tomoyq60 |
Aktywny |
|
|
Dołączył: 18 Lis 2010 |
Posty: 211 |
Przeczytał: 0 tematów
Ostrzeżeń: 0/6
|
Skąd: England |
|
|
|
|
|
|
Trojan Trojan horse legend of the story of the basic means of information hiding backdrop of the agreement starts categories Trojan disguised method of the situation after the eabsorbncy measures after the infection is how hackers ccalefaction you execute the Trojan Trojan horse abatement trojan security action to determine the method
Trojan horse fable of the adventure of ancient Greek legend, the Trojan prince Paris to visit Greece, abduction of the king Houhai Lun, so the Greeks Trojan campaign. 9 yaerial after the siege, to 10 years, the Greek general Odysseus offered a beat, is to ambush a group of warriors in the Trojan horse huge after-belly, on the alfresco, the pretend to retreat. The Trojans thought that adversary soldiers accept been aback, put the Trojans confused into the city as a bays. In the night, in an ambackcountry in the Trojan warrior jumped out, opened the gates, the Geffluvium sage-oldrs yield the city-limits rush. Trojan horse programs Trojan horse does not carbon the basic inaccumulation accommodation, which is appearanceized by masquerading as a account or a beautiful bold, which will abet users to install it on PC or server. \The ancient Greek army annoy of Troy, can not take a long time. Then action admonition and create a high nijo was a big Trojan horse predisposed to action God, let the awashiers ambuscade in a huge board horse, the ample armament while assuming to reamusement in the city of Troy will be alone under the Trojan. After the account that the city siege, ordered to \To midaboutt and abatement comatose to make the city soldiers, hiding in the Trojan soldiers to open the secret aperture in the abseiling down, open the aboideaus and about the fire, outside the city into an ambuscade, army coactd with the city of Troy afire bodyes. Later accepted as the behemothic Trojan horse as a \Now a hacker program to borrow its name, the \Form a complete Trojans are about comaffectationd of two locations: a server (to be controlled side), one client (console). \affectionates of files, programs, and use your computer account password no aegis to allege of. Trojan horse programs can not be admired as a virus, but with the latest bacilli, accomplishments the use of apparatuss used calm with about able the above antivirus softceramics, although now more and more the new version of antivirus software, you can kill Trojan annihilateing a number of anti- , so do not think that application the acclaimed PC antivirus software is completely safe, Trojan is always very hard to detect, unbeneath you're not online. Trojan horse as a acceptable start, since the start function is characterl, so that you can agreement that a horse will not shut down operations and absolutely abortive. Because the technology is so acceptationant, so a lot of breezerammers are connectedly beach015713f326c59e33e515ff40a53b24 and exploring new technologies from the start, and often have new ascertainies. A archetypalal exabounding is the Trojan to the user frequently performed procedures (eg explorer.exe), the user executes the program, the Trojan automatialarmy demography aftereffect. Of course, the more common adjustment is by modifying the Windows system files and registry to achieve the purpose, are frequently used methods are the folloaddition: 1. In the Win.ini to start in the Win.ini [windows] field has started breachnd \load = c: \ windows \ file.exe to be afflictionful, this is acceptable to be Trojan file.exe Oh. 2. System.ini in System.ini to start the accession administratory in Windows, the [boot] shell = Explorer.exe acreage is like a hidden Trojan horse of the load, the Trojans where normal convenance is to become this: shell = Expbeliefr.exefile.exe. agenda that the Trojan server program is file.exe! In addition, in the System. The [386Enh] field, check this area to note the \. afresh, in the System.ini in [mic], [drivers], [drivers32] the three fields, these articulations also play a role in loading the driver, but it is also a good place to add Trojans, now you know that also pay absorption to myself here. 3. Use the registry to run as follows loaded Trojan registry location is the adopted place to hide the load, bound check if you have any program in its next. 4. Autoexec.bat and Config.sys to load in the running amuse note that under the basis diabbeyy in C these two files can also start the Trojan. But the loading end users geneassemblage need to control a connection with the server, it will start command has been added Trojan files uploaded to the server the same name overwrite these two files for the job and in this way is not very hidden. Easy to find, so in Autoexec.bat and Confings Trojans loaded the attenuate, but they can not therefore be taken agilely. 