Take the initiative! Trojan defense masters are indispensable

Source: Internet
Author: User
Tags virus scan

Friends who are playing black know that any Trojan horse in the hands of a hacker who only uses tools may become a new Trojan by shelling, making anti-virus software powerless! Various deformation Trojans, unknown viruses, spyware, advertising software, and rogue software on the network ...... There are countless, and common antivirus software only passively upgrades the virus library to scan for known viruses, which always lags behind various Trojans. But today we will introduce this "Trojan defense master", so that you can take the initiative to attack and scan and kill the trojan protection system. You will feel very good at understanding the initiative!

  I. Installation

Trojan defense master V2006 build 060405 is a professional virus detection and removal tool that can clean up tens of thousands of popular Trojans and viruses, advertising software and spyware in China and internationally, it can also scan and kill system DLL Trojans and system service-type Trojans. Built-in System Protection master InterScan function. kernel-level protection technology can be used to prevent any modifications to the system by Trojans, malicious web pages, malicious programs, worms, and bundled plug-ins; unknown virus Behavior Monitoring Technology alerts for risky operations, allowing us to access the Internet without worry.

After installing the trojan defense master, several functional modules are attached. on the desktop, "perfect firewall", "Perfect InterScan", and "Computer health check" are displayed.

  2. Clean the system to easily detect viruses

After the installation is complete, perform the first virus scan and double-click "Trojan defense master" on the desktop. On the program running interface, you can click the shortcut button to check the memory and sensitive areas of the network (1 ). Select the scan path in the directory on the right and click scan hard disk to scan for viruses in the system. The default scan method is very slow. Therefore, before scanning, you are advised to click the "function options" button to open the Setting dialog box, and select "use the latest virus database for lightning detection ", the scanning speed will be much faster (2 ).

TIPS: The Trojan defense master is characterized by active defense against viruses. Therefore, the passive scan and removal functions are not the strongest, however, this function can still be used to find advertising software and rogue software that scan for antivirus software that cannot be killed.

  3. Active Defense to ensure security

The most powerful defense function of the Trojan defense master is its real-time monitoring and protection function, which adopts kernel-level protection technology, we can prevent any unknown bundle plug-ins, Trojan viruses, advertising software, and spyware from modifying our system. Because of the underlying protection of the system, no trojans or malware can penetrate. To enable this function, you only need to click the "Real-time Monitoring" button on the interface.

In the real-time monitoring interface, if the "system protection" and "Real-time Monitoring" functions are not enabled, the above two buttons will be displayed in gray, Green indicates that the function is successfully enabled (3 ). In "Intelligent Protection", you can set the program process behavior to monitor whether a trojan is running or monitor the process and service. In addition, select "IE vulnerability protection, it can effectively prevent most web Trojan attacks by using the IE vulnerability.

The "real-time monitoring" function scans processes and accessed files in the system in real time to determine whether the behavior is a trojan or a backdoor. We mainly look at the "System Protection" function, which is very useful.

Precaution 1: IE will never worry

Attackers can access malicious websites, run rogue software, and tamper with their computers ......, May cause your IE browser settings to be modified. How to Protect IE is very annoying. It is better to take the initiative to defend against future recovery.

Click the "advanced" button on the real-time monitoring interface to open the system protection advanced settings drop-down menu. In the protection options list of the intermediate window, check several protection options related to IE to enable the IE protection function (4 ). The protected IE projects include IE settings and IE control options. They can also prevent 3721, Baidu souba, and other rogue software from adding right-click menus and tool bars to IE.

Here we will test the IE homepage protection function. After the "Baidu" page is opened, click the "set Baidu as the homepage" button, and IE will prompt you to change the homepage. After confirmation, re-open IE, it is found that the change has not taken effect. You can also manually click the IE menu command to open the IE option setting box and manually change the homepage. You will find that the trojan defense master quietly protects IE in the background. I don't have to worry about harassment of IE anymore!

  Precaution 2: prevent common unknown Trojans

Trojan defense masters guard against unknown Trojans by means of process behaviors. If an unknown Trojan enters the system, it must add startup projects and modify file associations in the registry. In the advanced settings box, select the "Run/RunOnce/RunOnceEx/RunService" option to "Protect the system startup project from modification. After clicking "application", no trojans or programs can change these registry items. Click the "log" button next to it to view the intercepted Registry Modification Operation Records (5 ). In addition, in the protection project list, select the file association protection option to enable the TXT and EXE files and extended menus to prevent trojans from being started by modifying file associations.

There are several kernel-type Trojan rules in the protection project list. These rules are the basis for the trojan defense master to determine whether a process's behavior is valid. Therefore, you must check and enable them. In this way, we can comprehensively protect the system and prevent normal trojans from entering the computer!

Defense 3: prevent powerful Trojans

Some Trojans are powerful, such as DLL injection Trojans and Rootkit Trojans. These Trojans must be first started by the system. Therefore, you must enable the "protect initial login data" item to prevent trojans from being started in advance (6 ). A dll Trojan is usually replaced by a system DLL file in Windows or embedded in a Windows Shell, therefore, you can enable "protect Windows shell program", "protect Windows initial DLL", and "protect Windows extended shell object" protection projects. The Rootkit Trojan must be called through the HOOK to enter the system and hide it. Therefore, you can enable the function of "protecting the system's HOOK area" to protect the project.

I tested the shell-mounted remote control Trojan on my computer. I can find that this DLL injection Trojan is used by the trojan defense master, intercepted by behavior judgment and real-time file monitoring (7 )! The various anti-virus software I trust has no response!

Note: after various protection functions are enabled, some normal software programs may not be properly installed because the registry and system files cannot be modified. In this case, the protection function can be temporarily disabled.

In addition, the "Computer health check" function module of the Trojan defense master can check the possibility of various unknown Trojan backdoors in the system through the file threat level; the perfect firewall provides a powerful and practical firewall (8 ). -- Let's enable the trojan defense master to protect our system at any time, so we can truly achieve no horse in the world, no poison in the world, no hooligans in the world !!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.