Joke Collection Website - Blessing messages - How to detect Trojan virus on the website
How to detect Trojan virus on the website
First of all, there must be a shell of someone else's website, which is generally called webshell. By using this shell, you can manipulate all the files of the website at will, and then you can use IFRAM to hang the webhorse address on the web page. If someone browses this webpage with WebHorse's address, and this person's IE is not patched, the specified Trojan will be downloaded and run. When reading a web page, how to prohibit malicious jumping to a virus website?
Hello, landlord
Browser is not the key, it has no protection function, at most it is filtering and incomplete.
I suggest you lock the home page first (open Tencent Computer Manager-Toolbox-Lock Home Page).
Then, open the web firewall (you can also improve the browser security level and set it in Tools-Internet-Security, but personally it is not recommended, which is very inconvenient). Tencent Computer Manager has a real-time protection, you can try it and protect your safety at any time.
Can I get a virus when I browse the website?
Of course, surfing the Internet is the first step of virus invasion. If you don't install a firewall or the browser's security level is too low, the Trojan horse will be hidden in the plug-in of the webpage, and it will force its way into your system when you browse. The protection measures are to install a firewall and improve the security level of the browser, and don't browse suspicious websites.
How to judge whether a website has a virus?
In general, there will be some abnormalities in mobile phones, such as constantly popping up windows, and their funds being transferred inexplicably, but they have confirmed that they have not received fraudulent calls, or have not logged into any phishing websites or walked through any irregular websites, but their accounts have been stolen, their passwords have been changed or messy software has been downloaded automatically. This is a relatively clear phenomenon of mobile phone poisoning.
When it comes to prevention, links in text messages can't be clicked easily. Sometimes there will be a pseudo base station to send you a text message, which is very easy to be disguised. There will be no pie in the sky. Don't download applications from informal app stores or websites. Don't scan the QR code easily. The virus on Android phone basically depends on the installation of the application.
As for security-related applications, there are many on the market. You can try TX's mobile phone housekeeper. The virus database is updated frequently, and it also relies on the secure cloud address database to support the system to intercept malicious URLs directly in the browser (such as its own browser) and detect the security of newly installed applications. Can be purchased from ...
here
Download. How do I know which websites have viruses?
Install antivirus software containing the latest virus.
Antivirus software will remind you when you browse a webpage with a virus.
If you don't have any anti-virus software installed or the anti-virus software version is too old, there is no way to tell.
In addition, some Trojan pages will have an iframe code at the bottom of the html source code, pointing to other virus software.
How does Trojan virus do it?
1, bundle cheating. Pack the Trojan server and game into a file and send it to others via QQ or email. After the server runs, you will see that the game program opens normally, but you will not find that the Trojan horse program has been running quietly, which can play a very good confusing role. Even if someone reinstalls the system in the future, if he still saves the "game" you gave him, he may still be recruited again.
This is a textbook-style old-fashioned deception. The method is as follows: directly send the Trojan server to the other party, and the other party runs it, and the result is no response (a typical performance after running Trojan). He said, "How can I not open it!" You said, "Oh, the program is not broken, is it?" Or say, "Sorry, I sent it wrong!" Then send him something suitable (normal games, photos, etc.). ), and he will be very happy and don't want anything to go wrong with what should have happened just now.
3.QQ impersonates fraud. Premise: You must first have a QQ number that does not belong to you. Then use this number to send a Trojan horse program to his friends. Because they trust the owner of the stolen number, his friends will not hesitate to run the Trojan horse program you sent them, and the result is a scam.
4. Mail impersonates fraud. Similar to the third method, anonymous email tools are used to send Trojan attachments to others disguised as friends or large websites and institutions. If others download and run the attachments, they will win the Trojan horse.
5. Dangerous download point. This is a common method of vegetables mentioned by several friends behind: (It is said that he obtained thousands of broilers in this way) After breaking some download websites, he downloaded a few softwares with a large download volume, tied them up with trojans, and then quietly put them back for others to download, so that every time he increased the download volume, he would have one more broiler. Or you can simply bundle Trojan horse with other software, and then publish it "aboveboard" to major software download websites. They don't check drugs, and even if they do, they can't find my new Trojan horse, and then ... needless to say, the probability of meat is at least double digits.
6, folder inertia click. After disguising Trojan files as folder icons, put them in a folder, and then set three or four empty folders outside. Many people, out of the habit of continuous clicking, will keep clicking when they click on Trojan disguised as a folder, so that Trojan will run successfully.
