Today's online world is becoming increasingly insecure. hacking tools are simpler than Word tools. Any cainiao can use tools to create powerful "Horse" attack weapons. Webpage viewing, email reception, and chat QQ may all be "Trampled" by the horse. If you don't pay attention to it, your personal information, account, password, and other important information will be "carried" by it. Do you know how to identify, capture, and drive? The following tactics will show you how to deal with these stubborn horses.
I. Xue bole recognizes Ma Shima
Trojan is essentially a remote control software. However, remote control software is also divided into regular troops and mountain bandits. As the name suggests, regular troops are just saying that they can help you remotely manage and set up computer software, such as the remote assistance function provided by Windows XP. Generally, such software appears in the system taskbar during running, clearly tells users that the current system is under control, while Trojans belong to mountain bandits, and they will sneak into your computer for destruction, and by modifying the registry and bundling it on a normal program, it makes it difficult for you to trace it.
Another difference between a Trojan and a common remote control software is that the remote control functions implemented by the trojan are richer, which not only implements the functions of the general remote control software, it can also damage system files, record keyboard operations, steal passwords, modify the registry, and restrict system functions. In addition, you may become an accomplice to the horse-raising personnel. The horse-raising personnel may also use your machine to attack others and let you back up the box.
2. Find the root cause and find the culprit
As an undesirable bandit, how does a trojan get into your system? There are generally the following main transmission methods:
The most common is the use of chat software, such as a Trojan in your QQ friends. This Trojan is likely to run QQ on a friend's machine and send a message to you, trick you into opening a link or running a program. If you accidentally click or run it, the horse will secretly run in. Another popular method is to buy one and send one, trojans will be bundled with some normal files, such as image files. When you browse images, Trojans will also sneak in. Horse-raising on webpages is also a common method, A hacker puts a Trojan on a webpage and tricks you into opening it. You only need to browse the webpage, but the last common method is planting in an Internet cafe. The machine security in the internet cafe is poor, hackers can also work on machines directly, so there are many machines with horses in Internet cafes. There is also a high probability of Trojan attacks when surfing the Internet in Internet cafes. In addition, these methods may work together to attack you.
[Content navigation] |
Page 1st: my security, my defense, Trojan search, clear all strategy |
Page 2nd: my security, my defense, Trojan search, clear all strategy |