How to find hidden Trojan viruses in Windows 7

Source: Internet
Author: User

 

The specific method is as follows:

1. Integrate into the program

In fact, a Trojan is also a server-client program. To prevent users from easily deleting it, it is often integrated into the program. Once the user activates the Trojan program, then, the trojan file is bundled with an application and uploaded to the server to overwrite the original file. Even if the Trojan is deleted, you only need to run the application bound with the Trojan, the trojan will be installed again. Bind to an application. If it is bound to a system file, every Windows startup starts a Trojan.

2. Hide it in the configuration file

The Trojan is really tricky. I know that Cainiao usually use a graphical interface operating system. Most configuration files that are not very important are ignored, this provides a hiding place for Trojans. In addition, with the special functions of the configuration file, Trojans can easily run and attack on everyone's computers to gain a peek or monitor everyone. However, this method is not very concealed and easy to detect. Therefore, loading Trojans in Autoexec. bat and Config. sys is rare, but it cannot be ignored.

3. Lurking in Win. ini

To control or monitor a computer, a Trojan must run. However, no one is stupid enough to run it on his own computer. It must find a safe and automatic place to run when the system starts, so hiding in Win. ini is a pleasant place for Trojans.

Solution: Open Win. ini. In its [windows] field, the startup commands "load =" and "run =" are included. In general, "=" is followed by a blank space, for example, run = c: \ windows \ file.exe load = c: \ windows \ file.exe

4. Disguise in common files

For unskilled windows operators, it is easy to be fooled.

Solution: disguise the executable file as an image or text-change the icon to the default image icon for Windows in the program, and then change the file name to * .jpg.exe, because the default value of Win98 is "do not display the known file suffix", the file will be displayed *. jpg. If you don't pay attention to it, this icon will be used as a Trojan.

5. Built-in to the registry

Due to the complexity of the registry, Trojans often like to hide in the fun. Check out what programs are under them and read them carefully with wide eyes. Don't let the Trojans go:

All key values starting with "run" in HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion;
All key values starting with "run" in HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion;
All key values starting with "run" under HKEY-USERS \. Default \ Software \ Microsoft \ Windows \ CurrentVersion.

Follow these five methods to operate Windows 7 to find hidden Trojans and protect the computer security of the system.

Third-party anti-virus tools, such as 360 Security Guard

We open the 360 antivirus guard on the phone, and click scan to find out the computer viruses and trojans. The specific operation is shown in the following figure.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.