Ten strokes to find a hidden Trojan to protect the site security
Source: Internet
Author: User
KeywordsThis lurking very running website security
Initially the network is still in the UNIX platform-oriented period, the Trojan horse, then the function of the Trojan horse is relatively simple, is often a piece of program embedded in the system files, with the jump instructions to carry out the function of some Trojans, the Trojan in this time the designers and users are mostly some technical personnel, Must have considerable network and programming knowledge. &http://www.aliyun.com/zixun/aggregation/37954.html ">nbsp; And then with the increasingly popular Windows platform, some based on the graphics operation of the Trojan, the user interface to improve, so that users do not have to understand too much professional knowledge can be skilled operation of the Trojan, the relative Trojan intrusion event also occurs frequently, and because of this time the function of the Trojan has been increasingly perfect, So the damage to the server is even greater.
So the Trojan has developed to this day, has all the extremes, once by the Trojan control, your computer will have no secrets to say.
Trojan Horse is a remote control of the virus program, the program has a strong concealment and harm, it can be unnoticed in the state of control you or monitor you. Some people say, since the Trojan is so powerful, then I can not be far away from it!
However, this trojan is really "naughty", it can be whether you welcome, as long as it happy, it will try to get into your "home"! Ah, that also got, hurry to see their own computer there is no Trojan, perhaps in the "Home" in trouble! Then how do I know where the Trojan is, I believe that the rookie who are not familiar with the Trojan must want to know such a problem. The following is the trick of the Trojan lurking, after watching do not forget to take the trick to deal with these losses yo!
1, integrated into the program
In fact Trojan is also a server-client program, in order not to allow users to easily delete it, it is often integrated into the program, once the user activates the Trojan, then the Trojan file and an application bundled together, and then uploaded to the server to cover the original file, so even if the trojan was deleted, As long as the application of the bundled Trojan, the Trojan will be installed up. Bound to an application, such as binding to system files, every time Windows startup starts a Trojan.
2, hidden in the configuration file
Trojan is too cunning, know the rookie is usually using the graphical interface of the operating system, for those who have not very important configuration files are mostly indifferent, which just give a trojan to provide a hiding place. And the use of the special role of configuration files, Trojans can easily in everyone's computer run, attack, and thus peeping or watching everyone. However, now this way is not very covert, easy to find, so in Autoexec.bat and Config.sys loaded Trojan horse program is not seen, but also can not be taken lightly oh.
3, lurking in the Win.ini
Trojan Horse to achieve control or monitor the purpose of the computer, must run, however, no one will be silly to their own computer to run the damn Trojan. Of course, the Trojan is also early psychological preparation, know that human is a high IQ of animals, will not help it to work, so it must find a safe and can be in the system start automatically run the place, so lurking in the Win.ini is a Trojan feel more comfortable place. You may wish to open Win.ini to see, in its [Windows] field has the start command "load=" and "run=", in general, "=" after the blank, if there is followed by the program, for example: Run=c:windowsfile.exe load =c:windowsfile.exe
At this time you must be careful, this file.exe is probably a Trojan oh.
4, camouflage in the ordinary document
This method appears late, but it is now very popular, for unskilled windows operators, it is easy to be fooled. The specific method is to disguise the executable file as a picture or text----in the program to change the icon to the Windows default Picture icon, and then change the file name to *.jpg.exe, because the Win98 default setting is "Do not display known file suffix name", the file will be displayed as *.jpg, People who don't pay attention to this icon is a Trojan horse (if you embed a picture in the program is more perfect).
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.