How to let other people in the Trojan Horse-Trojan horse commonly used tricks-security-related

Source: Internet
Author: User
How to let other people in the Trojan?

This is the question which the netizen asks most, the sporadic answer also has some, but is always very few, then the small fish son decided gathers the wisdom of everybody and in a little experience to write a feature article. I hope you can speak a lot, improve this article for all Trojan enthusiasts to make a point of their contribution. The goal is to make everyone aware of the common tricks of Trojans to protect personal PC security.

1, bundled cheating. The Trojan server and a game bundled into a file in QQ or email to others. Server run will see the game program normally open, but will not find Trojans have been quietly running, can play a very good role in confusion. And even if others later reload the system, he still save you give him the "game", or it is possible to recruit again.

2, this is the textbook style of old-fashioned deception, the method is as follows: directly to the Trojan server to the other side, the other side of the operation, the results of no response (running the typical performance of the Trojan), he said: "How can not open Ah!" "You said:" Ah, not the program is broken? "or say:" Sorry, I sent the wrong! "Then the right thing (the normal game, photos, etc.) to him, he received after the rapturous don't want to have just happened something wrong."

3, QQ fake cheat. Prerequisite: You must first have a QQ number that does not belong to you. Then use that number to his friends to send Trojan program, because trust the owner of the stolen number, his friends will not hesitate to run the Trojan you sent them, the result of the recruit.

4, the Mail false deception. And the third method is similar to use the anonymous mail tool posing as a friend or a large web site, the organization unit to other people to send Trojan accessories, others download the attachment and run the Trojan Horse.

5, Dangerous download point. This is a few of the following friends mentioned, vegetables commonly used methods: (he is said to have used this method to get thousands of chickens) to break some download sites, download a few download a large number of software, bundled on the Trojan, and then quietly put back to let others download, so that after each additional download times, you are equal to a chicken. Or you simply bundled the Trojan to other software, and then "fair and square" release to the major software download site, they do not check the virus, even if the investigation also find out I write a new Trojan, and then ... I don't have to say, the meat chance is at least two digits.

6, folder inertia click. The Trojan file disguised as a folder icon, put in a folder, and then set up three or four empty folders outside, many people out of the habit of continuous clicks, point to that disguised as a folder Trojan, will not be able to hold the mouse point down, so the Trojan is successfully run.

7, Zip camouflage. This method is up to date, tying a trojan with a damaged zip package (can be homemade), then specify the bundle after the file as a zip icon, so that unless someone else read his suffix, otherwise the point will be the same as the general damaged zip, do not know that there is actually a trojan in the quietly running.

8, in a briefcase or can upload the attachment of the forum to send a bundle of good Trojan, and then the link to the victim.

9, Web Trojan law.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.