7. zipper camouflage. This is the latest method, which binds a Trojan horse with a damaged zip package (homemade), and then specifies the bound file as a zip icon. In this way, unless others read his suffix, clicking on it will be no different from ordinary damaged zippers, and they don't know that a Trojan horse is actually running quietly.
8. Upload the bound Trojan in a briefcase or a forum where attachments can be uploaded, and then send the link to the victim.
9. Network Trojan horse method.
The main transmission routes of computer viruses are:
1. floppy disk
As the most commonly used exchange medium, floppy disk played a great role in the spread of viruses in the early days of computer application. At that time, computer applications were relatively simple, executable files and data file systems were small, and many executable files were copied and installed through floppy disks, so viruses could spread file viruses through floppy disks. In addition, when the floppy disk lists the directory or boots the machine, the virus in the boot area will infect each other in the boot area of the floppy disk and the hard disk. Therefore, floppy disk has also become the main parasitic "hotbed" of computer viruses.
2. CD-ROM
Due to the large capacity of the CD, a large number of executable files are stored, and a large number of viruses may be hidden in the CD. For a read-only CD, you can't write, so the virus on the CD can't be cleaned. In the process of making illegal pirated software for profit, it is impossible to be specifically responsible for virus protection, and there will never be truly reliable and feasible technical support to avoid the introduction, infection, epidemic and spread of viruses. At present, the proliferation of pirated CDs has brought great convenience to the spread of viruses.
3. Hard disk
Because the hard disk with virus is used and maintained locally or transferred to other places, the clean floppy disk will be infected and spread again.
4. Bulletin board system
Bulletin board system (BBS) is popular with public users because of its easy access and low investment. BBS is a communication website spontaneously organized by computer enthusiasts. Users can exchange files (including free software, games and self-compiled programs) on BBS. Because BBS stations generally have no strict security management and restrictions, it provides a place for some virus programmers to spread viruses. The city BBS station spreads through the central station, with a wide spread. With the popularity of BBS in China, new media have also joined the spread of viruses.
5. Network
With the great progress of modern communication technology, the space distance is no longer far away. Data, files and emails can be easily transmitted between network workstations through cables, optical fibers or telephone lines. The distance between workstations can be as short as computers placed side by side or as long as tens of thousands of kilometers. As the saying goes, "close at hand", but it also provides a new "highway" for the spread of computer viruses. Computer viruses can be attached to ordinary files. When you get an infected program from the other end of the network and run it on your computer without any protection measures, the virus will spread. This virus infection is very common in countries where computer network connection is very popular. It is no longer a fuss that domestic computers are infected with "imported" viruses. While our information is internationalized, our virus is also internationalized. A large number of foreign viruses were introduced into China via the Internet.
With the popularity of the Internet, it has added a new way of virus transmission, and will become the first way of transmission. With the pioneering development of the Internet, the virus may become a disaster, spread faster, and the anti-virus task is more arduous. Internet brings two different security threats. One threat comes from file downloads, which may contain viruses. Another threat comes from email. Most Internet mail systems provide the function of sending messages with formatted documents between networks, so infected documents or files may flood into enterprise networks through gateways and mail servers. The simplicity and openness of network use make this threat more and more serious.
At present, the latest trend of viruses on the Internet is that (1) anonymous personal web pages made directly by criminals or good people provide a convenient way to download a large number of live virus samples. (2) As a virus sample provider for academic research, it will also be used by people with ulterior motives. (3) Academic electronic papers, periodicals, magazines and related online academic exchange activities that make anonymous online login possible, such as the annual meeting of the Virus Manufacturing Association, may become the target and object for any new virus maker at home and abroad to learn, learn from, steal and copy. (4) A large number of virus making tools, guides and programs. Spreading on the website makes it possible for people without programming experience and foundation to create new viruses. (5) New technologies and new viruses make almost all people unconsciously become carriers or disseminators of virus transmission.
- Previous article:How to reply to others' confession?
- Next article:What do IM365SEND and RECVED written on Siemens PLC connection module mean?
- Related articles
- Father's Day Blessing Father's Warm Heart Copy Father's Day Blessing
- IU's "Voice-mail" Lyrics
- How much is the SMS charge?
- Just now! Hefei traffic police issued an important announcement! It concerns every resident.
- Can I change the telecom package?
- When the director has a meeting, someone always replies with text messages and phone calls, emphasizing what the office director should do after it is invalid.
- Call me and tell me we're going to do a nucleic acid test. Do you want to believe it?
- How to reply to the good night routine of high emotional intelligence
- Teachers' New Year greetings to parents and children
- Good morning phrase for lovers