Only antivirus unsafe network security and what to prevent? _ Web Surfing

Source: Internet
Author: User
Tags spywareblaster

Source: Beijing Entertainment News

Few people on the internet have been harmed by the virus. But while most people are focused on tackling the virus, industry pundits have recently pointed out that to secure access to the Internet, these three threats must be defended at the same time. The first is the traditional macro virus, worms, such as the representative of the invasive virus; the second is to spy software, advertising software, phishing software, Trojan Horse program as the representative of the extension of the threat; The third is the hacker-led targeted special attack or indiscriminate attack as the representative of the network violations.

Three daxin threats

Spyware (spyware): Mainly used to steal the user's personal data malicious programs, such as users use online banking, online shopping and other e-commerce applications, if there is no relevant defensive measures and awareness, then the user's network Silver account and password can easily be stolen.

Adware (advertising software): Is a software, general performance for users to click on the site after a lot of superimposed on the page, very bad off. It's usually tied to some tool software, and when you install the software, it goes into your computer. It not only occupies system resources, but also often connects some pornographic websites. In addition to the imposition of ads to users, but also to spy on the user's personal privacy information, such as name, mailbox, bank information, telephone, address, etc., so hidden a small harm, need to clear as soon as possible.

Phishing (phishing Software, also known as electronic Black bait): Fishing and phone abbreviations. Refers to the theft of other people's personal data, bank and financial account information of the network-related deception, can be divided into two types of deception and technology. The trick is to use a special email, direct the recipient to a specially crafted Web page, which is usually disguised as a real bank or financial page, so that the logged-in person can believe it, enter a credit card or bank card number, account name, and password, and the technical phishing is to install the program into the victim's computer, Steal personal data directly or use Trojan horse program, key recording program, etc.

Antivirus not safe only

May 12, the Ministry of Information Industry released the latest statistics show that the current number of Internet access in China has reached 98.8 million. At present, many netizens are no longer simply surfing the web and receiving email, with the advent of e-commerce applications such as online banking and online shopping, the threat from the internet is not just a traditional virus.

It has been reported that China is now the preferred target for hackers, with 30,000 PCs per day in a state of control that could be attacked at any time. Industry insiders pointed out that the future of computers and computer users pose the greatest threat is not our usual computer viruses (Virus), but some spyware (spyware), Adware (adware), Phishing (phishing software), Trojan (Trojan program), Worms (Worm). The reason is that most users and commercial organizations have a certain degree of protection against computer viruses, such as the installation of anti-virus programs, and then new viruses can be resolved in a short time, but for spyware, Trojan and worms the majority of netizens to guard against awareness is weak. Although the general computer also installed anti-virus programs, but in fact, a single anti-virus program does not stop the attacks from the Internet. The digital weekly is here to tell you how to structure a careful "ventilation" computer defense system to ensure Internet security.

Four new trends of harming the injured

Symantec, technical director of China, said in an interview that, in general, previous hacker attacks and the purpose of crime is not very clear, most of them out of curiosity, publicity purposes. And now many are organized, purposeful economic crime. According to our analysis, the hacker attack roughly has the following four trends:

1. Theft of personal data

In recent years, the crime of using phishing attack has grown very fast, mainly in the application of E-commerce. Hackers use the name of the bank to send e-mail to bank users, prompting the bank system upgrades require users to re-register, once the user is credulous to register, bank accounts will fall into the hands of the hacker, and this is accompanied by your bank account is missing.

2. "Zombie" intrusion

According to Symantec's Safety report released in March this year, last July-December saw the fastest growing zombie-bot program in China, and the world's top 10 in the region. A bot is similar to a Trojan horse program, which performs a program that is not set up in advance and attacks a target with all of the "zombie" computers that are programmed to do so. This attack is the most dangerous because it is not like the virus can be monitored in advance.

3.Adware, spyware Sneak attack

Symantec's Technology Center has been found in laptop computers that have been implanted with up to hundreds of adware or spyware software. They are typically installed by small users when downloading flash and games, and as they are not as sensitive as viruses and worms, they can unwittingly invade your computer. Now some formal software vendors are also using these software to collect user data. While such software is not necessarily harmful at the moment, it collects your personal privacy information. This will also become the focus of future prevention.

