Some practical techniques to effectively prevent Trojan and Backdoor attacks

Source: Internet
Author: User

A Trojan is a very special program, which is different from viruses and malicious code. Trojan horses is highly concealed and you do not know that they are running. However, they produce no less harm than viruses. Once a trojan is installed on your machine, someone on the internet can use it to obtain your password and information. Even some advanced hackers can remotely control your computer. The following describes how to effectively prevent Trojans.

Download Software with caution

Due to the misuse of hacking software, the software provided by many websites on the Internet is more or less mixed with Trojans or viruses. Once the software is downloaded to a hard disk and meets the operating conditions, Trojans and viruses pose a huge threat to the information security of computer systems and users, after all, it is invisible to common users. The only thing that can avoid Trojans and viruses is not necessarily relying on anti-virus software, but on the user's self-made capabilities. If you do not want to access an unknown site, do not log on to the dyeing site, do not download the dial number or hacker site from the above to download seemingly safe software. At the same time, you must enable the firewall during download.

Do not open attachments randomly

Many unfriendly people like to add Trojans to attachments in emails, even mix Trojans with normal files, and then use an attractive email name to seduce innocent netizens to open attachments. In addition, Trojans can also be sent through file transfer between QQ. For this reason, we must be cautious when opening attachments from strangers. If you want to open the file, you can first save the attachment file to the hard disk and scan it with email monitoring or anti-virus before opening it.

Use anti-virus software

The only thing that can control the spread of new Trojans and viruses is to constantly update the virus database in antivirus software. In addition to enabling the protection function of anti-virus software, we can also run some other software, such as Skynet, it can monitor normal data flow between networks and abnormal data flow and send related prompts to users at any time. If we suspect that the machine has been infected with Trojans, we can also download a wooden star from the http://download.zol.com.cn to thoroughly scan the trojan, to protect the security of the system. The main Trojan scan programs include Trojan Defense, Antiy Ghostbusters, Digital Patrol, PestPatrol, Tauscan, TDS-3 Trojan Defense Suite and Trojan Remover, and some are free software, you can use it for free after downloading.

View File Extensions

Most Trojans have extensions such as VBS and PIF. Even some Trojans have no extensions. To use this feature, you only need to open "my computer", select "view → Folder Options", click the "View" tab, and drag the scroll bar down with the mouse, remove the hooks before "hide the extensions of known files" to display the file extensions. When you see files with extensions such as VBS and PIF, be careful.

Editor's note: these are some of the operational habits, but they are quite helpful for us to defend against Trojans. Because a trojan program has a new type every day, a general Trojan program provides an online Update Service so that it can detect trojans in the system in real time.


 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.