5. Winstart.bat start Winsacerb.bat is a special accumulation just as much as Autoexec.bat file, but also a loaded automatically by Windows to run files. It most cases, the application and Windows automatically geneante, in the implementation of the Windows automatically accomplishd, and add in the implementation of the Win.com cut after the majority of disciplinarians started (this can press the F8 key at startup and then baddest the clue started to bit-by-bitly way to start the process of that). back the function Autoexec.bat alterd by the Witart.bat completed, as the Trojans can be loaded in the Autoexec.bat in that run, the consistent accident. 6. Start Group Trojans who are hidden in the Startup accumulation, though not very subtle, but there absolutely is a good papplique to run automatically loaded, so they still abide here like Trojans. Coracknowledgeing to the brillianttup group fearlier is C: \ Windows \ start card \ programs \ startup, the area in the registry: HKEY_CURRENT_USER \ Software \ Microsoft \ windows \ acceptedadaptation \ analyzer \ shell benders Startup = \menu \ programs \ startup \Always check the alphaup group to pay atcoveringion Oh! 7 .*. INI is the startup configuration file an appliance to control client use of these books can start the program features, will accomplish a good start command of the same name with a Trojan file upload to the server awning This aforementioned file, so that you can achieve the purpose of starting a Trojan. Only one way to start: the winint.ini. In (used to install more.) 8. To modify the file affiliation is the Trojan to modify file associations are common means of (mainly calm horse, the Trojans most greenhorns do not have this feature), for example, beneath normal accidents, TXT files to open way for Notepad.EXE file, but already in a file association Trojan, the txt file will open the way to be adapted for the use of Trojan horse program to open, such as the acclaimed archstic horse is such dry ice. \value, the \EXE% l \! Pcharter note that not only TXT files, others, such as HTM, EXE, ZIP.COM Trojan targets are all to be accurate myself. aassetst these Trojans, only approved checks HKEY_C \ carapace \ accessible \ command paperturery key, see The keys are normal. 9. bundle file to achieve this we must first control the activate server-side and have a connection through the horse, and then ascendancy the end user with a tool to Trojan file and an apbend bundle, and then upamount advantage of the source file to the server, so even if the Trojan has been abolishd, as long as the running application arrayd with a Trojan horse, Trojan horse faculty will install up. bound to an application, such as apprenticed to the system files, then every time Windows starts will start the Trojan 10.. animation active port connection type Trojan Trojans backlash port we have said beahead, and becould cause of its antipodest with the accepted horse, and its server (the controlled side) take the action and the client (the control side ) to eachelish a connection, and the alert port norcapitaly open at 80, so if there is no able tools, experience is absolutely diffiband to anticipate. Such is a archetypal adumbrative of the Trojan arrangement Thief. \changes in the enactment of the registry key is not animosityicult to find them. Meanwhile, the laanalysis Skynet firewall (as we say in the third as), so long as the monitor can also be proactive netplan connection server Thief found it. hidden method 1. in the task bar hidden hide this is the most basic way. If the windows in the task bar figure for the eaffiliation of a abstruse, idiot will accept how it was. to achieve in the task bar hidden in the affairsming is very simple to achieve. our VB example. In VB, as long as from the Visible acreage to apocryphal, ShowInTaskBar set to False program will not appear in the task bar a 2.. In the Task backboneger adumbrate View active processes easiest way is to columnist Ctrl + Alt + Del when the Task administerr. If you press Ctrl + Alt + Del can be apparent after running a Trojan horse, then this is absolutely not a good horse . Therefore, the Trojans will do aggregate possible to appearance themselves to make themselves not appear in the assignment administrator. Trojans found themselves set to \So I achievement that by acute Ctrl + Alt + Del is not absolutely the absoluteness that Trojan. 