4. Junk Mail Makeover

From the current point of view, the total amount of spam, although a downward trend, but its escape technology is more and more strong. This kind of mail carries a large number of viruses, Phishing, worms, trojans and additional risks.

Ventilation six strokes.

People often think that as long as the installation of some Simple network defense products is tantamount to building a complete computer defense system. As everyone knows, these are not enough to build a comprehensive network of the overall defense system, but also in the network security management standards under the guidance of network security management through the overall solution, combined with a variety of network defense technology and products, in the overall maintenance of network and information systems security.

1. Basic prevention (killing) virus software must be limited

For the average user, the first thing to do is to install a set of anti-virus software for the computer. As long as the formal manufacturer of the genuine anti-virus software, any choice can be. The installation of the steps are simple, as long as the installation disk into the CD-ROM drive, according to the system's automatic installation interface prompts Select Install * * Antivirus software → Choose the installed language version → then all the way next.

Recommended software: "NortonAntiVirus2005", supporting Windows (All), "Rising anti-virus software version 2005", Support Windows95/98/me or windowsnt4.0/2000/xp/2003; "Jinshan Poison PA 2005" , support WINDOWS9X/2000/XP, "Jiangming antivirus software kv2005", support WinXPSP2, Winxp,win2000,win9x.

2. Personal Firewall setting is the key

In the above anti-virus software contains a personal firewall, so you can use the same CD to run Personal Firewall installation, the emphasis on the firewall after installation must be based on the requirements of detailed configuration (see diagram).

The installation of a variety of firewalls have a certain common ground, that is, in the selection of the current Internet in the "regional link" → "Set value" of the "service" in most of the connection Agreement, only the basic HTTP, HTTPS, SMTP, POP3 project can pass the firewall, Click OK and your computer will be able to prevent most worms from invading.

3. Cut off the phishing hook

According to the latest statistics of the anti-phishing organization APWG (Anti-phishingworkinggroup), about 70.8% of cyber frauds are directed at financial institutions. A few years from the domestic situation see most phishing is only used to cheat QQ password and game point card and equipment, but this year many banks have been phishing many times. You can download some tools to prevent phishing activities.

Recommended software: "Netcrafttoolbar". The software is IE on the toolbar, when the user opened the Web site in IE, will check whether it belongs to the interception of dangerous or suspected sites, if this scope will stop connecting to the site and display prompts. In addition to intercepting phishing, it can also intercept pop-up windows ads.

4. Anti-espionage, advertising software will kill

To prevent spyware, in addition to the need to install on the computer like anti-virus program Pai procedures, often monitor and eliminate the computer spyware outside. Also make a selection of the shareware that will be installed on your computer, especially if you are unfamiliar with it, and you can log on to its official website for more information. In addition, when installing shareware, do not always wander along the "OK" button, but carefully read the terms of the agreement in each step, paying special attention to those statements about spyware behavior.

Recommended software: Mircrosoftantispyware is a special program for spyware, support windows2000/xp/2003. It is software used to monitor and remove spyware and other potential untrusted programs that exist in the system. You can reduce the illegal pop-up ads windows that are generated by these software, the slow running of your computer, arbitrary changes to Internet options, and the theft of private information. However, the software is still in the testing phase, so it should be used with caution.

Adware are similar to other malicious programs, and they are simple to appear in the Control Panel's Add or Remove Programs, and users can remove them directly. However, most of the adware will not directly display the program ontology, to remove them will need to use some targeted software.

