How to prevent non-technical and technical online game account theft

Source: Internet
Author: User
Tags password protection


In the online gaming world, a player with the best equipment and an advanced account does not know how much money, effort, or sleep is required. The feelings they pour on cannot be measured by money. Therefore, the most worrying thing for players is that their game accounts are stolen and virtual items are missing. Recently, it is often seen that a certain player account has been stolen, and the account has been stolen without any effort. It also loses confidence in the game and it is hard to recover. Friends will also be sad for you. Therefore, it is very important to protect your account!
First, let's take a look at common methods or techniques to steal accounts!

1. Use Trojan and other hacker software

This program is highly concealed by installing trojans on users' computers or automatically embedding Trojans into users' computers when users browse webpages or download things, the key records generated when the user enters the account and password are sent to the hacker. Some software can monitor any actions on the user's computer.

2. peeping

When a player enters the game in public, the hacker will peek at the player's password input and record it.

3. Impersonate official and game managers

(1) use names similar to GM, such as "Event Host", "prize issuer", and "gamemaster", or impersonate official staff and use various excuses such as "Send Prize" to ask players for account and password.

(2) create a false website and impersonate the official website to publish fake news to defraud gamers of related account information.

4. Plug-ins and false client programs

Some programs are disguised as online game clients. When players use this program and enter account information, this information will be sent to hackers.

The plug-in producer can easily obtain the user's account information by adding a program to the plug-in.

Once we know how the account is stolen, we can take corresponding defense measures.

Several methods of stealing can be divided into technical stealing and non-technical stealing!

The second and third stealing methods mentioned above should be non-technical stealing. The prevention measures are relatively simple. Pay attention to the following points:

1. Try to enter the password as concealed and fast as possible in the public, and check whether there are other people nearby

2. The real GM will not ask the player for a password for any reason under any circumstances

3. Do not enter or log on to your online game account on any other unofficial website.

4. if you pretend to be an official website, report it to the official website in a timely manner.

The first and fourth types of stealing methods should be technical, and the preventive measures are complicated. The following is a detailed description:

I. At present, many people publish various so-called external hanging programs or links to unknown websites in various forums. We advise you not to click. Because it is likely to bind a "keyboard generator ".

1. Set INTERNET Options of IE to restore the default settings.

2. Do not install or download some software with unknown experience, especially some so-called external hanging programs.

3. Do not open attachments with letters of unknown origins.

4. Install the latest anti-virus software and regularly upgrade the virus database.

5. Be careful when the computer in the internet cafe is installed with software that records keyboard operations, or when Trojans are installed. When using an Internet cafe computer, press CTRL, ALT, or DEL to check whether an unknown program is running. If yes, terminate the task immediately.

6. Internet users in Internet cafes should first scan the machine to see if there is a trojan program.

II. for some brute-force password cracking software, this method mainly uses some brute-force password cracking software to try the user's account and password one by one, however, it takes a long time for users to have certain computer knowledge and Crack

1. Avoid exposing game accounts to public forums and other websites.

2. When setting a password, try to make it more complex. It is best to set it to a combination of letters, numbers, and other symbols with an 8-digit length or higher.

3. Do not use the information you can easily obtain as a password. This includes birthday, ID card number, mobile phone number, name of the street in which you live, and so on.

4. Change the password frequently because the combination of letters, numbers, and other symbols with more than 8 digits is not impeccable.

5. Apply for password protection (the password is swallowed up), that is, set the security code. Do not set the security code as the password. If you do not set a security code, you can modify all your passwords and registration materials (except the document number) once someone else cracks your password.

Iii. Trojan defense

Trojans have always been an indispensable software for hackers. First, let's get to know this evil star.

"I think we should burn this thing ." More than 3000 years ago, in the face of the huge Trojan horse suddenly left by the Greek on the ruins of the battlefield, the little prince of the kingdom of the Trojan said to his father. Because of his uneasiness, this sudden object will bring bad luck. However, no one listened to him, And the whole army stubbornly shipped the giant object back to the city as a trophy. A few days later, the Greek soldiers hiding in the Trojan opened the indestructible gate of the Trojan, and thus the fall of the Trojan. This is the origin of the Trojan name.

1. What is a trojan?

Trojans are not toys of children in kindergartens (but some people think so), but remote control software. In the eyes of anti-virus software, Trojans are viruses and "malicious hacking tools ". Trojans are generally divided into the client and server. The client is the console of the various commands you use, and the server is to run for others, only a computer running on the server can "be completely controlled by you "!

2. What is the purpose of a Trojan?

Did someone show off in front of you that he could get someone else's online account? Or a five or six-digit QQ password? Or a netizen's yuzhao?

Before you know a Trojan, you can easily show off the secrets and worship it! Since Trojans can remotely control others' computers, everything on their computers is yours. For you, there is no secret to them.

1. Has your computer been installed with a Trojan? How to detect?

1) Check the Registry

Check all the key-value names starting with Run under HKEY_LOCAL_MACHINE/SOFTWARE/MicrosoftWindows/Curren Version and HKEY_CURRENT_USER/Software/MicrosoftWindows/CurrentVersion, and whether there are any suspicious file names. If yes, you need to delete the corresponding key value and then delete the corresponding application.

2) Check the Startup Group

Trojans hidden in the startup group are not very concealed, but they are indeed a good place to automatically load and run. Therefore, Trojans prefer to reside here. The corresponding folder of the Startup Group is: C: windowsstart menuprogramsstartup. The location in the registry is HKEY_CURRENT_USER/Software/MicrosoftWindows/Current Version/javasershell Folders Startup = C: windowsstart menuprogramsstartup. Check these two locations frequently!

3) Win. ini and System. ini are also hidden places for Trojans.

The trojan is also a good place to load Trojans, so pay attention to it. When you see this:

Shelljavaser.exewind0ws.exe. please refer to that wind0ws.exe as a Trojan server program! Check it out.

4) Check C: windowswinstart. bat, C: windowswininit. ini, and Autoexec. bat. Trojans may also be hidden there.

5) if the EXE file is started, run the program to check whether the trojan is loaded into memory and whether the port is opened. If yes, it means either the file starts the trojan program or the file is bound with the trojan program, so you have to find another program and reinstall it.

6) there is a way to start a trojan. It only starts in a specific situation. So pay more attention to your port and check the running program, it should be okay to use this to monitor most Trojans.

2. There are already some specialized Trojan removing software. The powerful Trojan clearing function is bound in the new Skynet firewall. The general principle of the Trojan clearing Mechanism is as follows:

1) detect trojans.

2) Find the trojan Startup File. Generally, the location of the Trojan file can be found in the Registry and files related to system startup.

3) Delete the trojan file and delete information about the trojan in the registry or System Startup File.

However, for some very slippery Trojans, these measures cannot be found out. Now, the trojan detection method is nothing more than network connection and viewing system processes. In fact, some well-skilled Trojan compilers can reasonably hide communications and processes to make it difficult to detect trojans.

3. Trojan prevention tools.

There are many defense Trojan tools. Please install one to improve the security of your computer.
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.