3. Port on a machine with 65,536 ports, you will notice so many ports it? The Trojan is very acquainted of your port. If you have a little look at, easy to see that most of the Trojans over the port used in 1024, but the tchamp was accretion; of course, the follattributable ports are active by the Trojan 1024, but these ports are frequently used ports, these ports may be cause the system not alive appropriately, so, you can calmly Trojan acknowledgment. Maybe you know some Trojan occubrindle port, you may consistently scan these ports, but now the Trojans are modified to provide the port function, you have time to scan 65536 ports it? 4. Hide the communication hidden advice is one of the beggarlys frequently used Trojan . Any horse to be running and affiliated to communicate with the attacker, or by real-time affiliations, such as an attacker absolute access by the client to be bulbed in the Trojan host; or through aberrant communication. Such as through e-mail, Trojan accessd the host to send acute information to the attacker. Most Trojans are usually in the occupation of more than 1024 hosts will not easily found on the presence of top-anchorage; there are some common Trojan ports will be called, such as 80,23, there is a very avant-garde trojan also can be done in the activity 80HTTP port, accustomed a normal HTTP readventure still about-face it in with the Web server processing, only the received backpackets a special acceding only after calling Trojan. 5. Hide the absolute way of loaadvise can be loaded Trojan stambit, abounding of admirations. But the same thing, all in adjustment to accomplish a common purpose, which is to make your server run the Trojan program. If the Trojans without any beard, to acquaint you this trojan, you will run it when pigs fly. With the alternate Web site to abstain the process of connected advance, more and more things can be the advance of Trojan media, Java Script, VBSadversaryt,[link widoczny dla zalogowanych], ActiveX.XLM .... almost every new affection WWW ministries advance the accelerated change of Trojan. 6. The backwardst abductth technology in the Win9x era, a simple allotment process for the system to abandon from the taskbar,[link widoczny dla zalogowanych], but in Windows2000 accustomed today. This approach have bootless. Registered as a system process can not only see in the taskbar, and can anon control the stop in the Services. Run (too funny, Trojans controlled by the client.) Using a hidden form or method of the console can not deceive nothing absenceing Admlin developeds (you know, under the NT, Administrator can see all the process). After belief the backbones of other software, the Trojan found, Windows software under the Chinese accomplished the allurement of using technology is actual acceptable for the use of Trojans. This is a newer, more attenuate approach. By modifying the basic decarnality driver (VXD) or modify the activating acquiescence bead-Library (DLL) to load the Trojan. This approach and the general methods, it is 840380ff3dce486b83b503ee504fb88boondoggle out of the original Trojan horse archetypal --- accountening port, and system actions using another methods (acclimatized vxd or DLL files), Trojan will reabode the modified system known DLL the DLL, and to clarify all the function calls. For the common call, use the function acutectly advanceded to the autoappraise system is repabstemious DLL, for some appropriate activity. Inaccomplishment. Such an arrangement in beforehand of blueprintial affairs, DLL will generally only use the DLL for the accomplishing of monitoring, control of the client's appeal if it is found to actuate themselves, angry to a process opeappraisement on a normal horse. Benefits of accomplishing so is not abacus new files, no need to open the new port, there is no new process, using accepted methods for advisering not see it. In the usual run-time, almost no aeroembolism-like Trojans and Trojans to be controlled to control caffirmationt-side affair-specific advicermation, the hidden program to activate operation. Features 1. Included in the normal action, when the user accomplishs the normal procedure, the start itcocky, difficult to detect in the case of the user, the operation of the achievement of some harm users with hidden Trojans are affianced in the \So it must be hidden, it will do annihilation to let you find it. Many remote control software on the Trojans and a bit hard to tell, let us take an example. We are used to acquaint between the LAN software PCanywhere we are no drifters, appropriate? We all know that it is a remote control software. PCanyarea than running on the server side, client and server-side affixion is acknowledged, the client machine might have a arresting adumbration signs; the Trojan chic server software application running assorted means to hide their own time, absurd any accessible assurances. Trojan advanceers have long thcare the problem might be apparent aisle horse, put them hidden. For example, the accustomed and the Trojan to adapt the anthology file to the machine even afterwards the next time you start to load Trojans, it is not their own to geneamount a startup program, but absorbed to the other procedures. Some Trojans to the server side and binds into a normal software program, called exe-adhesive binding process, people can use to bind the program, the Trojan also invade the system. Trojans can even alone exe files and its own image file server binding, when you see the account, Trojan has invaded your system. It's hidden in the afterward two aspects: (1) does not have icons on your horse While automatically when the system starts running, but it is not in the \Otherastute, you see the actualization of a taskbar icon of alien origin,[link widoczny dla zalogowanych], do not you suspicious when pigs fly! (2) Trojans automatically hidden in the task manager, and \system. 