Safe and effective defense against online game plug-in Trojans

Source: Internet
Author: User
Tags password protection

Reference: at present, many people publish various so-called plug-ins or links to unknown websites in the absolute goddess forums. We advise you never to click. Because it is likely to bind a "keyboard generator ". At present, many people publish various so-called plug-ins or links to unknown websites in the absolute goddess forums. We advise you not to click. Because it is likely to bind a "keyboard generator ".
For the security of your account, please pay attention to these hidden "Black Hands" in the temptation ". We recommend that you download the professional anti-trojan software.

Defense methods:

1. Set "advanced" of "INTERNET Options" of IE to "Restore Default Settings ".

2. Do not install or download some software with unknown experience, especially some so-called goddess plug-ins.

3. Do not open attachments with letters of unknown origins.

4. Install the latest anti-virus software and regularly upgrade the virus database.

5. Be careful when the computer in the internet cafe is installed with software that records keyboard operations, or when Trojans are installed. When using an Internet cafe computer, press ctrl, alt, or del to check whether an unknown program is running. If yes, terminate the task immediately.

6. for Internet users in Internet cafes, it is best to download the LDM Trojan Check Tool (bj.onlinedown.net/soft/11555.htm) from the huajun Software Park on the machine and scan the machine to check whether there is a trojan program.

· Cracking users' account passwords for brute-force password cracking software

This method is mainly to use some brute force password cracking software to try the user's account and password one by one using the brute force method, but the user must have a certain degree of computer knowledge, and the cracking takes a long time.

Defense methods:

1. Avoid exposing game accounts to public forums and other websites.

2. When setting a password, try to make it more complex. It is best to set it to a combination of letters, numbers, and other symbols with an 8-digit length or higher.

3. Do not use the information you can easily obtain as a password. This includes birthday, ID card number, mobile phone number, name of the street in which you live, and so on.

4. Change the password frequently because the combination of letters, numbers, and other symbols with more than 8 digits is not impeccable.

5. Apply for password protection, that is, set a security code. The security code should not be the same as the password. If you do not set a security code,

Once you crack your password, you can modify all your password and registration information (except the document number.

1. Has your computer been installed with a Trojan? How to detect?

1) Check the Registry

See HKEY_LOCAL_MACHINE/SOFTWARE/MicrosoftWindows/Curren Version

And HKEY_CURRENT_USER/Software/MicrosoftWindows/CurrentVersion, all key value names starting with "Run", and there are no suspicious file names.

If yes, you need to delete the corresponding key value and then delete the corresponding application.

2) Check the Startup Group

Trojans hidden in the startup group are not very concealed, but they are indeed a good place to automatically load and run. Therefore, Trojans prefer to reside here. The folder corresponding to the Startup Group is C: windowsstart menuprogramsstartup, and the location in the registry is as follows:

HKEY_CURRENT_USER/Software/MicrosoftWindows/Current Version/assumershell Folders

Startup = "C: windowsstart menuprogramsstartup ". Check these two locations frequently!

3) Win. ini and System. ini are also hidden places for Trojans.

The trojan is also a good place to load Trojans, so pay attention to it. When you see this:

Shelljavaser.exewind0ws.exe. please refer to that wind0ws.exe as a Trojan server program! Check it out.

4) Check C: windowswinstart. bat, C: windowswininit. ini, and Autoexec. bat. Trojans may also be hidden there.

5) if the EXE file is started, run the program to check whether the trojan is loaded into memory and whether the port is opened. If yes, it means either the file starts the trojan program or the file is bound with the trojan program, so you have to find another program and reinstall it.

6) there is a way to start a trojan. It only starts in a specific situation. So pay more attention to your port and check the running program, it should be okay to use this to monitor most Trojans.

2. There are already some specialized Trojan removing software. The powerful Trojan clearing function is bound in the new Skynet firewall. The general principle of the Trojan clearing Mechanism is as follows:

1) detect trojans.

2) Find the trojan Startup File. Generally, the location of the Trojan file can be found in the Registry and files related to system startup.

3) Delete the trojan file and delete information about the trojan in the registry or System Startup File.

However, for some very slippery Trojans, these measures cannot be found out. Now, the trojan detection method is nothing more than network connection and viewing system processes. In fact, some well-skilled Trojan compilers can reasonably hide communications and processes to make it difficult to detect trojans.

3. Trojan prevention tools.

There are many defense Trojan tools. Please install one to improve the security of your computer.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.