Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

What are the main hazards of Trojans

2025-01-15 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >

Share

Shulou(Shulou.com)06/02 Report--

This article will explain in detail what the main harm of Trojan virus is, the editor thinks it is very practical, so I share it for you as a reference. I hope you can get something after reading this article.

Main harm: remote control to steal information and destroy the system. The Trojan horse virus is a backdoor program with special functions such as destroying and deleting files, sending passwords, recording the keyboard and attacking Dos; as long as the computer is infected by the Trojan virus, hackers with ulterior motives can operate the computer at will, just like using the computer locally, the damage to the controlled computer can be imagined.

The main harm of Trojan horse virus is: remote control to steal information and destroy the system.

Trojan horse virus refers to a section of malicious code with special functions hidden in normal programs. It is a backdoor program with special functions such as destroying and deleting files, sending passwords, recording keyboards and attacking Dos. Trojan horse virus is actually a program used by computer hackers to remotely control the computer, parasitizing the control program in the controlled computer system, inside and outside, and operating on the computer infected with the Trojan virus. The general Trojan virus program is mainly to find the back door of the computer and wait for an opportunity to steal the passwords and important documents in the accused computer. Illegal operations such as monitoring and data modification can be carried out on the accused computer. Trojan horse virus has a strong concealment, according to the intention of the hacker to launch a sudden attack.

Characteristics:

(1) concealment.

The main factor that Trojans can exist for a long time is that they can hide themselves and disguise themselves as legitimate applications, making it difficult for users to identify, which is the first and important feature of Trojans. Like other viruses, this concealment period tends to be longer. The commonly used methods are parasitic in legal programs, modify to legitimate program names or icons, do not generate any icons, do not show up in the process or disguise as system processes, and associate with other legitimate files. [1]

(2) deceptive.

The main means of Trojan virus concealment is deception. Often use camouflage to legalize yourself. For example, use legal file type suffixes "dll, sys,ini'', etc."; use existing legal system file names and then save them in other file directories; and use confusing characters such as the letters "o" and the numbers "0", the numbers "1" and the letters "I".

(3) stubbornness.

Trojan virus in order to ensure that it can continue to spread, often like a tumor in the infected computer, there are multiple backup files, once the master file is deleted, it can be immediately restored. In particular, the use of file association technology, as long as the associated program is executed, the Trojan virus will be executed, and produce new Trojan programs, or even variants. The stubborn Trojan virus brings great difficulties to the removal of Trojans.

(4) harmfulness.

There is no doubt about the harmfulness of Trojans. As long as the computer is infected by Trojans, hackers with ulterior motives can operate the computer at will, just like using the computer locally, and the damage to the controlled computer can be imagined. Hackers can act arbitrarily and steal important resources of the system, such as system passwords, stock trading information. Confidential data, etc.

The Trojan virus directly destroys the computer by rewriting the disk and destroying the computer database, which brings inconvenience to users. When the Trojan destroys the program, the program can not run, which has a serious impact on the overall operation of the computer. Other Trojans can be carried out through the boot area of the disk, and the virus has a strong replication function to pass the user program to the external linker. You can also change the disk boot area, causing data formation channel damage. The virus also preempts the system resources through a large number of replication, interferes with the running environment of the system and affects the running speed of the computer system.

With the development of the Internet, Trojans take a fancy to e-commerce, hang some Trojan programs on some online shopping, when users click, it is easy to enter the user system, when users use the network bank. Steal the bank password through the Internet, and then steal the user's finance, causing huge economic losses to computer users. In some special areas, Trojans are used as a means of attack, such as political, military, financial, transportation and many other fields, becoming a battlefield without gunpowder smoke, using Trojans to invade each other to obtain relevant information or to destroy.

This is the end of this article on "what are the main hazards of Trojans?". I hope the above content can be of some help to you, so that you can learn more knowledge. if you think the article is good, please share it for more people to see.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Internet Technology

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report