Trojans

2013-06-20 11:30

 Wikipedia card Trojans Trojan program should be regarded as a liar, to provide certain features as bait, secretly do some things ...... remember the ghost of Greek mythology about the Trojan horse story? Allusion is from there out. What happened when the Trojans phenomenon? Hard to say, because they attack the situation varied.

directory

Introduction infection prevention performance antivirus Description Description Edit this paragraph

Trojans

Virus Name: Trojan.DL.Js.Agent.lcb Chinese name: Trojan horse virus Length: Variable Virus type: Trojan Downloader Virus Hazard Rating: ★ Impact platform: Win 9X/ME/NT/2000/XP/2003 Trojan.DL.Js.Agent.lcb modify the registry, and boot from Kai. In each folder to generate desktop_.ini files, file marked virus attack date. Remove gho file extension, so that users can not use ghost software to restore the operating system. Infected systems *. Exe, *. Com, *. Pif, *. Src, *. Html, *. Asp file, add the URL virus, causing the user to open a file of these pages, IE will automatically connect to the specified URL virus download viruses. Generated under each partition on the hard drive files autorun.inf and setup.exe, so "Trojan horse" by U disk and removable hard disk, etc. to spread, and the use of the Windows system AutoPlay feature to run. Search drives *. EXE executable file and infection, after the file icon will crash. Edit this paragraph infection performance

Trojans

If your computer has the following performance, it is likely infected with the virus hackers. Edit this paragraph antivirus

Trojans

General Trojans in the easiest way is to use antivirus software removal, such as Duba and so on. If you are familiar with the system can also be manually cleared first by "Win9x under way since the launch of the program described in" Check whether there are suspicious circumstances Program (best case is that you are familiar with your system, these items normally , the system comes with regedit program to view / modify the registry). Suspicious program which,Mercurial Vapor X, together with the registry entry can be deleted, then reboot the system Trojan has been cleared. Edit this paragraph description 1, if the horse is running, you can not delete the program, then you can re-boot to DOS mode and then delete it; 2, some Trojans will automatically check the registry entries from the start, If you are in when you remove the Trojan is active, then it can automatically recover, then you can reboot to DOS before entering their program to remove under Win9x registry since its startup items deleted; 3, in doing deletion operations and modify the registry files before backup. Edit this section prevent Trojan guard Bazhao What is a Trojan horse? Trojan horse programs should be regarded as a liar, to provide certain features as bait, secretly do some things ...... remember the ghost of Greek mythology about the Trojan horse story? Allusion is from there out. What happened when the Trojans phenomenon? Hard to say, because they attack the situation varied. But if your computer has the following performance, it is likely infected with the virus hackers. Sometimes the computer crashes, sometimes restart; what to do in the absence of the time, but in desperate literacy drive; system somehow to search for the floppy drive; does not run large programs, while the speed of the system slower and slower, system resources Many; using CTRL + ALT + DEL to bring up Task table and found there are multiple names the same program running, and may increase over time increased. (However, there are some programs that do not appear in the list of. Know programming friends should know that this is not difficult to do, with PVIEW95 you can see). Especially in the network connected to the Internet or a local area network, if your machine has these phenomena, it should be careful, of course, there may be some other virus in trouble. As Trojans usually requires the destruction collaborated as viruses, Trojans most terrible. Even run, nor will certainly cause harm to your machine. However, the potential harm is still there. For example, your Internet passwords may have been someone else went to your Inbox! How to prevent it again in hacking program? I have come to experience some preventive backdoor: a,adidas predator, never perform any software or programs from unknown sources, unless your computer vulnerable to the attack level to the point of belief. Caution after the first is to download antivirus software to check it again, then run to determine the sound use. Many users is too lazy to carry out these checks a few seconds before the Trojans. Ranging from the intruder deleted system files, reinstall the system; weight is no data, hard logic lock! Or else, is being deciphered Internet account, it was tragic! Two,Nike Air Force 1 Women, never believe that you will not receive junk mail and "drugs", even if the mailbox has never been seen or isp mail, sometimes you never no way to know how others know your mail address. Third, mail software, remember to friends told him to be sure to remember to check narcotics because their computers do not necessarily attack no viruses. As my computer is equipped with a virus firewall, so I'm not sure I mail out whether the virus software. Four, never because the other side is your best friend sent me to easily carry out his or software program because you're not sure whether he, like me, installed a virus firewall, maybe your friends do not know a hacker program, thought it was a good thing to share with you send it! Also, you can not guarantee that if there is someone else to take his name to send you mail. Fifth, do not just leave your personal information, because you never know whether someone would deliberately collected. Six, do not easily believe that the network met new friends, because "on the network, no one will know that you are a dog! "(Joking! ^ _ ^) But you can not guarantee whether the other side wants to use you to do experiment. Seven, never on the network who do not know that whoever insulted, it will not accidentally offend some expert to find you when the ax. Eight, and finally just never speak ill of others, as never to offend a woman. ^ _ ^ Although the network is illusory, but the reality will be the same intrigues, or caution on