No one can change my password. No one can steal it"

Source: Internet
Author: User


Many users have a headache for the loss of QQ passwords and the theft of online game accounts. They often install a lot of software and think of a lot of methods that will not help. So how do hackers steal user passwords and how should we prevent them? The following analysis will solve this problem.

Rising
Statistics from the anti-virus monitoring network show that there are more and more malicious programs stealing user accounts and passwords. Technical Analysis of malicious programs shows that hackers use three types of hacking methods: ① sending a message method, mainly sending a GET_TEXT message to the target process, obtain the user input in the input control of the target process. ② the global keyboard Hook method is used to install the global keyboard hook in the operating system through programming, which is equivalent to a keyboard recorder, all users' keyboard percussion actions will be recorded; ③ Memory search method, malicious programs inject part of the code or DLL into the target process, used to search for the user name and password stored in the memory space of the target process.

Now, some instant messaging software companies and online banking companies have adopted some technical measures to protect keyboard input. However, Hackers often use comprehensive means to bypass these protection measures. For example, some Trojan viruses will first Delete the protection programs of those vendors, so that the accounts will be stolen.

As a professional information security vendor, rising uses the proprietary Trojan Wall Technology to counter hackers in the latest version 2006. Traditional anti-virus software uses firewalls to intercept information sent by Trojans. However, after the trojan virus encrypts, compresses, and deformation the stolen information, many firewalls become ineffective, this is why user accounts are frequently stolen.

Unlike traditional anti-virus software, rising Corporation has developed a "rising Trojan wall" by analyzing the technical principles of hacker account theft through underlying system techniques ". The trojan wall is directly installed on the user's computer to form a process protection wall, through anti-hook, anti-message, anti-process injection, and other methods, it directly blocks Trojans and malicious programs from stealing user privacy information, and fundamentally solves the problems of accounts and passwords theft such as instant messaging tools, online games, and online banking.

Experts also warned that this solution is only technical, and some hackers may steal accounts by other means. For example, some users may put the password into a text file on a computer to prevent it from being forgotten. hackers may obtain the file through remote control software. Therefore, experts suggest that, in addition to installing necessary preventive software, it is also necessary to develop good safety habits.


 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.