How to prevent others steal your QQ number (steal someone else's QQ password) _ Security Tutorial

Source: Internet
Author: User
Please look--

1, the premise work, you want to download Trojan "glacier", and "NetXRay", and "Exebind". The glacier is a remote monitoring software, is Bo a kind of thing, as long as the other side runs the server program, his system is always open to you! Now more popular is the gray Pigeon remote control, NetXRay can be used to look at each other's IP; exebind, you can combine two EXE files into an EXE file, run, respectively. How do I use it? I don't teach myself to study. Then, use Exebind to combine the server-side program of the glacier with a normal program. For example: Name Play.exe. Make it into a zip package.

2, the second step, to apply for a new QQ number, is used to do bad things. You can't ruin the good reputation you've built up on the Internet. Even a small person, but also to do some concealment ... In addition, the name of this number is best a mm name, because it can make people do not doubt you, they are more likely to believe you, so that we carry out the theft.

3, third, is to find an attack! If you are the name of the registered mm, it is best not to find them on the initiative. You say a few words in the chat room, there is someone to find you, these people's technology is not very good, even do not know what is network security, their vigilance is the lowest, is a very good prey Oh! If you are boy's name, it depends on your ability. Anyway, girl and boy are OK, just try to make others trust themselves. I always think you can not be a friend, otherwise, it is not a betrayal of friends! I've never done anything like this. )

4, the tense moment has arrived! Here, I'll use an example to tell you the steps to get someone else's password: (If you're in the name of a novice on the web, so others will be lax about your defenses, and you'll have a basis for what you said below)

A, and that person, must be close, and show that you do not know anything about computers and the Internet, ask him some low-level questions, such as: Mail bombs can make my computer explode? (I pour!) Then, say a few words. After that, cut to the chase!

: My friend sent me a program, I do not understand. What is the Search for?

: Is it? I can't see. I don't know!

: Alas, what then?

: Sorry----This time he may say: I help you look! Ha ha! He's on the hook! If so, proceed to step b. Alas, the man is this is not good ...

: I send it to you, will you help me to see it?

: OK! ----Haha, next!

b, will be your hands and feet Play.zip sent to him, tell him, you need to know how to use immediately. He'll be running in ten.

C, with NetXRay to see his IP, the glacier, select "Add Host", is his IP, the other with the default on it.

D, if he executes the file, you can hack into his machine!

E, first of all, download the *.pwl file in his Windows directory to your machine, it will be useful in the future.

F, in the command console, start the key record.

G, through the glacier (not QQ) to send him a message, the message title is "QQ", the type is "wrong", the content is "due to system internal error, QQ will be closed, please restart QQ." Why do you have to do it below you know!

h, you see his process, will his QQ close, you later look at the process, until QQ started 1 minutes, because this time he has entered the password, the glacier has recorded his keystroke action. All you have to do is stop the keystroke log and check it out! Done!

There is another way, you tell him that you sent a greeting card to him, you do it yourself, ask him to look good, let him go to the mailbox check. If he uses an online charge, you can check his e-mail password by pressing the key record! It's probably his Internet account!

As for the *.pwl file mentioned earlier, it is Windows Save password file, all saved passwords are there, you can only use a software to see!

This last step, is the most important! Please continue reading:

You've got his QQ password (it's possible that all of his password are this), what you have to do is done, but you can't let him keep infecting the backdoor virus, you should uninstall his server program so that he is not attacked by others, this is basic (also can add a password or change the port, Let others not intrude).

Above introduced how to steal someone else's QQ password, so how to guard against it? In the Trojan rampage today, the machine must have a special killing Trojan software, to ensure that the QQ password is not stolen. Here to recommend a few relatively good Trojan software, first of all, Trojan Killer Trojan tools, can kill 8122 kinds of international trojans, 1053 kinds of password theft Trojan, to ensure the murder of legendary password theft Trojan, QQ class parasitic Trojan, ice class file associated trojan, password Jie Ba, Miracle shooter and other games password mail trojan, built-in Trojan firewall, any hacker program trying to send password mail, all need to iparmor confirm, not only can killing Trojan, more can search hacker password. The other is Trojan scavenger Windows scavenger, homemade good Trojan kill software, scanning process scan HDD Scan Registry detect suspicious Module Vulnerability Scan Smart upgrade Trojan firewall. As well as the 360 production of 360 Trojans kill 360 Trojans specifically kill, including a variety of popular Trojan killing tools, you can quickly and accurately killed Trojan. including Benniu cattle, machine dogs, gray pigeons, sweeping waves, disk drives, and so on all kinds of Trojans, can use 360 system first aid box for killing.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.