The specific methods are as follows:
1, integrated into the program
In fact Trojan is also a server-client program, in order not to allow users to easily delete it, it is often integrated into the program, once the user activates the Trojan, then the Trojan file and an application bundled together, and then uploaded to the server to cover the original file, so even if the trojan was deleted, As long as the application bundled with the Trojan, the Trojan will be installed up. Bound to an application, such as binding to a system file, every time Windows startup starts a Trojan.
2, hidden in the configuration file
Trojan is too cunning, know the rookie is usually using the graphical interface of the operating system, for those who have not very important configuration files are mostly indifferent, which just give a trojan to provide a hiding place. And the use of the special role of configuration files, Trojans can easily in everyone's computer run, attack, and thus peeping or watching everyone. However, now this way is not very covert, easy to find, so in Autoexec.bat and Config.sys loaded Trojan horse program is not seen, but also can not be taken lightly oh.
3, lurking in the Win.ini
Trojan Horse to achieve control or monitor the purpose of the computer, must run, however, no one will be silly to their own computer to run the damn Trojan. It must find a safe and can be in the system to start automatically run the place, so lurking in the Win.ini is a Trojan feel more comfortable place.
Solution: You may wish to open Win.ini to see, in its [Windows] field has the start command "load=" and "run=", in general, "=" after the blank, if there is followed by the program, for example: run=c: Windowsfile.exe Load=c:windowsfile.exe
4, camouflage in the ordinary document
For unskilled windows operators, it's easy to get fooled.
Workaround: The executable file disguised as a picture or text----in the program to change the icon to the Windows default Picture icon, and then change the file name to *.jpg.exe, because the Win98 default setting is "Do not display known file suffix name", the file will be displayed as *.jpg, Don't pay attention to the person point this icon on the Trojan.
5, built into the registry
Due to the complexity of the registry, Trojans often like to hide in here merry, quickly check, what procedures in its next, open eyes carefully look, do not let the Trojan Oh:
Hkey_local_machinesoftwaremicrosoftwindowscurrentversion all the key values that begin with "run";
Hkey_current_usersoftwaremicrosoftwindowscurrentversion all the key values that begin with "run";
Hkey-users. Defaultsoftwaremicrosoftwindowscurrentversion all the key values that begin with "run".
According to the above five methods of operation Win7 System can find hidden Trojan virus, protect system computer security.