What is a broiler, how to avoid a computer to become a chicken?

Source: Internet
Author: User

First of all to explain to everyone is "what is chicken": the chicken is hacked and invaded, in the computer into the virus and Trojans and other backdoor procedures, with administrative privileges of the remote computer, the remote computer controlled by the intruder. Broiler can be a variety of systems, such as Windows2003, Linux, Unix and so on, but also a company, enterprises, schools and even the government army server. My friend told me that one day he used this loophole to successfully catch more than 3,000 chickens, that is to say, 3000 computers became his puppet. Although now the network has spread a lot of security assistance software, 360 guards, Golden Hill Guardian, 360 Antivirus, rising Antivirus, Kaspersky anti-virus and so on. But why are so many people still being controlled by others? Then it is necessary to look at the following on how to avoid the computer to become a "chicken" method.

Several common methods of horse-hanging in broiler:

1. WinRAR compression packet attack

The so-called compression packet attack, is in the compressed file bundled a Trojan or virus, when opened automatically run, generally this attack is the self-extracting format. This kind of situation often in each big website also often appears, therefore downloads the file must before the anti-virus software scan.

2. Self-release attack

Some software has its own poison, which is automatically released at run time. This is a relatively different way.

3. Horse-mounted attack

Use the website page, Hang horse this way at present most, but the difficulty is also relatively high, first must invade the website or has the website administration Authority only then.

4. Port scan attack

Use of scanning tools and vulnerabilities to exploit tools to achieve the purpose of the attack

Attack a lot of ways, here is just a part of the list, if you want to understand the way hackers hang horse, we suggest that everyone Baidu, here will not say more.

Look at the above intrusion method, although the kind of a lot, but we do the following listed the precautionary method, it can help everyone from the horse and virus infestation!

First. Antivirus software

Antivirus software must be installed, as to say 1, 2 or 3 that is a person's preference, no one says you're wrong even if you have 20 of them. Some friends here may say, I like "naked", "naked" so long it is OK. People often say, "Long Walk Night Road will hit a ghost" Now you may be okay, Doesn't mean it's OK later. So I suggest that you install an anti-virus software, after all, it will not take much time. Compared to the time spent reloading the system, I would like to download the installation of anti-virus software may be faster.

Second. Install the assistive software.

360 guards, Golden Hill guards and so on. These security assistive software can both optimize the system and install the patch intelligently. It can also be intuitive to the reaction system may exist some of the risks, download and install a few at a time. And it's more convenient.

Third. Close ports and services that do not need to be used

Turn off unnecessary ports, services, shares, and so on in the system. Because most of the time the majority of users have only to use 360 guards to do the optimization, this is forgotten to do, if you close these? But you can see an article on this site: How to close the port.

Fourth. Make strict checks on documents.

No matter whether the downloaded file or someone else's file should be antivirus first, determine non-toxic in the open. Antivirus software active defense, real-time monitoring should always be in the open state. No one may be in danger.

Fifth. Web browsing

Although many sites are safe, but now the Internet is a mixed bag, such as pornographic sites, hacker sites, many are their own trojan, the user will automatically download Trojan virus, become someone else's puppet. Suggest to visit the time with pornography or less!

Sixth. Strengthening the consciousness of self-security

Said above, in fact, the main own safety awareness to strengthen, if can not withstand the temptation of sex website, also often may dye the upper body ~ then regret ink ~. The above execution good, basically not be hackers to make your computer into chicken!

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.