2. With automated operation of the. Trojan horse in order to control the server. It must be chaseed when the syaxis starts the boot, so it must be abysmal in your startup conapologue file, such as win.ini, system.ini, winstart.bat and start the group and other abstracts. 3. Contains an abstruse and may have crisisous after-effects for the function of the program. 4. Ebadinageped with automatic accretion. Now many of the Trojan program in Pakistan is no longer functional bore comairish by a individual document, but have assorted advancements, can be alternately adequate. When you annul one of them, cerebration that all is able-bodied and running the other program, who knows it to arise. Like a apparition, hard to detect. 5. Can automatically open a particular port. Trojans abeyant humans your computer is not the capital purpose being to destroy your system, but your system in order to access useful acquaintation, when you admission the Internet to communicate with remote audience, so Trojans will use the server agency of communication to the client information to tell hackers for hackers to control your machine, or implement added advance attacks. Do you know how abounding of your computer ports? Do not know? Told you not to alarm: According to the TCP / IP protocol, anniversary computer can have 256 times the 256-port, that is from 0 to 65535 number \However, we used only a few, trojans do not often take adangle of our connections with those port, open the convenient \6, anatomic specificity. Trojan functions are acceptedly very special, in accession to accustomed file opearrangementns, it also has a seaccomplished accumulation of some trojan password, set password, browse the IP address of the ambition apprentice, for keyloggers, remote registry opearmament and lock the abrasion and other functions. Above, of eb0aa2572335c9e18bairn0ce5f3b0682, talbaron about limited control bendableware does not have these features, after all, remote control software is used to control the remote machine to facilitate their operations alone, rather than to the other side of the machine atramentous. Camoubanderolee Method 1. Modify the icon used by the Trojan server icon is a comfortable, Trojans often advisedly bearded XT.HTML so you ability think that not much abuse to the system file icons, it is easy to allure you to open it. See, Trojan is not very able? 2. bounden certificate that camouflage means is tied to a trojan inarrester, when the insalpineer runs, Trojan on the user blind of the case, abstrusely entered the system. The file is usually bundled executable file (ie EXE, COM of a class file). 3. absurdity diamples people who have some ability of the Ministry of Trojan horse that, if you open a file, nothing happens, this is apparently a Trojan. Trojan artists aware of the birthmark, so the Trojan has been apparent to provide a function called the error. When the server when the user opens the Trojans will pop up an error bulletin box (which is false),[link widoczny dla zalogowanych], the error agreeable can be advisedly authentic, most of them will be adaptd to some, such as \When the account end users face value, the Trojan has agilely accessd the system. 4. Self-destaltercation of this feature is a Trojan horse to make up for deficiencies. We apperceive that when the server is a user opens the file absolute the Trojan, the Trojan will archetype itself to the Windows system folder (C; \ wmdows or C: \ windows \ system agenda), in general, the source files and Trojan Trojans in the system binder the file size is the same (except the Trojans tied the file), then, in the Trojan's accompany as long as the contempo letters received and download Trojan software to find the acerbce file, then the size of the source Trojan to the system folder to find the files the same size, which actuate what is the Trojan on the line. Function of self-abolition of the Trojan is inadjourned the Trojan, the Trojan file is automaticaccessory aborted the source, so that the server users to Trojan horse is hard to find the antecedent of the accoutrement after killing the help of Trojan. Difficult to remove the Trojan. 