The specific method is as follows:
1. Integrate into the program
In fact, a Trojan is also a server-client program. To prevent users from easily deleting it, it is often integrated into the program. Once the user activates the Trojan program, then, the trojan file is bundled with an application and uploaded to the server to overwrite the original file. Even if the Trojan is deleted, you only need to run the application bound with the Trojan, the trojan will be installed again. Bind to an application. If it is bound to a system file, every Windows startup starts a Trojan.
2. Hide it in the configuration file
The Trojan is really tricky. I know that Cainiao usually use a graphical interface operating system. Most configuration files that are not very important are ignored, this provides a hiding place for Trojans. In addition, with the special functions of the configuration file, Trojans can easily run and attack on everyone's computers to gain a peek or monitor everyone. However, this method is not very concealed and easy to detect. Therefore, loading Trojans in Autoexec. bat and Config. sys is rare, but it cannot be ignored.
3. Lurking in Win. ini
To control or monitor a computer, a Trojan must run. However, no one is stupid enough to run it on his own computer. It must find a safe and automatic place to run when the system starts, so hiding in Win. ini is a pleasant place for Trojans.
Solution: Open Win. ini. In its [windows] field, the startup commands "load =" and "run =" are included. In general, "=" is followed by a blank space, for example, run = c: \ windows \ file.exe load = c: \ windows \ file.exe
4. Disguise in common files
For unskilled windows operators, it is easy to be fooled.
Solution: disguise the executable file as an image or text-change the icon to the default image icon for Windows in the program, and then change the file name to * .jpg.exe, because the default value of Win98 is "do not display the known file suffix", the file will be displayed *. jpg. If you don't pay attention to it, this icon will be used as a Trojan.
5. Built-in to the registry
Due to the complexity of the registry, Trojans often like to hide in the fun. Check out what programs are under them and read them carefully with wide eyes. Don't let the Trojans go:
All key values starting with "run" in HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion;
All key values starting with "run" in HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion;
All key values starting with "run" under HKEY-USERS \. Default \ Software \ Microsoft \ Windows \ CurrentVersion.
Follow these five methods to operate Windows 7 to find hidden Trojans and protect the computer security of the system.
Third-party anti-virus tools, such as 360 Security Guard
We open the 360 antivirus guard on the phone, and click scan to find out the computer viruses and trojans. The specific operation is shown in the following figure.