Wednesday, February 23, 2011

All the most detailed history of the most asked hacking on the phenomenon of

 First of all ask you a few questions, we condemnation to see if the situation on you.
1, how many computers are not equipped with anti-virus software, firewalls, or how many people have installed and used correctly; < br> 2, how many people asked in the play was in full swing when the QQ chat;
3, how many people have installed the system when using a tomato garden and a series of so-called computer company dedicated system disk;
4 , how many people do not care every day's an endless stream of Microsoft patches;
5, how many people can not stand the temptation to go PLMM video or photos;
6, the number of people at home, no computer No password or password complexity;
7, how many home computer is on GUEST account and log in using non-Administrator account login, despite setting a password, but the highest authority of the Administrator account but no password (please find out What these words mean);
8, the number of people online in the company or agency, have a hardware firewall will not do any preventive measures;
9, the number of people using the plug-in;
10, there How many people are in a very insecure Internet cafes;
11, how many people will see some unsafe sites (pornography, violence, etc.);
12, how many people like to readily link to some unknown point;
13, a small number of people like to seek cheaper, I believe in the path or the stranger asked to see the unofficial news site;
14, how many people see other people hacking jealous, go online to search for your download Trojan The following detailed talks. Speaking of hacking, you can not talk about hacking QQ. I would like to ask the number of stolen hang QQ, certainly far more than the number of stolen numbers game. For most Internet users, QQ hacking may is their first contact with the hacking phenomenon. early steal No. Q There are two main methods.
one kind of Trojan horse is a local machine. This is a very common method, and is very simple, as long as you can have a QQ (or asked) Trojan on the line, this software can be everywhere, high number of random sites where hackers can find a small, and its working principle is very simple, first of all it has the record, type it password can be automatically recorded, when the Trojans were (asked) it begins to record keyboard input, and some will first pop up a Trojan disguised as windows and QQ landing window, waiting for you to numbers, passwords are entered after the point of identification, it will prompt for password is not correct, then pop off the real the login box, regardless of which method is more, this time your QQ number + password has been sent to the mailbox of the person hacking. (asked where this phenomenon does not appear, because the two different data authentication here talk about). In this way those who generally require hacking to steal objects have access to a computer, for online games is, under normal circumstances is not realistic, but also do not have much practical value.
II is a kind of Trojan horse remote machine. principle is the same way and the only difference is that hacking does not need access to a computer to steal objects, a way to transfer files through the Trojan plant.
understand the principle, the theft of method is very simple.
early hacking tool also exhaustive software is non-stop combination of data from 1 until test the true password. This tool is the least practical value, but the password is simple for those who , that was very dangerous.
the first category above, can be attributed to the keylogger to steal. Simply put, is to use the Trojan records the action under your keyboard, record account number and password. Therefore, for this of the most common way of hacking, Guangyu developed a soft keyboard. you will be prompted to log in and use the soft keyboard input is more secure, they consider that is the problem. with the software disk, Trojans can not record the keyboard stuff. So, you Guangyu in the security aspects can not say no substantive action, they really made some improvements.
problem is getting a soft keyboard on the end of the story begin? completely wrong. even said that the blunt point, this only However, self-deceiving, became deaf ears m display a.
asked about what the soft keyboard works: the user asks for a password when you log in, you can use the mouse to click the soft key on the keyboard to enter a password, but each times asked to open the login window, the soft keys on the keyboard are random changes to ensure that the password is not keylogging Trojan to steal. and the preparation of the Trojan hackers took advantage of some of the user's habits and inertia Psychology: asked that the landing window with a soft keyboard, by mouse clicks you can enter the password to the password security is not guaranteed to be stolen. In fact, the Trojan has been asked to consider the soft keyboard to use password-protected security measures The Trojan is activated, the soft keyboard window, trying to intercept a text message sent to the soft keyboard input for user account information to break through the soft keyboard password protection technology. In fact, more and more specialized Daohao who have abandoned the traditional way to record keyboard, and not very effective with the current measures to prevent a memory recorder mode.
I try to use simple language to understand about the problem. memory, is one speaking from the hardware section, but from the role in terms of computer storage is an important space for all temporary files. Some people think I do anything on their computer, read what the point of what, I shut the machine no one will know, the actual Not so on. you point a mouse, press the keyboard, open a file, all the actions of all the memory in the computer or have a record. know who will be able to find the machine code to open the computer record. Of course, do not know the person in front of you computer is heavenly. memory to record all of the memory can record changes in this sense, whether you enter the password point do not point the keyboard is no different. As long as you entered, even with the stylus, Trojan will also be recorded to capture the action of memory to be stolen. Even so, landing, or recommend the use of soft keyboard, even if the possibility of reduction of 1% of the stolen Ye Hao.