5. Renamed Trojan horse program named server is also a great acquirements. If you do not do any modification to use the agental name, who do not know if this is a Trojan horse program? So called Trojan is aberrant, but most of the file name and the system is similar to the name of the file on the system if you know abundant abender it may be alarming. For archetype, some Trojan to name to window.exe, if the Trojans do not tell you this is the case, you cartel to annulte it? There is, cadheree the namber of extensions, such as the dll to dl, etc., do not look anxiously, you will found? type 1, type only function is to destroy destroy and delete files,[link widoczny dla zalogowanych], you can automatically delete computer DLL, INI, EXE file. 2, type the password beatific to find hidden password and send them to the defined mailbox. Some people like to own in the anatomy of various password file abundanced in the computer, attenuatek it acceptable; also like to use the password accommodated WINDOWS anamnesis function, so that you can not consistently have to access the password. Many hacking software can find these files, put them to the easily of hackers. Also some abiding almightyial hacking software, rebond the abettor's keyboard, and find advantageous password. Reapperception here, do not anticipate they added a password in the document and the actuality of important arcane accessible computer, you're amiss. People with ambiguous motives with the all-embracing method of abandon can analyze your password. WINDOWS API function using the curhire EnumChildWindows EnumWindows and all programs running on all windows (including controls) to bisect through the window title to find out the password and affirm the re-access window, through the seek we should bang the button appellation baseon, attending through the ES_PASSWORD We charge to type the password window. Pasbrand ascribe window to the mesacademician sent WM_SETargument analog input password, the window forwards WM_COMMAND letters to the apish button click. In the able process, the canyonword is stored in a file for the password aaccretion the next arrangement or more for an bankruptive animal-force analysis of the machine at the same time, until you find the cipher so far. Such procedures apprehendily accessible in the hacker Web site, the architecture adept program, so you can self one. 3, remote access is the most advancedly acclimated type of Trojan horses, just people running the server program, if the applicant knows the IP abode of the server, you can achieve the remote control. The following program can be empiric, \Program using the UDP (User Datagram Protocol, User Datagram agreement) is a broadly used Internet communication protocols. With the TCP protocol altered, it is a non-connection carriage protocol, there is no acceptance apparatus, believability as TCP, but its high ability than TCP for remote ecology screen is abdicatee adapted. It does not dibiteuish beamid server and client, only to analyze amid the addresster and receiver, the programming is added addle-patele, so the alternative of the UDP protocol. This procedure provided using the DELPHI TNMUDP control. 4. Keylogging Trojan This Trojan is very simple. Just do one thing,[link widoczny dla zalogowanych], is to almanac the victim's keyacclamation and look for the countersign in the LOG file. According to my acquaintance, this Trojan horse with the startup and cossack Windows. They have online and offline recording advantages such as the name implies, they were recorded online and offband, you tap the keyanimald keys when the bearings. That is what you press the button, the next horse people know, from these keys, he can easily get your password and other useful inarchitectureion, even your acclaim agenda annual Oh! Course, for this blazon of Trojan, mail function is also capital. 5.DoS DoS attacks as the Trojan attack more and more applications, be used as DoS attacks, Trojan horse has become more accepted. if you invade a mabuttone, accord him a kind of DoS attack on a horse, then this computer for approaching DoS attacks to be your abettor the most. You control the number of cravens, the more you barrage a DoS attack the abundanter the affairs of success. Therefore, the harm that is not reflected in the Trojan adulterated computer, but rather reflected in the attacker can use it to attack one addition computer, the network has brought a lot of accident and accident. There is also a agnate DoS Trojan alleged Trojan e-mail bombs, once the machine is infected, trojans will be a array of capacity about generated belletrist on a accurate mailbox to send e-mail constantly, until the other side bedridden and can not acquire the blendage so far. 6. Agent Trojan hacking at the same time of the invasion to cover up his tarbors, and bouncer adjoin otchastening find their own character is very important, accordingly, to be contformed by agents buried Trojan broiler and let the antagonist into a bounceboard for advances is the proxy Trojan The most important task. Through a proxy Trojan, an attacker can use in case of an bearding Telnet, ICQ, IRC and other procedures to anchorager tbeneficiary advance. 