Joke Collection Website - Blessing messages - Millions of old computers have been implanted with Trojan horses. How can I know if my parents' old computers have Trojan horses?

Millions of old computers have been implanted with Trojan horses. How can I know if my parents' old computers have Trojan horses?

According to relevant media reports, there are millions of computers implanted with Trojans for the elderly, and many elderly people's identity information has been stolen. This Trojan virus steals identity information through SMS verification code. As long as we use the mobile phone to receive the verification code of the business hall, we can know whether there is a Trojan horse in the mobile phone. Judging from the current case, most of the old machines with Trojan horses are unable to receive short messages.

1. The Trojan horse incident originated on 20 19. A young man in Xinchang County bought an old-age care machine for his grandmother, but when he changed the package for her, he found that he could not receive the verification code. Change your mobile phone card to your mobile phone and you can receive it. At this time, the young people began to doubt and chose to call the police. After investigation, the police found that the mobile phone did have a Trojan horse program, and the verification code was sent to a technology company in Shenzhen. After that, the police conducted a large-scale investigation and found that many old machines of the same model had the same phenomenon. After finding out the truth, the local police joined hands with the police in other areas to arrest the criminal gang in one fell swoop.

2. Trojan horse programs from illegal companies and elderly computer manufacturers are implanted on the motherboard of elderly computers, and the reason why illegal companies can implant programs is because of the cooperation between the motherboard manufacturers of elderly computers and them. According to some criminals, motherboard manufacturers cooperated with them to obtain information such as mobile phone numbers through Trojan horse programs. And by automatically intercepting the verification code? Answer code? . This behavior can help them get a lot of personal information, including mobile phone number and verification code. These companies are using information to make a lot of sales and APP registration to make a profit.

3. How to judge whether there is a Trojan horse program according to criminals? The judgment method is to see if you can receive the verification code. But this is only the most basic, for ordinary people, it is difficult to distinguish. The target of criminals is not only old mobile phones, but also children's watches. This kind of illegal behavior makes the identity information of millions of people be continuously sold to various markets.