Recommended software: "Spybotsearch&destory". As long as the installation of the default "Fullinstallation", after installation, s-s&d1.3 directly include the Chinese interface in the "Language" drop-down menu select "Chinese (Simplified)" can be. When first used, S-S&D prompts the user to back up the registry (hint: For insurance purposes, it is strongly recommended that you back up the registry before making any changes, most of which have built-in backup registry functions), and then click "Find Update" button to upgrade the main program and reference files as usual. Then click the "Check Problem" button, S-S&D will automatically start to scan the system, and will find suspicious items listed in the "Problem" box, after the inspection, users can select the items to clear, and then click "Fix the selected problem" can be. Finally killing the existing spyware, the user just click on the "Immune" button, and then a few seconds, S-S&D will automatically hit the system "Prevention needle", to avoid these spyware intrusion again, and this "immune" can be revoked at any time. In addition, there are adware's "ad-aware6.0 archives" and the Almighty "spyware/adwareremover" file.

5. Self-built website blacklist

After the ad program is cleared, it does not mean that problems in the existing browser will be restored automatically, and users will be required to manually change the title and home page. Although the "Spybotsearch&destory" also has similar functions, but the use of no one is called "spywareblaster" software convenience. The software allows users to first prevent problematic web sites, limit their installation programs to computers, and remove unwanted ActiveX controls that are currently installed. It is recommended that the above software be installed at the same time. In addition, users to prevent the problem of the site of the computer installation of unknown software, can also use the "SpywareBlaster" to solve.

6. Training software to recognize rubbish

Believe that users have electronic mail has been different levels of spam (SPAM) harassment, it is annoying, especially after a long holiday mailbox was stuffed with the risk of explosion. To do this, the user is to install an email filter program, the spam filter out.

Recommended software: "Spamihilator" is as an e-mail program and e-mail server between the filter network, e-mail will be downloaded to the program and filter, the email is judged as spam will be stored in the program's Recycle Bin (so as to avoid the deletion of important messages mistakenly deleted), Those who are judged to be normal emails go into the inbox of the mailbox. The software uses two ways to filter the mail, one is the preset word-filter, check whether the email contains words that are common in spam, and the other is Learning-filter, which can be filtered for daily emails received. However, before using learning-filter, you need to train the program first. In the daily filter email, select the normal message in Trainingarea, and press Nonspam to mark it as normal email. Pressing Pre-mark allows the program to automatically select all junk or normal mail, but when used, the user is best to check it in person to make sure it is correct. Then according to the Learn program will be based on the classification of e-mail to identify garbage learning.

Cultivate 9 good habits

Experts pointed out that from a technical point of view the network is not absolutely safe, a protective system light products is not enough, daily work to develop good habits of use is indispensable. Users should develop the following 9 good habits.

First, the installation of anti-virus software should be regularly upgraded (if installed is a network version, you can install the first set it to automatically upgrade), the operating system to patch, upgrade engine and virus definition code.

Second, do not open the mail do not know, do not download the software at random, to download must go to the regular website to download. Also, programs or files downloaded on the web should be scanned for viruses before they are run or opened. If you encounter a virus in time to clear, encountered the virus can not be removed, timely submission to the anti-virus manufacturer.

Third, do not randomly browse hacker websites (including regular hacker websites), pornographic websites.

Four is to backup as far as possible. In fact, backup is the safest, especially important data and articles, many times, its importance than the installation of defense products more.

Five is the user every week should be a comprehensive antivirus, scanning work, in order to find and clear the virus hidden in the system.

Six should pay attention to try not to use the same password everywhere, so that once the hacker guesses, all personal data will be leaked.

Seven is the Internet do not easily listen to others through e-mail or peer-to-peer software sent messages.

Eight is to use Peer-to-peer class download software (such as BT) users, recommended every month to clean up the disk fragments, as long as it is not frequent defragmentation will not cause damage to the hard disk, in addition, pay attention not to use low-level formatting often.

Nine is when the user inadvertently infected with the virus, you should immediately upgrade the antivirus software to the latest version, and then the entire hard drive for scanning operations. Remove all the viruses that can be wiped out. If the virus can not be removed, or anti-virus software can not be clear to the virus, then the virus should be submitted to the antivirus software company, antivirus software companies will generally give users a satisfactory response in the short term. In the face of cyber attacks, our first response should be to unplug the network connection port or press the Disconnect button on the antivirus software.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.