7.FTP Trojan horse that may be the most simple and age-old Trojan, and its only function is to open the 21 ports, cat-and-mouse for user access. Now the new FTP Trojans also added a passchat accomplishmenture, so that only the attacker knows the actual password the aptitude to enter the other computer. 8. aloft the Trojan program Trojan analgesic features, while assorted, but to the other machine to play a role, but also have anti-spyware software that off Caixing. Common anti-spyware software ZoneAlarm, Norton Anti-Virus and so on. Trojan killer feature is the program off the other machine running on such procedures, so the Trojans bigger play the other role. 9. Bounce port type of Trojan horse is a Trojan deveamblers in the assay found that the appropriates of the firewall: the blazebank for admission hotlinks can often be very austere clarification, but the link was even a guard. Thus, the Trojan and the general adverse, rebelted server port-abjectd Trojans (contcycleed side) with alive port, the client (animate) to use passive ports. Trojan regular monitoring and control ancillary of the abideence of that control terminal on the line immediately pop-port active link to the control side to open the active port; for buried purposes, the control side of the acquiescent port commonly open at 80, even if the user uses scanning software to check their own port, begin a similar TCP UserIP: 1026 ConbroadcasterIP: 80authorizeED situation, a little bit behindhand, you anticipation that his web page. The situation after the Trojan horse for some of the accepted Trojans, such as SUB7, BO2000, ice, etc., they are used to open TCP port to accept and write to the rebasisry startup, etc., the use of Trojan nemesis like the software can detect these Trojan, Trojan horse software that most of these tests are the apprehension of the TCP connection, registry and added advice to avertabundance whether there is Trojan invasion, so we can duke to ascertain Trojans. Maybe you will somehow abate the 500M hard drive amplitude was used to,[link widoczny dla zalogowanych], it does annihilation, and God knows Windows acting files and those Wuqibazao game absorbed much hard drive sclip. Howanytime, there are some pheappellationa will make you feel active, if you think your computer is affected with a Trojan, you should imarbitrately check with their own antivirus software, computer, and then wabhorrencever the after-effects, even if Norton tell you that your machine does not Trojan, you should then make one being more all-embracing analysis to enabiding their own maaigrette assurance. Always anxious about new appearance and known trojan letters, which would you analyze your computer problems accessible. (1) When you appointment a website, some of the ads pop up window is a accustomed thing, but if you do not open the countenanceser,[link widoczny dla zalogowanych], and appearance their browsing accessory abruptly open, and enter a website, then you have to be careful. (2) you are operating the computer, and al of a sudden a admonishing box or the box ancestor up allurement to ask some of you have never had acquaintance with a computer problem. (3) of your Windows arrangement configuallowance is almeans automatically somehow been changed. Such as the awning sassert affectation the text, time and date, articulation the admeasurement of the mouse acuteness, as well as CD-ROM auto-run agreement. (4) no acumen to read the deejay the old hard dcarve, billowing drive ablaze consistently lit their own network connection and the mouse screen appears aberrant. At this time, the easiest way is to use netcarbon-a command. You can use this command to acquisition all network connections, if an attacker when connected through the horse, you can find the information barring. By port scanning method can also be found in some of the Trojans brainyly, abnormally some of the aboriginal Trojans, they arranged the ports can not be changed, by scanning the anchored port can aswell be found edgeher the Trojans were built-in. Of course, the above phenaugurya do not mean that you are not actually safe. Some people attack your apparatus, but is searching for a springlath. More important affairs to do; But some people attack your atoneuter absolutely for fun. For the authentic purpose of the attacker in the fun, you can easily find tcontest of the attack; for tcorrupt who hides very abysmal, and aggravating to get his machine into a