* is a virus program based on remote control. The program is highly concealed and harmful. It can control or monitor you without anyone noticing it. Some people say that since the * is so powerful, I can just stay away from it!
However, this * is really "naughty". No matter whether you welcome it or not, as long as it is happy, it will find ways to break into your "home"! Oh, that's great. Hurry up and see if there are any *s in your computer. Maybe they are making trouble in the "home"! Then how do I know where the * is? I believe that novices who are not familiar with *s must want to know such a problem. Below are the tricks of * horses lurking. After reading them, don’t forget to use the ultimate moves to deal with these tricks!
1. Integrate into the program
In fact, * is also a server-client program. In order not to allow users to delete it easily, it is often integrated into the program. Once the user activates the * program, the * file is bundled with a certain application and uploaded to the server to overwrite the original file. In this way, even if the * is deleted, as long as the application bundled with the * is run, the * will be installed again. Bind to a certain application, if bound to a system file, then every time Windows starts, it will start a *.
2. Hide in the configuration file
*s are really too cunning. They know that novices usually use graphical interface operating systems, and most of them ignore the configuration files that are no longer important, which just provides *s with a hiding place. Moreover, using the special role of configuration files, *s can easily run and attack on everyone's computers, thereby peeping or monitoring everyone. However, this method is not very hidden and easy to be discovered, so it is rare to load * programs in He, but you should not take it lightly.
3. Lurking in
If a * wants to control or monitor a computer, it must run, but no one will be stupid enough to run this damn * on his computer. Of course, *s were also mentally prepared, knowing that humans are animals with high IQ and will not help them work, so they must find a place that is both safe and can run automatically when the system is started, so lurking in the middle is a place where *s feel more comfortable. You might as well open it to see. There are startup commands "load=" and "run=" in its [windows] field. Generally speaking, the following is blank. If there is a program followed by it, for example, this is like this: run=c:\windows\=c:\windows\You should be careful at this time, this is probably a *.
4. Disguised in ordinary files
This method appeared relatively late, but it is very popular now, and it is easy to be deceived for unskilled Windows operators. The specific method is to disguise the executable file as a picture or text - change the icon to Windows' default image icon in the program, and then change the file name to *. Since the default setting of Win98 is "Do not display the known file suffix name", the file will be displayed as *.jpg. If you don't pay attention, you will get the * horse by clicking this icon (it will be more perfect if you embed an image in the program).
5. Built into the registry
The above method made the * really comfortable. No one could find it and it could run automatically. It was so happy! However, the good times didn't last long. Humans quickly pulled out its feet and punished it severely! But it was still unwilling. After summarizing the lessons of failure, it thought that the hiding place above was easy to find, and now it had to hide in a place that was not easy to be discovered. So it thought of the registry! Indeed, because the registry was relatively complicated, * often liked to hide here and have fun. Check it out quickly. There is a program under it. Open your eyes and look carefully. Don't let the * go: HKEY_LOCAL_MACHINE\ All key values starting with "run" under Software\Microsoft\Windows\CurrentVersion; all key values starting with "run" under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion; all key values starting with "run" under HKEY-USERS\.Default\Software\Microsoft\Windows\CurrentVersion.
However, this * is really "naughty". No matter whether you welcome it or not, as long as it is happy, it will find ways to break into your "home"! Oh, that's great. Hurry up and see if there are any *s in your computer. Maybe they are making trouble in the "home"! Then how do I know where the * is? I believe that novices who are not familiar with *s must want to know such a problem. Below are the tricks of * horses lurking. After reading them, don’t forget to use the ultimate moves to deal with these tricks!
1. Integrate into the program
In fact, * is also a server-client program. In order not to allow users to delete it easily, it is often integrated into the program. Once the user activates the * program, the * file is bundled with a certain application and uploaded to the server to overwrite the original file. In this way, even if the * is deleted, as long as the application bundled with the * is run, the * will be installed again. Bind to a certain application, if bound to a system file, then every time Windows starts, it will start a *.
2. Hide in the configuration file
*s are really too cunning. They know that novices usually use graphical interface operating systems, and most of them ignore the configuration files that are no longer important, which just provides *s with a hiding place. Moreover, using the special role of configuration files, *s can easily run and attack on everyone's computers, thereby peeping or monitoring everyone. However, this method is not very hidden and easy to be discovered, so it is rare to load * programs in He, but you should not take it lightly.
3. Lurking in
If a * wants to control or monitor a computer, it must run, but no one will be stupid enough to run this damn * on his computer. Of course, *s were also mentally prepared, knowing that humans are animals with high IQ and will not help them work, so they must find a place that is both safe and can run automatically when the system is started, so lurking in the middle is a place where *s feel more comfortable. You might as well open it to see. There are startup commands "load=" and "run=" in its [windows] field. Generally speaking, the following is blank. If there is a program followed by it, for example, this is like this: run=c:\windows\=c:\windows\You should be careful at this time, this is probably a *.
4. Disguised in ordinary files
This method appeared relatively late, but it is very popular now, and it is easy to be deceived for unskilled Windows operators. The specific method is to disguise the executable file as a picture or text - change the icon to Windows' default image icon in the program, and then change the file name to *. Since the default setting of Win98 is "Do not display the known file suffix name", the file will be displayed as *.jpg. If you don't pay attention, you will get the * horse by clicking this icon (it will be more perfect if you embed an image in the program).
5. Built into the registry
The above method made the * really comfortable. No one could find it and it could run automatically. It was so happy! However, the good times didn't last long. Humans quickly pulled out its feet and punished it severely! But it was still unwilling. After summarizing the lessons of failure, it thought that the hiding place above was easy to find, and now it had to hide in a place that was not easy to be discovered. So it thought of the registry! Indeed, because the registry was relatively complicated, * often liked to hide here and have fun. Check it out quickly. There is a program under it. Open your eyes and look carefully. Don't let the * go: HKEY_LOCAL_MACHINE\ All key values starting with "run" under Software\Microsoft\Windows\CurrentVersion; all key values starting with "run" under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion; all key values starting with "run" under HKEY-USERS\.Default\Software\Microsoft\Windows\CurrentVersion.
12Next pageRead the full text