How can I tell if spyware is in?

Source: Internet
Author: User
Tags firewall

In real life, our personal privacy is often leaked, and most of the behind is spyware. The following small series, we will take you to see how the Spy software is how to steal secret data, as well as corresponding preventive measures. Hope to be useful to everyone.

Spyware, as its name implies, is a kind of software that can lurk in our computer like a spy and quietly run in the background. It collects users ' Internet habits, automatically connects to malicious websites, or steals user privacy files and uploads them to designated servers.

In general, if your computer has recently experienced one or more of the following symptoms, it is quite possible to recruit:

1. The computer does not have any Internet activity, the desktop has been pop-up advertisement or XX game recommendation window.

2. Its own system settings have been inexplicably changed, such as IE home page was changed to XX site navigation, and can not be changed back.

3. The computer runs slowly, and the explorer often stops responding, or the desktop does not suspend animation.

4. Some of their confidential information leakage, such as QQ password unreasonable leakage caused by QQ stolen.

Your privacy has been compromised.

There are many kinds of spyware hazards, such as occasional pop-up ads play windows, or secretly record your visit to the site, these hazards relatively small. Spyware most annoying, but also the most dangerous is to secretly steal your confidential information, such as private photos, qq password, Alipay password and so on. The disclosure of this information may result in the loss of your property. So how did spyware steal your secrets and transmit it? From the way of the spyware access information, it is mainly divided into two kinds: passive and active.

Passive refers to a spyware manufacturer's passive access to information by software installed on a user's computer, such as a lot of stolen spyware, and its workflow is generally like this:

First, by placing a specific download code on a website, forum, or blog page, the user will automatically download the spyware to the user's computer, or use the mail, u disk, etc.

In order to circumvent the killing of antivirus software, spyware is now mostly used to inject normal processes such as Explorer.exe methods to steal data. Spyware generally contains the memory data reading module and the mail delivery module, because the user input QQ account number, password and other data, this information will be temporarily stored in memory, so spyware will be through the precompiled code to read in memory of this information. After getting the information in memory, the message sending module in spyware sends the message containing the user's password information to the specified mailbox, so that the spyware maker can easily steal your QQ account.

The active type means that the spyware maker directly invades the user's host or Web server to get information, such as many spyware with hacker software nature. After the software is installed on the computer, they use the website or user system vulnerabilities, through a variety of hacker tools into the user's computer, directly view the user's privacy information, or the user files (such as photos, private documents, etc.) transmitted to the spyware maker, resulting in personal privacy data leaks.

Small tip:

In addition to spyware on the computer, now the spyware on the phone is also an accomplice in the disclosure of personal privacy. Because with the popularity of mobile phones, many people on the phone to shoot, save photos, the use of mobile phone banking transactions, using mobile phone QQ, micro-mail, etc., these are personal privacy data. Using spyware to get user privacy data is simpler, such as Android apps, as long as you add a call to a spyware application and a text message permission statement, and after you install the app, the user can secretly send the user's private data to the spyware person in the background.

On the defensive, spyware vs antispyware

Through the above introduction, I believe you have learned about the dangers of spyware. So in the day-to-day operation, how can we effectively take precautions?

1. Use a good system with the firewall

Spyware stolen confidential information to be transmitted to the network server must go through the network, the system with the firewall is a good tool to manage network transmission. For example, now if you suspect that your computer has spyware, but can't find out exactly which program, we can use Windows 7 firewall to intercept.

First click on "Start → run", enter Secpol.msc, open the Local Security Policy dialog box, expand the security settings → advanced security Windows Firewall → advanced security Windows Firewall, then select Properties, in the Open Properties window, in turn, the domain configuration file, Private configuration file, the common settings profile is set as follows:

Firewall status: Enabled (recommended)

Inbound connections: Block all connections

Outbound connections: Blocking

After you complete the settings above, return to the Local Security Policy Settings window. Right-click the "outbound rules → new rules", and then for their own machine really need to use the connection of the program such as QQ, IE and other settings allow outbound rules, so even if the spy software, it will not have the function of network connectivity and loss of damage.

2. Professional third party Anti-spyware software protection

The use of firewalls requires a certain computer base, for ordinary users, with the help of professional third-party Anti-spyware software, such as 360 security guards will have antispyware function. Start the program to switch to the "Trojan killing", click the "Comprehensive scan" for spyware killing can be.

3. Tablet, smart phone security should not be taken lightly

With the popularity of mobile devices, more and more spyware is staring at them. These devices can rely on Jinshan poison PA mobile phone version to protect their safety, on the phone to open the drug after the "full physical examination" can scan and killing spyware.

And for suspicious spyware, we can also click "Apply Behavior Management", Switch to "privacy", and then select a suspicious program, choose to deny privacy rights, so that the spyware can prohibit the reading of privacy files permissions.

As the saying goes, "flies don't bite seamless eggs." Many users recruit spyware, which has a great relationship with their operating habits. For example, often install some cracked, pirated software, so it is easy to recruit spyware. Therefore, we usually need to develop some good operating habits, such as the use of genuine software, software as far as possible to the official website download, do not visit the Vulgar Web site, regular updates virus library and system updates, will also increase security.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.