Attitude to rogue software eat coated to hit back (1)

Source: Internet
Author: User
Keywords Rising Jiangmin Rogue software my123 kv2007 7939.com
November 14, rising officially launched the "Rising card card Internet Security Assistant 3.0" to the industry to provide free of charge can thoroughly eliminate the current popular more than 400 kinds of rogue software, and network terminal system to strengthen and immune system. 24 hours later, rising and announced that some of the rogue software began to take more bad behavior to avoid the "rising card 3.0" of the Killing, one named "my123" rogue software has completely become a vicious virus, and crazy to make a variant of the virus to escape the "rising Card 3.0" to kill. According to rising judge, the rogue software already has virus characteristics, so released the first kill order, rapid upgrade rising card free kill tool Library, to the whole society to distribute "my123" free kill tools. Yesterday (16th), following the "my123" rogue software, a user homepage modified to "7939.com" rogue software by the rising Kaka's kill. The rogue software is transmitted by infecting the executable files on the computer, and the communication ability is very strong and many users are affected. For the Rogue Software (virus), rising released the second kill order, rapid upgrade rising card free kill tool Library, to the whole society issued "7939" free kill tools. In fact, not only rising, other security companies have to "rogue software" declared war. Jiangmin Technology announced on September 21 in the new KV2007 to increase the rogue software removal function. November 15, also announced from now on the "old user ex-gratia upgrade storm" activities to 49 yuan preferential prices to the country suffers from rogue software and virus jiangmin anti-virus software for the old users of the latest KV2007 upgrade version. The industry's so-called "rogue" software is more closely related to shareware. Sharing software, rogue software, and virus differences are only between the line. Shareware is to allow people to use a certain practical function of the software; Rogue software to share the software bit carrier, in the installation of people do not know the state, the installation of some plug-ins to obtain benefits; Some shareware included plug-ins that are malicious and may degenerate into viruses. Rogue software--shells in such a vigorous destroy the "rogue" software, I do not know why, in the author's mind suddenly out of the word "coated". Said it for shells, rogue software does have a certain lethality, in the installation of people do not know the situation is likely to occupy a certain system resources; but it has the function is really other people need. "Coated", this is the famous analogy created by Mao Zedong, with a bright military color and heavy sense of hardship. Before the Communist Party of China came to power in March 1949, Mao Zedong held a seven-session meeting of the Chinese Communist Party at the West Cypress slope to remind and warn the comrades of the party to keep a clear mind after victory. In the early 80, began to popular with ridicule from the argument: "The Sugar lick (eat), the shells back." "Today, in the Battle of Cannon-bang rogue software, we are all negative, or should objectively look at the enemy, the icing to eat?" Just recently, the largest personal financial information robbery in the United States has so far been, and this incident is the "rogue software" to the Ghost. The source of this is a credit card data processing center of the computer network has been hacked, 40 million credit card accounts and effective dates and other information stolen, the means of theft is in the credit card information center of the computer system embedded a "rogue software", with Trojan download program. In addition, credit card information for the three major credit card issuers, VISA, American Express and discover, has been partially stolen. During the period of 2000-2003, if you use vulnerability scanning software, you will easily find more than 100 vulnerable hosts in a very short time. And in the continuous development of network security technology today, a variety of security equipment and measures to enable the majority of personal computers to achieve a certain level of security, but why security intrusion or frequent, repeated "artillery shells" bombing? For domestic users, Trojanspy.banker (ICBC fishing trojan) virus let us again mention Trojan and rogue software bundle consequences. It has now begun to be embedded in IE or other Internet-assisted software by the Trojan virus that steals internet banking passwords, after modifying the registry startup key, the plugin monitors the Web page that IE is visiting, and if it finds that the user has entered an account number, password, and submitted it in some online bank login pages, Will pop up fake ie windows, inducing consumers to be cheated. The general user runs this "plugin" without any wariness, which eventually leads to the exposure of personal property information. In addition, in the rounds of artillery bombardment, we also have a common phenomenon: "Just to colleagues of the computer reinstall the operating system, 2 days later, the system to the edge of the crash;" This thought the anti-virus software can create miraculous, unexpected is in the anti-virus after the whole system can not start. "The culprit is also" rogue software ", all kinds of indications: the power of shells is amazing! Rogue Software--icing "in the face of all kinds of rogue software, in the Battle of Cannon-bang rogue software, we are all negative, or should objectively look at the enemy, the icing eat?" "My comments have been criticized by a lot of people, but I have to say that the reason is very simple: parents seriously warned me to uninstall the" 3721 "computer on the home. Yahoo China has two software listings this time, that is, "3721" and "One Search" toolbar, of which 3721 also topped the list, so the crackdown on rogue software in Yahoo China reacted most strongly. In all fairness, "3721 Internet Assistant" is I and many network management personnel must be installed tools, it is mainly for malicious code, network ads and malicious plug-ins of these three categories of internet "pest", not only can repair ie, clean up the use of traces, as well as advertising interception, security protection and plug-in management functions, Can meet the needs of ordinary users to the Internet without harassment, the software is also very easy to operate, so that some people who are not familiar with the computer can be easily used free of charge. In fact, many novice Internet users are very dependent on Internet assistants andThink it is a very useful tool. Around me, colleagues and family members over 45 years old use Chinese search software, and "3721" has reached more than 70% of our small circle. However, even if we eat "sugar", aftertaste is sweet? The answer is no, the taste is bitter. I suddenly found that rogue software is really terrible, inadvertently they have cultivated the use of netizens, and this is a lot of IT industry experts after years of research topics. The reason for analysis, in fact, is very simple: Although the rogue software can not be unloading, it is annoying, although pop-up ads to make people angry, although they make the system more and more slow, let people helpless, but some of the function is practical and free, which is why many people "eat sugar, the shells back" reason. 1 2 Next page >> content navigation to force (0 votes) (0 Votes) nonsense (0 Votes) Professional (0 Votes) The title party (0 Votes) passing (0 Votes) Text: The attitude of rogue software to eat coated dozen back (1) Back to the network security home
Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.