Phishing and Trojans

Source: Internet
Author: User
Tags website server

Are you familiar with the terms "phishing" and "Trojan"? When you access the Internet, security software often uses similar proprietary words to tell you that you have been hacked and infected with Trojans, what is going on? Let's get started with it. Of course, it's actually much more complicated:

1. Trojan

Trojans refer to malicious intruders scanning websites for injection points, obtaining the account and password of the system administrator through injection points, and obtaining the website background login page address after scanning; then, log on to the website background and obtain a webshell through database backup/recovery or upload vulnerabilities. Use the obtained webshell to modify the content of the website page and add malicious redirection code to the page; when you access a page with malicious code added, the infected website will guide you to download the corresponding trojan;

Many hackers use Trojans to trick you into downloading Trojans to steal your game account. The bank card account is ambitious;

Let's take a look at the example below, visit the website http://medusoftor.bjmu.edu.cn: 22/home/jpcourse/surgery/home.htm, see, found no, very obvious infected website, of course, a lot of Trojan horses are hidden, and you cannot prevent them.

 

2. Phishing

Phishing refers to the use of various means by criminals to counterfeit the URLs and content of real websites, you can also use vulnerabilities in real website server programs to insert dangerous HTML code into some websites to defraud users of private information such as bank or credit card accounts and passwords.

I can't remember how many times I had been cheated by a phishing website. I told you how many times I got a qq nickname, What awards I had won, and then tempted you to enter your qq account and password, bank Card accounts, passwords, and so on, I recall that I may have lost qq.

Instance speak, web site input http://www.qq969.com/, see no, come out, it is the temptation to win; accidentally in the move, you must have met!

 

 

 

 

 

3. How to defend

In addition to increasing security awareness on the Internet at ordinary times, do not have the psychology of cheap goods, do not believe in winning prizes, or do not trust unfamiliar websites, or install defense software most easily, we recommend a Kingsoft network shield: click the following link to download: http://i2d.www.duba.net/i2d/kws3/KWSSetup.exe

4. References

Http://tech.ccidnet.com/art/3089/20080609/1469517_1.html

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.