How to correctly prevent 5 kinds of "invisible killers" in Web pages

Source: Internet
Author: User
Tags format contains mail domain name access

With the expansion of computer and network applications, the danger of computer information security and the losses that have been caused have multiplied, especially the increase of various hackers, some individual users are often attacked by different means, which has aroused our attention.

For individual users, in addition to viruses and Trojans, the Web page of the stealth code is also beginning to seriously threaten our security, but most people lack of self-protection awareness, the harm of the invisible code is not enough, even in their own ignorance of the situation by others to steal important information. Because the stealth code has a relatively large concealment, so far, there is no virus firewall can well prevent the attack of stealth code, most of them can not even find. So we should be highly vigilant in the Web code of the Stealth killer. Generally speaking, the "stealth Killer" in web code is roughly divided into the following categories.

Stealth Killer 1 takes CPU

By continually consuming the system resources on this computer, the CPU occupancy rate is eventually up to 100%, making the computer no longer able to process other user processes.

The typical prank of the "stealth Killer 1" code is to generate a dead loop through JavaScript. This type of code can be found in a malicious website or sent to you in the form of an e-mail attachment. Most mail client programs can now automatically invoke the browser to open htm/html-type files. So as soon as you open the attachment, there will be countless new browser windows open on the screen. Finally you have to restart your computer.

The way to avoid this kind of problem is to not open the attachments of the mails sent by strangers.

Stealth Killer 2 illegal read local files

This type of code typically reads local files through calls to ActiveX, JavaScript, and WebBrowser control in a Web page.

"Stealth killer 2" code compared to the "stealth Killer 1" is characterized by a more subtle way of showing, the general people are not easy to find the invisible code is reading their hard disk files. "Stealth Killer 2" can also use the browser's own vulnerabilities to achieve its kill, such as IE5.0 's iframe vulnerability. A simple few lines of code can read any file that IE can open on your local hard drive.

The avoidance method can be solved by shutting down JavaScript and keeping an eye out for Microsoft's security patches.

Stealth Killer 3 web spoofing

The attacker first hacked into the DNS server responsible for the domain name resolution of the target machine, then reset the DNS-IP address to a host that he already had access to superuser privileges.

Such attacks are currently rare in the country, but they are very damaging if successful. And it could be disastrous. The attack is to trick you into handing over your username and password by forging an environment that is exactly the same as the target on the host where he has the superuser privileges. For example, our mail or even the online bank account number and password. Because you are facing a similar environment as yesterday, when you are proficient in typing user name and password. Never thought it was not a real host.

Avoid the bad way to surf the internet, it is best to turn off the browser's JavaScript, so that attackers can not hide the signs of attack, only when access to familiar sites to open it, although this will reduce the browser's functionality, but I think it is worthwhile. Also, don't link to other sites from unfamiliar websites, especially those that require you to enter a personal account name and password.

Stealth Killer 4 control user Machine

At present, this kind of problem mainly concentrates on the use of IE to actives.

We can now look at our own IE security settings, and for "Download signed ActiveX controls," Now the option is "prompt." But you may not know that IE still has the privilege of downloading and executing programs without prompting. This is a serious security issue and we may be completely under the control of others without our knowledge. Methods of avoiding evil in the registration form

Hkey-local-machinesoftwaremicrosoftinternet Exploreractivex compatiblity "

Create a new {6e449683-c509-11cf-aafa-00aa00 b6015c} based on CLSID for Active Setup controls the value of the Regdword type created under new: Compatibility Flags 0x00000400.

Stealth Killer 5 illegal format local hard drive

This type of code is a big threat. As soon as you browse through its Web page, your hard drive will be formatted.

This is not sensational, in fact, IE can be implemented ActiveX to make the hard drive is not a new loophole, as early as last year, foreign hackers found this problem, and published the source code, only then released the source of the vulnerability is to the Spanish version of Windows, If the direct copy down of the words for the Chinese version of Windows is no use. But recently in the domestic individual home page found in the Chinese version of Windows formatted local hard drive code. If you browse a Web page that contains this type of code, the browser will only give you a warning: "The current page contains an incomplete ActiveX that may be harmful to you" and asks if you want to execute it. If you choose "Yes", your local hard drive will be quickly formatted, and because the window is minimized when formatted, you may not be aware of it, and the discovery is too late.

Avoid evil methods for similar prompts when browsing the web, do not answer "yes" casually unless you know what you are doing. And the above hint information can also be modified, such as "Windows is removing the temporary files of this machine, ask you whether to continue", so be sure to pay attention! Another: The local format.com, Deltree.exe and other dangerous orders to change the name is also a way. Because we want to really use these DOS commands in Windows is not much, and many macro viruses or dangerous code is directly invoke these DOS commands, such as the famous domestic macro virus "July killer", is in Autoexec.bat added deltree c:/y.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.