Some people say to not say no up against the law?
So, let us talk about the other security measures Guangyu: Password security card. a secret security card, in accordance with the idea Guangyu, the account is to add a safety lock, the randomly generated password Even those who master the features that make hacking your account and password can not log in without the state card. This is a good starting point, but also a lot of games now common security methods. But how effective is it? asked the brothers, you Is there no one with the secret state security card stolen you?
single case is: absolutely ... with the soft keyboard, like a thankless task Guangyu again. No card we usually also pay attention to points With the card, not a lot of people wary of that card on me, is absolutely safe. This is completely wrong. talked about this, we talk about the other famous hacker software: gray pigeons.
simple terms , gray pigeon to remotely control a computer program, strictly speaking, can be regarded as a kind of Trojan horse in the. Many people may have used remote assistance on QQ, the information sent to assist other party has accepted to enter the other side after desktop, control the other computer. the principle of gray pigeons here do not speak, only that he also played the role of such a remote control, of course, this is not require your consent. here Incidentally, Microsoft from the WINDOWS XP, system integration of the what to do. If your computer does not have the password or the password is simple, you can imagine what will happen. Do not say you are at home, how others will know where you are? Do not ask this naive question, I told you to slow time slow talks. Therefore, unless really necessary, turn off the remote desktop service. As to how relations, this is not a computer school, interested to me talk about that later.
back gray pigeons. how hacking? The fact is not hacking, but Pirates of the equipment, the other does not need your account password, account password is up to you to visit. that a simple point of it, this is the official website of a typical example. Add your first friend that you want to buy good equipment, so that no one place you go to him. you get to that found themselves without their own computer control. the other side of your equipment thrown on the ground, then pick away. Of course, this situation provided that your equipment is not locked, or to identify the main. Do not think that no such person, such person may not unusual, especially with the protection of people is a lot of cards, so you are not under any circumstances relaxed vigilance can be locked as locked in the short term is not prepared to sell the main things that must be recognized.
talked about this, and take out a topic: storage lock.
This is the 3rd largest Guangyu security measures, has long been equivalent to a Level 2 password. one to say this, but also the old saying: the heart is good, the effect is minimal. Some people think that once this protection is a big leap, to maximize the protection of the warehouse security. even number stolen, the player can come back to find something with warehouse comeback. But the truth is not so good imagination. seen I said above that, you dare to have this much confidence in the protection layer 2 it? However, the principle of stealing the inner code and the above mentioned is slightly different. specific principle I do not remember, long time no contact with this. But one thing you know, you need to steal the password to the inner open. That is the other side even if you already know the account and password, he will not wash number, so you only under the condition without knowing the correct password to open the warehouse, he can succeed. Of course, for you to know stresses do not have any meaning. Since they do not know is stolen, there is how can I make an effective defense?
Much has been said above, the method is also a wide range, but the premise is the same: to your computer a Trojan and connected to the network. Here's to specifically talk about the Trojans, so that we have a clearer understanding.
all the Trojans, are to exe at the end. QQ, or other contact so, upload to the exe files with the end of all please be careful. generally after the Trojans are not reflected in the double-click. But some people will use exe files exe files combiner will combine `` so that you run, you can run a program other and not to make their Trojan was found. there are those who will use the more popular the previous year to run winrar extracting exe files tied to a fixed directory, this is not to say this. In short, you are all accepted exe file to have to be careful! It is worth mentioning that many people would say you see his picture in the online `such is www .****. com / tupian.htm this web site, the general When you go, there is indeed seen pictures, but please be careful on those pages to see the pictures mostly jpg, gif.jpeg, such as the image format at the end of the URL, because this is the most popular in recent years I have seen is also the most vulnerable people in the network the way a horse ..
Some people have said, I installed antivirus software, each receiving a first anti-virus stuff automatically. I say, not so naive, anti-virus software So everything the world will have peace. now faster than a variant of trojan update anti-virus software is faster, otherwise there will not be so many people to play cat and big David Panda burning incense games.
Finally, a simple talk again Some protective measures it, the role of limited, but 1% can reduce the theft may be good.
