2010年10月21日星期四

2010 Top Ten PC symptoms

Many computer users still think of poisoning early in the Internet, such as the colorful insects crawling on the screen, desktop wallpaper constantly shaking, seriously, a lot of files infected by the virus into a strange icon ... ... in fact, increasingly with the Internet application The more popular, simple prank virus damage and less and less, replaced by a rogue adware and Trojan hidden deep types. Recently, 360 10 Security Center summarized the most common types of Trojan horse computer virus phenomenon, whereby netizens can not determine the computer system is in danger.

IE and other browsers home page URL into a strange, often difficult to change back into their home habits, this is by promoting rogue web sites Trojans earn "promotion fee";

Second, the extra desktop "free movies", "site navigation", "online Taobao", "online games" and other advertising icon, point to open a specific web page will open, the same Trojan horse as a tool to promote a performance;

Third, if your normal network conditions, QQ or the game is suddenly dropped, this is likely to Trojan in the dark, cut corners, must immediately Denglu QQ or game Guan network, using the Mi security card back accounts, the users should be replaced by conditional a secure computer to carry out such operations.  At the same time bear in mind that killing Trojans, be sure not to login the game enter "warehouse" password, so as not to "warehouse" is also Daohao looted;

Fourth, move your mouse, camera, open your hard disk lights flashing for no reason ... ... These are not supernatural phenomenon, it might be someone with a Trojan horse remote control your computer, the most appropriate killing is also a full scan;

Fifth, has been working hard in the lower right corner of the desktop security software, not open, and point the shortcut can not run, security vendors can not access the official website, this is a very bad situation for a class, it usually means a group of Trojans are going on your computer in a big fight.  Of course, then you do not necessarily need to reinstall the system, copied from other computers on a "first-aid box 360 system" will solve the stubborn Trojans cleanup;

Six, and sometimes you will find that the browser does not honestly address bar enter the URL to access, such as to visit the Web site A, open it is the site B, which is usually the DNS domain name resolution Trojan altered the results, there is a Class is replacing a system of regular Trojan hosts file;

Seven, if someone tells you that your QQ or MSN to send some spam messages often, or even borrow money news, there is no doubt that your account is stolen a chat. Trojan hacking may be, is also possible that some of your friends in the class Web site using the "Invite Friends" feature, leaking their chat ID and password.At this time, change the password is required, scanning killing Trojans also necessary;

Eight, there is a class situation and QQ about: a lot of fake Web page on the suspension with the "QQ winning" message, a lot of people see that this is false. However, if the desktop icon into the bottom right corner of the QQ winning news flashes, this is the computer poisoning phenomenon. QQ Trojan can hide some icons and replace them with fake fishing information. Even more frightening is that these Trojans can also read your QQ number, the number displayed in the message box, strong enough to confusing the real ones;

 Nine, often unfamiliar users online exchange of photographs, which to mix a lot of Trojans. Simple way to judge is to check the files sent by other types of images if the surface is, the file extension Que is the exe, com, src and other executable program, when you click on this "picture", the computer will no doubt by Trojan invasion. Do not underestimate this type of Trojan horse means of communication, a screen name, "Alone," the hacker to "send photos" send on behalf of Trojan, steal a seven Nvwang more than 30 sheets and 20 video clips nude, extortion of money in recent 3 million;

Ten, the last type of situation is relatively emotional, more dependent on the users decide for themselves, the computer is becoming a little slow, the Internet is not a sudden "turtle speed", Task Manager is not the process have become more you do not know, these Trojans are also engaged in "underground" work symptoms.

360 security experts suggest that complement vulnerability patch, download files from the formal channels of credible, regular use of security software to scan is the best way away from the Trojans. Maintain the health of their computers, on the one hand to protect their property and privacy, but also made the equivalent contribution to the overall Internet security.

没有评论:

发表评论