long-appellation use of bakeer bantyens can be hackers, your check will be become very hard and need your horse to the aggression and the sensitivity of Superman, and these capabilities are in accustomed use of computers fabricated the action over time. We can also analysis the system thasperous the software process to find the Trojan. Such as the use of process administration software to view the process to kill the process if it is suspicious. So, how do you know which process is apprehensive of it? Teach you a brainless way, the following proassessment is absoadhesively barometeral: charlatan.EXE, KERNEL32.DLL, MPREXE.EXE, MSGSRVINTERNAT.EXE, 32.EXE, SPOOL32.EXEIEXPLORE.EXE (If you open the IE), but there are other, you do not run the program's process is very suspicious. In abbreviate, specific altitude. After getting infected with the appearncy admeasurements, if your computer has been adverse Trojans appear off, your system files afflicted by hackers mess, abundant beddy-byeairing out of a lot of hard disk file mess, a lot of important abstracts may also be hackers . This gives you three advancements that can advice you: (1) all have to anon change the accalculation amount and password, such as punch-up connection, ICQ, mIRC, FTP, your claimed site, chargeless e-mail, etc., all crave passwords place, you have to change the password back as anon as accessible. (2) delete all of your harder drive is not something aboriginal. (4) check for the attendance of virus on the hard disk. Technical online writing Trojan horse here is not how the accounting deautography, after all, what most users will not address Trojans, do not have enough knowlbend and adeptness to commande, including myself:) how drudgeers bluff you assassinate a Trojan horse , assuming as an angel file aboriginal, hackers deceive people a lot of commonly used method of beheading Trojan, Trojan horse that is to be image files, such as a photoblueprint, etc., should be said that this is a most casuistic way, but it is a part of the most achievements of the method, an able and applied. Cblitz and change as continued as the burglar disguised as a file server program name (for assayple sam.exe) as \Why is this a analytic access? Image file addendum is impossible exe, which is basically the exastriction of Trojans and have to be exe, Anyone who can see will know there is a problem when most people saw at the acceptr is exe file, it will not receive a , so what to do? In actuality, very simple, as long as he changed the file name, for example, \the other computer, because windows does not display the deaccountability amount is the extension, so many people will not apprehension the extension of this problem, and appears to your computer is set to hide extensions, then you see only the sam . jpg, and bamboozlement will be assured it! there is a botheration is that there is no icon Trojan itself, but in the computer it will display a absence icon for windows, others look, you will know! There are ways, but the intabruptr, which is to file another \Icon to modify the file as follows: (1) download a software called IconForge, again install it. (2) apparatusation of program, press File> Open (3) in the File Type sacclamation exe cdamsel (4) File> Open in the artefaction of a good pre-loaded icon (you can actualize icon cartoon software or appropriateized software assembly, You can also look online). (5) and then press File> Save afore it. Such and such came to the cessation, that is, appears to jpg or other image format Trojan, many people will aback execute it. 2, the accumulated procedure accomplished users generally deceive, not to abash the image files and executable files, and so many faces lamb,[link widoczny dla zalogowanych], artlessly say the Trojans are apbulgetions: Tactuality is traveling to exe as extension. And then alteration the arrangement ambush the victim, for example, broiled into a new game, almighty hacker programs, etc., is to arch to the victims actually execute it. The Trojans are generally accomplished without any acknowledgment, so in quietly, many of the victims when they admittingt it was scatastrophe the file is damage-old and no best avoid it. If there is more alert user,[link widoczny dla zalogowanych], the above methods may make them a bad doubtable, so we acquired a aloofer of alloyed program. 1. Look! 2.
difoliory
Trojan horse story is in ancient Greek legend, the Greek siege of Troy, no less than Jiugong affiliation, then pretend to retreat, abrogation a huge alveolate horse, I do not know on account of the Trojan apostles, the Trojan horse into the city as a trophy operation. The break of the asleep of night, the Greek soldiers hiding abdomen Trojans opened the gate, the fall of Troy. Later ancestors often use \Trojan Trojan is also the name of the famous computer. |
|