• <abbr id="ck0wi"><source id="ck0wi"></source></abbr>
    <li id="ck0wi"></li>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li><button id="ck0wi"><input id="ck0wi"></input></button>
  • <abbr id="ck0wi"></abbr>
  • <li id="ck0wi"><dl id="ck0wi"></dl></li>
  • Home >

    How To Prevent Trojan Horse Intrusion

    2008/7/17 14:53:00 25

    How To Prevent Trojan Horse Intrusion

    In ancient Greek legends, a huge Trojan horse helped the Greeks to defeat the Troy people. "Troy Trojan horse" has become an allusion in the enemy camp.

    What people did not expect is that thousands of years later, the "Troy Trojan horse" would jump out of the legend described in the epic of Homa and invade the computers of modern society.

    This is the Trojan horse.

    A few days ago, Rixing company issued a red level security alarm. Tens of thousands of Trojan horses use the Trojan horse form to attack the user's computer with the latest Flash vulnerabilities every day. More than 3 million computers have been attacked by this kind of virus, and the number of infected computers is still increasing rapidly.

    The virus alerts issued by the National Computer Virus Emergency Response Center and the major anti-virus software companies have revealed the fact that the computer viruses headed by malicious Trojan programs have been pervasive into ordinary users' computers, and some computers and government computers with special maintenance personnel have not been spared, becoming the main chronic diseases that endanger the information security of the state and the public.

    Computer virus malevolent

    Trojan horse program is the biggest hazard

    Miss Liu, editor in chief of a magazine, told reporters that her computer had slowed down for some time, and that it would take dozens of seconds to open a web browser, sometimes even to crash.

    Reporters found on Miss Liu's computer that there were many programs that she did not use to connect to the network and occupy a large amount of computer memory.

    "There was no privacy at all."

    Miss Liu was shocked by the cold sweat.

    "If you do not effectively prevent, do not want to infect a virus unless you stop using software".

    According to the statistical analysis of a rising star company, about 73000000 computers in mainland China were infected by viruses in 2007 and became the "worst hit areas" of computer viruses.

    Computer viruses, including Trojan horses, have become the main way to steal information and cause information leakage.

    Computer viruses are flooding, especially Trojan horses.

    Trojan horse virus is a remote control program. "Hackers" use a computer system and software vulnerabilities to insert a program into a remote computer. They can control the poisoned computer remotely by means of its supporting control program, and check and download the contents of other computers without scrupulously.

    In addition to the previous click email attachments, currently infected U disk, ARP LAN attacks, web page hanging horse has become the main way of Trojan virus pmission.

    Click on QQ, MSN, e-mail, virus sites, browse black websites, will lead to Trojan horse infection.

    "From the monitoring point of view, Trojan horse is one of the biggest hazards of the Internet, and the security department has cracked many cases of stealing information through Trojans.

    We monitored in 2007 that the number of hosts implanted in the mainland was 26 times higher than that in 2006.

    Sun Yumin, senior engineer of the national computer network emergency response technology coordination center, operation and management department.

    More than 20 years since the birth of computer virus, as a deliberately designed software program, its function has changed from traditional "disturbing computer operation, destroying or deleting data, and self replicating and pmitting itself to other computers and the whole Internet" to malware such as Trojan horse that exploits the system and software vulnerabilities, intruding into the target system, recording and stealing information. The attack mode of the computer virus is also different from the "early attack" and "damage data" exposure mode, so that it becomes more "quiet", such as Trojan horse, remotely controlling other computers, stealing data and other information.

    Computer virus manufacturing industrialization

    Forming an illegal interest "industrial chain"

    The computer virus that aims to steal information is in flood. Undoubtedly, the biggest motive behind it is to seek economic benefits.

    Because the two viruses of Trojan horse and back door are aimed at intruding user computers, stealing online game accounts, banks and stock accounts and other information, with direct economic benefits characteristics.

    In the number of virus samples intercepted last year, 84.5% of Trojan horses and backdoor viruses were stolen from users.

    "91% of the viruses we killed last year were Trojans, and perhaps 2% of them were advertising programs, like what was previously called non-profit software."