First of all, anti-virus software and firewall, or want.
course, this is the computer for the purposes of their own. In recent years, Gradually a large number of anti-virus software coming to the fore. In the past, many families find spending hundred dollars to buy anti-virus software is too extravagant, but now the whole world as more and more attention to security issues, and more ordinary families are genuine anti-virus installed software. on the Rising, the price of 298, the real price of shipping around 130, with the market fluctuate, but also in the so. I am not advertising to the Rising can only say that I am using it all these years feel good.
you will not believe this day and age there is a free lunch, if you really account for their own safety, to stop eating dead chickens and other things for free Kabbah. That thing is really a lot of problems. For example, Trojan -PSW.Win32.Delf.eve Kabbah this trojan is specifically made loopholes in the dead chickens, it will modify the computer's system time, so that dead chicken anti-virus software failure Kabbah.
problems on antivirus software, I still have a specialized in the following description, in the hope that we can be helpful.
Second, the Internet cafes friends, please be careful.
you will say, Internet bars installed recovery card, all right. However, reduction card can only restore the system disk the contents of the data on other disks can not control. Yes, he was able to restart after installing all the programs previously cleared, but you think about it, sometimes even into the memory of the Trojans reload systems can not be deleted, you expect him to restore a 40 dollar card capable of performing the arduous mission clearly Trojans?? think of was dead pixels, some Internet cafes probably hacking the industry itself is a part of the chain, something which not easy to say.
Third, do not use a secret because of security card to the effect, locking the locking of the game, identify the main Lord of the recognition.
Fourth, the fact is most important. concentrate on playing your game.
do all day and parents unknown PLMM East, the West family of short, give you a video or photos you're elated, and by that time your number will be enough. In short sentence if any did not know you from QQ, pass over the things you do not take. the game was about to add you QQ get too excited.
Fifth, do not be silly people pull eight school ridiculed hacking.
hacking is not under MP3, search online under the Trojan download, you can search a lot. Do you think people can learn hacking down under friends?? you really sell the hacking as a cabbage ah? Some people take advantage of other people ready to do some net horse tool to generate web pages Trojans. as long as you visit his website, in fact, is the same horse in his net, the net horse is popular for the latest vulnerabilities do percent. Internet search to provide the so-called Trojan download site, I'm sure at least one half of the page itself implanted Trojan horses, waiting for people who dream of overnight riches the players learn to walk into the door. not so number of others you get your number has been flying out.
In fact, here is to remind you not to go to bad sites, including the so-called Trojan download site, sex and violence stops and so on. Of course, the Internet is not only these sites the existence of malicious code analysis from international experts, the current Ninety per cent of commercial websites are there different levels of background holes. NetEase is nothing less than formal, right? but before the pick up children is linked to the horse Netease event created a hubbub. If you are at the wrong time just in the wrong place, and it had to recognize inverted luck.
Sixth, the two need to pay particular attention to the process: expolrer.exe and spoolsv.exe.
Most of these two processes is the process of the computer must be running (spoolsv.exe process is related to the printer, if not related to the operation of the printer about to end). This two processes are the most likely to be implanted Trojan horses, and the specific In most cases the performance of the system to boot into the load time after a particularly long (about 1 minute or so back to normal). Do not think that there is no harm to normal. This situation is obvious, but not simple to solve (spoolsv.exe can be turned off, but expolrer.exe not). the general anti-virus software in most cases can not solve this problem (in the author's experience, this virus is not a solution for). Again, this is not the school computer, the computer professional After more talk about things. In the past, such a Trojan horse typically does not affect the user's account, its role is to affect the system rather than hacking. However, recently, the emergence of a new Trojan Trojan / PSW.Moshou.aql . This is the file name from the 10 random characters. Modify the registry, trojans automatically start running. player's game account, the game code, game area and other information services, and the player in the background information to hackers on the specified remote server. This Trojan is a malicious DLL file will be injected into the system, crucial in the process of loading operation, hidden self, and prevent killing. As a result of special skills, even if a malicious DLL file is running, the hard drive can not find traces of malicious DLL files. So, when everyone's computer exporer. exe process again an exception, must not be careless.
the seventh, I did not believe that anybody really believe BB to send the game spread, and to receive prizes of strange news, until one day a close encounter people are really fooled by such a strange message, was stolen on the site number, it felt very ashamed. On this point, really do not know what to say. so people incurable.
eighth, resistance off message.
this for some friends who may not be realistic, but it really is a very effective defense approach. previously mentioned, no matter what kind of Trojan horse to steal account largely accepted to be sent via email. Guangyu the server is not easy to be exploited so easily by hackers turn to other servers. The simplest is the mail server. do not need to deal with what you can through your mail gateway or firewall to force against the implementation of the Simple Mail Transfer Protocol ( SMTP, etc.) can completely prevent your computer to send e-mail. In this way, even if the other side of the Trojans, it has been effective, can not get the envelope containing your account information.
ninth game in the landing process, the non-normal pop-up window must be careful.
