5-way peek
1. When you enter your account, you are not aware of the background. someone secretly writes down your account.
2. You are surfing the Internet in an Internet cafe, and there is a record after accessing the internet. Someone uses a decryption tool to interpret your password.
3. You went to repair the computer. The number on the computer was recorded by the computer maintainer.
4. Beauty or male design. With a sweet voice, a netizen asks you to lend your top account to her (him) for fun, and then your equipment is easy to use.
5. Disguise as an official service personnel and require collecting gamer information to defraud accounts and passwords.
Five Trojans
1. Install it directly. In some Internet cafes that do not have a formal business license, hackers seek to install trojans directly on their machines.
Ii. bundling with popular software. For example, if you are bound to some programs that are frequently downloaded and used, such as input methods, QQ programs, and online game plug-ins, Trojans are also installed on the machine when you download and install these programs.
3. embed malicious web pages. Some well-intentioned testers embed trojans on the webpage, designed to steal the victim's account and password.
4. Email transmission.
5. Search for open ports or system vulnerabilities through remote scanning, and then remotely intrude into and steal accounts or install trojans.