Detailed defense methods and common trojan detection and removal Software

Source: Internet
Author: User

Detailed defense methods and common trojan detection and removal Software
To prevent legendary Trojans, you must first be able to understand Trojans. Trojans are divided into Trojans bound to EXE files (plug-in Trojans) and webpage Trojans. When you run plug-ins and open webpages, trojans are embedded into your computer. When you enter the legend, you can send your password and account to the account of the hacker.
First, install anti-virus software on your computer. The general anti-virus software is installed with a firewall. Once a virus is detected, it will automatically trigger an alarm. Commonly used anti-virus software includes rising star 2003, KV3000, Kingsoft drug overlord 2003, restar 8.0 also has the mail sending monitoring function. As long as you have installed any software on your computer and keep upgrading frequently, then the bundled Trojans and webpage Trojans will not be able to escape their eyes. although general anti-virus software does not regard Trojans as viruses, TROJANS bundled with binding machines are regarded as viruses, and webpage Trojans are generally unable to prevent viruses and firewalls.
Second, install the commonly used trojan-killing software on the computer. generally, Trojan Horse-killing software includes the wooden mark star, the PC green e omnipotent genie, The PHG password anti-theft expert, and the Super Rabbit ms98. The PHG password anti-theft Expert often reports false positives, entering letters in the IE Address Bar also reports keyboard listening, which is not very practical. some of the most powerful Trojans cannot be found if the anti-virus software has not been upgraded to the latest version. Some Trojans will automatically shut down the anti-virus software firewall after running. At this time, the trojan killing tool will be useful, they can be used to detect trojans in the system process, and some Trojans will be forced to shut down after running the trojan and the green e PC universal genie. at this time, we need to use the system process check tool. What I think is better is MS98, because it is not a tool to specifically kill Trojans, so Trojans will not be forcibly disabled, if you cannot run the wooden marker and green e genie on your computer, run it to check the system process to see if there are any suspicious processes. After running the software, there is an item in it that runs automatically. Click it and a window appears. Process Management is on the left, that is, the currently running process, and automatic running is on the right, that is, the process automatically runs every time it is started. after a trojan is run, it leaves a process in the system and runs automatically with the computer. At this time, both the system process and the random Automatic Process in MS98 are clearly visible, so it is good to scan and kill. find a suspicious process and terminate it. the following describes the processes of common trojans based on my experience in preventing and controlling legendary Trojans:
Legend black eyes:
C: windowsTaskmon32.exe, automatically running process: Taskmon32
Legend rebellion:
C: windowssysteminternet.exe, automatically running process: Intel
Legend Terminator:
C: windowsscanrew.exe, automatically running process: scanrew
Legendary password MESSENGER:
C: windowssystemcleanmgl.exe and c: windowssystemsticpl.exe
Automatic process running: Microsoft
Legend Hunter:
C: windowssystemwinsys.exe, automatically running process: winsys
Legend GHOST:
C: windowsinternet.exe, automatically running process: internet
Legend ANGEL:
C: windowskiss.exe, automatically running process: kiss

The following are some commonly used Trojans:
Mu Ma Xing 5.40 registration Edition
Http://www1.lanlian.com.cn/lb5000/usr/1/1_712.rar
Green e PC universal genie registration Edition
Http://www.mlzx.com.cn/upload/jiaoan/files/Eghost60.rar
Super Rabbit MS98:
Http://www.mlzx.com.cn/upload/jiaoan/files/ms9834.rar
Legendary anti-theft and dual-open programs:
# 0000ff> http://www.mlzx.com.cn/upload/jiaoan/files/TTeea.rar
Kingsoft drug overlord:
Http://www.mlzx.com.cn/upload/jiaoan/files/dubamir.rar

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.