Recently, there has been called is to you click on this window: OK or Cancel. In fact, most players will not consider click been implanted with Trojan, which is very hidden, the player generally does not pay attention to this little incident. In this situation, you can press ESC to exit or restart the computer directly and thoroughly anti-virus.
tenth, will channel special attention to see this player.
Recently, a new online game hacking tool has emerged. The Trojan drew on the part of the concept of social engineering, that players in the game, such as online games, suddenly, is bound to will immediately log in again to continue the game, hackers took advantage of online game players accustomed to the operation of the general, quit the game to force the players to induce the player to re-sign in and wait for an opportunity to steal online game account and password. In this regard, if the player encountered in the course of the game suddenly quit the game, must be especially careful. the first detailed examination of the various startup parameters confirm the Windows system without exception, reboot the system to conduct the game. or you can use with active defense capabilities to install security software, to Centering online account with a lock.
example (Trojan-PSW.Win32.MiFeng.ai.dll) has adopted a new hacking tool above. The Trojan itself is for the online game two main program), forced to end, then the game will suddenly break, log back in the game until the player took the opportunity to steal online game account and password, the virus will steal the account password encrypted prepared to receive through the mail and web space Send to hacking hackers. If you in the game, the game suddenly interrupted, it is likely that you have in this Trojan virus, please do not be careless.
told top ten, certainly there are many ways to note , but I am not remember, we do can only say that these many, hope that we can take a closer look, do no harm.
below, a separate piece of secluded talk about the killing antivirus software and trojan problems.
I discussed above ten, the first thing we talked about the anti-virus software. For most ordinary players, stand-alone version of the antivirus software is the most important, or is the only way of protection. In fact, it is also true is the most effective protection method. In theory, in a newly installed, there is no damage to the system of genuine anti-virus software installed and up to date, open all the active defense, the player is generally not the infringement Trojan. Of course, this is kind of ideal state, a lot of players playing the game some more or less during the accident, so everything has drawbacks.
Many players have asked the author, saying that my computer is genuine anti-virus installed software, and antivirus every day, but the computer simply no Trojan, Trojan horses and even specialized Zhuanshagongju also find no exception, but the number is stolen, how is this going on here?
I say: kill does not mean less security. because there is a trojan called free kill!
the first to remind everyone that the killing was a relatively free word, for the current technology, the Trojan horse to avoid killing success rate is not high (in multi-engine test basis). but the user is relatively simple to install security software, so the production of targeted Trojan horse to avoid killing, for individual users is absolutely free to kill.
first to introduce a technology: rootkit.Rootkit came in the tenth century, the early 90s, literally, is a system-level management tool, is actually a kernel-level hackers use malicious tools, the most common application is to hide the whereabouts mm Trojan horse program files completely hidden, and registration process tables and analysis tools can make the general system failure, can not capture any clues. drive technology for the use of the characteristics of Rootkit, Rootkit detection and removal of the need to use higher levels of driver-level programming techniques, in-depth analysis to determine the kernel. For Rootkit detection and removal technology is the current international anti-virus industry, cutting-edge technology.
Next we will look at ways in which hackers are free to kill to achieve the purpose.
to everyone familiar with the gray pigeon cases. We first create a common gray pigeons Trojan server, and then anti-virus scanning software, can be found, the vast majority of anti-virus engines are able to identify the Trojan.
broadly divided into two encryption methods to avoid killing code , flower orders, packers, importers and modify the program manual DIY PE. The hand operation is not recommended, because this procedure to produce results is good, but too complex and require a strong basis for the assembly language, and have some knowledge of Windows kernel. the specific process I can not say here. After treatment, re-enter the antivirus software to scan and found that the virus can be identified as anti-virus engine is running out.
use of the means to protect themselves Rootkit Trojan documents, they use the use of protected visual hiding, even if the use of WINDOWS folder search function, select For such a It does not matter, the purpose is not want you to understand, but to tell you, not to God as hacking, any person who can not put your number by air stole the. summed up saying: The most important active defense, lust greedy undesirable

No comments:

Post a Comment