Trojan virus using digital signature

Source: Internet
Author: User

The internet is a lot of fake phenomenon, this is not in the author's computer, Trojan disguised as a normal security document, staged a "true Monkey King" farce. If you have the same situation at this time, may wish to follow the author to use digital signature technology, to find out the evil disguise Trojan Horse "."

Small knowledge: Simply called digital signature, is attached to the data unit some data, or to the data unit of the password transformation. Digital signature can be obtained based on public key cryptosystem and private key cryptosystem, which is mainly based on public key cryptosystem. Common digital Signature Algorithm has RSA, ElGamal, Fiat-shamir, Guillou-quisquarter, Schnorr, Ong-schnorr-shamir digital Signature algorithm, DES/DSA, Elliptic Curve Digital Signature Algorithm and finite automata digital Signature algorithm.

One, version information leakage "slip"

As a result of the current increase in user security, almost no network has been found, there is no anti-virus software installed machine. So the person with ulterior motives, in order to make its trojan can escape the killing of antivirus software, have to its Trojans wear a layer of thick "armor", so that its anti-virus software can not be respectively. But as the saying goes: "Paper is never wrapped in fire." "Often only pay attention to the shell of the person, almost all of its camouflage file information to ignore, here the following unfamiliar file as an example."

First locate and right-click the suspect file name, select the Properties option, and in the pop-up Properties dialog box, cut to the summary or Version tab. In general, security documents will be described in the notes of their program information. If you do not find any information about the program in the "Summary" or "Version" tab, we can determine that the file is a hacker disguised Trojan horse (Figure 1).

From which we can clearly see that the title, note text is blank, very suspicious. Of course, do not rule out you think this method is more arbitrary, that the Trojan some too strong, so here you may as well hold down the "Ctrl+alt+del" key combination, in the pop-up "Task Manager" dialog box, cut to the top "process" tab, combined with the process called by this file, You can clearly determine the file is not a Trojan file.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.