that have been caused have multiplied, especially the increase of various hackers, some individual users are often attacked by different means, which has aroused our attention.

For individual users, in addition to viruses and Trojans, the Web page of the stealth code is also beginning to seriously threaten our security, but most people lack of self-protection awareness, the harm of the invisible code is not enough, even in their own ignorance of the situation by others to steal important information. Because the stealth code has a relatively large concealment, so far, there is no virus firewall can well prevent the attack of stealth code, most of them can not even find. So we should be highly vigilant in the Web code of the Stealth killer. Generally speaking, the "stealth Killer" in Web code is broadly divided into the following categories:

Stealth Killer 1: CPU consumption

By continually consuming the system resources on this computer, the CPU occupancy rate is eventually up to 100%, making the computer no longer able to process other user processes.

The typical prank of the "stealth Killer 1" code is to generate a dead loop through JavaScript. This type of code can be found in a malicious website or sent to you in the form of an e-mail attachment. Most mail client programs can now automatically invoke the browser to open htm/html-type files. So as soon as you open the attachment, there will be countless new browser windows open on the screen. Finally you have to restart your computer.

The way to avoid this type of problem is to not open attachments to messages that strangers send, especially extensions that are attachments to. vbs,. htm,. doc,. exe.

Stealth Killer 2: illegally reading local files

This type of code typically reads local files through calls to ActiveX, JavaScript, and WebBrowser control in a Web page.

"Stealth killer 2" code compared to the "stealth Killer 1" is characterized by a more subtle way of showing, the general people are not easy to find the invisible code is reading their hard disk files. "Stealth Killer 2" can also use the browser's own vulnerabilities to achieve its kill, such as IE5.0 's iframe vulnerability. A simple few lines of code can read any file that IE can open on your local hard drive.

The avoidance method can be solved by shutting down JavaScript and keeping an eye out for Microsoft's security patches.

Stealth Killer 3:web Deception

The attacker first hacked into the DNS server responsible for the domain name resolution of the target machine, then reset the DNS-IP address to a host that he already had access to superuser privileges.

Such attacks are currently rare in the country, but they are very damaging if successful. And it could be disastrous. The attack is to trick you into handing over your username and password by forging an environment that is exactly the same as the target on the host where he has the superuser privileges. For example, our mail or even the online bank account number and password. Because you are facing a similar environment as yesterday, when you are proficient in typing user name and password. Never thought it was not a real host.

Avoid the bad way to surf the internet, it is best to turn off the browser's JavaScript, so that attackers can not hide the signs of attack, only when access to familiar sites to open it, although this will reduce the browser's functionality, but I think it is worthwhile. Also, don't link to other sites from unfamiliar websites, especially those that require you to enter a personal account name and password.

Stealth Killer 4: Control the user machine

At present, this kind of problem mainly concentrates on the use of IE to actives.

We can now look at our own IE security settings, and for "Download signed ActiveX controls," Now the option is "prompt." But you may not know that IE still has the privilege of downloading and executing programs without prompting. This is a serious security issue and we may be completely under the control of others without our knowledge.

Method of avoiding evil under registry hkey-local-machinesoftwaremicrosoftinternet Exploreractivex compatiblity "Active Setup Controls" Create a new {6e449683-c509-11cf-aafa-00aa00 b6015c} based on CLSID to create a value of Regdword type under new: Compatibility Flags 0x00000400.

Stealth Killer 5: Illegal format local hard drive

This type of code is a big threat. As soon as you browse through its Web page, your hard drive will be formatted.

This is not sensational, in fact, ie can be executed by ActiveX to make the hard drive is formatted is not a new loophole, if you browse a Web page that contains such code, your local hard disk will be quickly formatted, and because the window is minimized when you format it, you may not be aware of it, and the discovery is too late.

The method of avoiding evil is to rename the Format.com, Deltree.exe and other dangerous orders of this machine. Because we want to really use these DOS commands in Windows is not much, and many macro viruses or dangerous code is directly invoke these DOS commands, such as the famous domestic macro virus "July killer", is in Autoexec.bat added deltree c:/y.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.