How To Prevent Trojan Horse Intrusion
In ancient Greek legends, a huge Trojan horse helped the Greeks to defeat the Troy people. "Troy Trojan horse" has become an allusion in the enemy camp.
What people did not expect is that thousands of years later, the "Troy Trojan horse" would jump out of the legend described in the epic of Homa and invade the computers of modern society.
This is the Trojan horse.
A few days ago, Rixing company issued a red level security alarm. Tens of thousands of Trojan horses use the Trojan horse form to attack the user's computer with the latest Flash vulnerabilities every day. More than 3 million computers have been attacked by this kind of virus, and the number of infected computers is still increasing rapidly.
The virus alerts issued by the National Computer Virus Emergency Response Center and the major anti-virus software companies have revealed the fact that the computer viruses headed by malicious Trojan programs have been pervasive into ordinary users' computers, and some computers and government computers with special maintenance personnel have not been spared, becoming the main chronic diseases that endanger the information security of the state and the public.
Computer virus malevolent
Trojan horse program is the biggest hazard
Miss Liu, editor in chief of a magazine, told reporters that her computer had slowed down for some time, and that it would take dozens of seconds to open a web browser, sometimes even to crash.
Reporters found on Miss Liu's computer that there were many programs that she did not use to connect to the network and occupy a large amount of computer memory.
"There was no privacy at all."
Miss Liu was shocked by the cold sweat.
"If you do not effectively prevent, do not want to infect a virus unless you stop using software".
According to the statistical analysis of a rising star company, about 73000000 computers in mainland China were infected by viruses in 2007 and became the "worst hit areas" of computer viruses.
Computer viruses, including Trojan horses, have become the main way to steal information and cause information leakage.
Computer viruses are flooding, especially Trojan horses.
Trojan horse virus is a remote control program. "Hackers" use a computer system and software vulnerabilities to insert a program into a remote computer. They can control the poisoned computer remotely by means of its supporting control program, and check and download the contents of other computers without scrupulously.
In addition to the previous click email attachments, currently infected U disk, ARP LAN attacks, web page hanging horse has become the main way of Trojan virus pmission.
Click on QQ, MSN, e-mail, virus sites, browse black websites, will lead to Trojan horse infection.
"From the monitoring point of view, Trojan horse is one of the biggest hazards of the Internet, and the security department has cracked many cases of stealing information through Trojans.
We monitored in 2007 that the number of hosts implanted in the mainland was 26 times higher than that in 2006.
Sun Yumin, senior engineer of the national computer network emergency response technology coordination center, operation and management department.
More than 20 years since the birth of computer virus, as a deliberately designed software program, its function has changed from traditional "disturbing computer operation, destroying or deleting data, and self replicating and pmitting itself to other computers and the whole Internet" to malware such as Trojan horse that exploits the system and software vulnerabilities, intruding into the target system, recording and stealing information. The attack mode of the computer virus is also different from the "early attack" and "damage data" exposure mode, so that it becomes more "quiet", such as Trojan horse, remotely controlling other computers, stealing data and other information.
Computer virus manufacturing industrialization
Forming an illegal interest "industrial chain"
The computer virus that aims to steal information is in flood. Undoubtedly, the biggest motive behind it is to seek economic benefits.
Because the two viruses of Trojan horse and back door are aimed at intruding user computers, stealing online game accounts, banks and stock accounts and other information, with direct economic benefits characteristics.
In the number of virus samples intercepted last year, 84.5% of Trojan horses and backdoor viruses were stolen from users.
"91% of the viruses we killed last year were Trojans, and perhaps 2% of them were advertising programs, like what was previously called non-profit software."
An expert in Kabasiji, an antivirus software company, said.
"The viral drive is further enhanced, and the activities of making and selling viruses and Trojan horses on the Internet are increasingly rampant.
Fraudulent cyber crime activities show a rapid upward trend, which further shows the new development trend of computer viruses.
One example of the conclusion of the National Computer Virus Emergency Response Center is the phenomenon of Trojan horse selling online to steal Internet game accounts.
"Trojan horse is sold or made to be a Trojan horse..."
To avoid killing, hang horse business please contact QQ...... "
Reporters at the YAHOO forum saw that this was posted in May last year, and in April this year there was a reply to "ask me how to steal the number".
In Sina's blog, Baidu post bar and other domestic commercial websites with large domestic visits, posts such as selling, renting, making Trojan horses and undertaking "hanging horse" business can be seen everywhere.
"These viruses, Trojans and other malware makers are no longer individuals or small groups. Instead, they evolve into a tight division of labor on the network. In pursuit of interests, they form a chain of interests, such as finding loopholes, creating Trojan horses, spreading Trojan horses and stealing information.
Victims are not limited to individual users, but also to users such as enterprises. "
Information security expert Li Yuanzheng said.
The emergence of the "industrialized production" virus has accelerated this trend.
The use of a shell tool can change the "appearance" of existing viruses, making it impossible to identify anti-virus software.
Anyone with basic computer knowledge can automatically produce viruses by downloading the shell tools from the Internet.
This has resulted in a sharp increase in the number of viruses and a faster variety.
"A skilled virus engineer can analyze 40 to 50 samples per day, and the average virus samples on the network now are 3000 to 4000 per day."
"If a Trojan horse is used, maybe a pupil will make a Trojan horse.
The Trojan horse is not strong, but the result of stealing information and passwords is fatal.
Kabasiji's expert commentary
- Related reading
- Fashion shoes | Nike By You X Pendleton Cooperation Customized Shoes Series, Create Autumn And Winter Exclusive
- Fashion shoes | Adidas AM4 Mysterious Wave "Cryptic Waves" Color Shoes At The End Of The Month.
- Fashion brand | TNF (North) Feeder Urban Exploration New "Nuptse" Winter Series Released
- Company news | Shenzhen Textile A Released 2019 First Three Quarters Earnings Forecast, Earnings Increased 44.81% Over The Same Period Last Year
- Company news | Huamao Shares Released The First Three Quarters Of 2019 Performance Notice, Textile Business Steadily Picked Up
- Fashion shoes | Air Force 1 N7 Brown Yellow Color Shoes Released, Blue Bottom Mosaic Texture Dress Up
- Fashion shoes | Yellow Snake Air Force 1 Shoes Surprise Surprise, Very Wild Visual Effects
- Fashion shoes | Nike Daybreak Girls Exclusive Pink And Blue White Color Shoes Exposure, Sweet Style
- Fashion brand | Palace Skateboards Winter Series Third Weeks Brand New Products Will Be On Sale Soon.
- Fashion shoes | Adidas Ultraboost 19 Shoes Brand New "DB99" Theme Color Will Soon Be On The Shelves.
- Three Measures To Fill Loopholes In Enterprise System
- Successful Agents Make Money For Every Brand.
- Brand Agent: Making Money With "Bringing Ism"
- How Do Agents Manage Outdoor Stores?
- Everyone Commented On Finding A Shopping Mall And Acting As An Agent.
- When An Agent Or Franchisee Is Found,
- How Do Agents Choose Brand Agents?
- The Secret Of Making Money By Semir Brand Clothing Agents
- Karen Walker Brand Beautiful Ladies Skirt
- DKNY Fashion Show