    An expert in Kabasiji, an antivirus software company, said.

    "The viral drive is further enhanced, and the activities of making and selling viruses and Trojan horses on the Internet are increasingly rampant.

    Fraudulent cyber crime activities show a rapid upward trend, which further shows the new development trend of computer viruses.

    One example of the conclusion of the National Computer Virus Emergency Response Center is the phenomenon of Trojan horse selling online to steal Internet game accounts.

    "Trojan horse is sold or made to be a Trojan horse..."

    To avoid killing, hang horse business please contact QQ...... "

    Reporters at the YAHOO forum saw that this was posted in May last year, and in April this year there was a reply to "ask me how to steal the number".

    In Sina's blog, Baidu post bar and other domestic commercial websites with large domestic visits, posts such as selling, renting, making Trojan horses and undertaking "hanging horse" business can be seen everywhere.

    "These viruses, Trojans and other malware makers are no longer individuals or small groups. Instead, they evolve into a tight division of labor on the network. In pursuit of interests, they form a chain of interests, such as finding loopholes, creating Trojan horses, spreading Trojan horses and stealing information.

    Victims are not limited to individual users, but also to users such as enterprises. "

    Information security expert Li Yuanzheng said.

    The emergence of the "industrialized production" virus has accelerated this trend.

    The use of a shell tool can change the "appearance" of existing viruses, making it impossible to identify anti-virus software.

    Anyone with basic computer knowledge can automatically produce viruses by downloading the shell tools from the Internet.

    This has resulted in a sharp increase in the number of viruses and a faster variety.

    "A skilled virus engineer can analyze 40 to 50 samples per day, and the average virus samples on the network now are 3000 to 4000 per day."

    "If a Trojan horse is used, maybe a pupil will make a Trojan horse.

    The Trojan horse is not strong, but the result of stealing information and passwords is fatal.

    Kabasiji's expert commentary

    • Related reading

    Three Measures To Fill Loopholes In Enterprise System

    Market network
    |
    2008/7/17 14:49:00
    24

    Strengthening Enterprise Management By Software Technology

    Market network
    |
    2008/7/12 14:12:00
    27

    Secret Repair Of Domain Name Omissions

    Market network
    |
    2008/7/12 14:11:00
    41

    Olympic Cybersecurity: China Is Not Afraid Of Hackers.

    Market network
    |
    2008/7/12 14:11:00
    22

    Building XP'S Safety Defense Line

    Market network
    |
    2008/7/12 14:11:00
    31
    Read the next article

    Enterprises Must Do Preparatory Work Before Making Websites.

    Enterprises must do preparatory work before making websites.

    主站蜘蛛池模板: 国产成人黄色小说| 日韩一区二区三区免费视频| 在线亚洲人成电影网站色www| 免费看美女脱衣服| www夜夜操com| 真实国产乱子伦沙发睡午觉| 成人免费无码精品国产电影| 哒哒哒免费视频观看在线www | 国产日韩一区二区三区在线播放| 亚洲国产精品无码久久一线| 2022国产成人精品福利网站 | 成人在线视频一区| 四虎永久精品免费观看| 中文字幕日韩在线| 精品欧美一区二区三区精品久久| 最美情侣中文字幕电影| 国产欧美久久一区二区| 久久电影网午夜鲁丝片免费| 视频二区三区国产情侣在线| 手机福利视频一区二区| 双女车车好快的车车有点污| tstye.cn| 欧美日韩亚洲第一页| 国产熟睡乱子伦视频在线播放| 乳孔被撑开乳孔改造里番| 香蕉久久国产精品免| 成年女人18级毛片毛片免费| 大炕上各取所需| 亚洲综合色婷婷在线观看| 91免费看国产| 欧美aaaaa| 国产乱人激情H在线观看| 东北女人下面痒大叫| 特黄大片aaaaa毛片| 国产精品欧美激情在线播放| 久久精品私人影院免费看| 18禁美女裸体免费网站| 晚上睡不着正能量网址入口| 国产一级做美女做受视频| 一本大道香蕉高清视频视频| 激情综合五月天|