The following article is mainly to introduce security tips without the aid of tools to manually separate bundled back door, in the actual operation in order not to allow users every day "depressed" to use backdoor software, the author recommends a manual separation of the backdoor method, to help the novice to remove the software in the "Black Hand." The forest big birds have, in the network virtual world, unexpectedly someone will software loaded back door, to get more chickens for remote control. Although the host of the installation of protective software, such as Skynet, 360 security guards and other defensive measures, can effectively prevent the back door to start, but at the same time it will be the normal software interception. In order not to allow users to "bite the bullet" to use the backdoor software, I hereby dedicate a set of manual separation back door method to help the novice to remove the software in the "Black Hand." First, when the bad guys imitate the malicious people bundle operation we imitate a malicious person bundled back door, here opens the "Southern Sword Union" tool, the normal software and Trojan horse program, loaded into the binding of the first file and the second file text, and then specify the build bundle of files, and also choose to run the software released to the directory. After the operation is complete, in order for the bundled file icon to be the same as the normal software icon, click the "Extract Icon" button, in the pop-up "Select Icon" dialog box, specify the bundled normal software, and finally click the "Start Bundle" button, you can complete the malicious bundle of normal software. Second, manual separation of bundled back door bundle has been completed, if you want to be bundled back door and normal software separation, please run the bundled target software, so the bundled program will be released into the system. However, because the system by default is unable to find files that hide properties, so open a folder here, click the tools → folder Options menu, and in the Pop-up Folder Options dialog box, cut to the "View" tab, select the "Show All Files and folders" Radio box, and click OK button, you can view the files that hide the properties. Since before the author in the bundle backdoor settings, choose to run the software released into the Temp directory, so here we have to enter the "C:\Documents and Settings\Administrator\Local Settings\Temp", from which you will find that there are more than two files, and these two files are bundled with the release of the Trojan server, and the normal software program (Figure 3), if you want to safely use its software, as long as the separation of the normal software to run it. 498) this.width=498 ' OnMouseWheel = ' javascript:return big (This) ' style= ' width:400px; height:338px "height=" 338 "alt=" Security tips: no need to manually separate bundled back door "width=" srcwidth= "" srcheight= "338" zoomrate= "1" src= " Http://images.51cto.com/files/uploadimg/20100917/1629240.jpg "/> The above related content is the security tip: without the aid of tools to manually separate the bundle back door description, Hope will bring you some help in this regard. "Responsible editor: Sun Chaohua TEL: (010) 68476606" Original: No need to use tools to manually separate bundled back door tips back to network security home
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.