Home> Common Problem> body text

What behaviors may lead to the installation of Trojan horse programs on your computer

(*-*)浩
Release: 2019-11-16 11:57:11
Original
15985 people have browsed it

What behaviors may lead to the installation of Trojan horse programs on your computer

Downloading files from unknown sources, unfamiliar emails, and inadvertently browsing some websites or web pages containing malicious code may cause Trojan horse programs to be installed on your computer.

The most common method used by hackers to trick others into executing Trojan horses is to turn Trojan horses into image files, such as photos, etc. It should be said that this is the most illogical method, but it is the most common method. The method of recruiting people is effective and practical. (Recommended learning:web front-end video tutorial)

As long as the intruder pretends to be a girl and changes the file name of the server program (such as sam.EⅩE) to the name of a "similar" image file, then Pretend to send the photo to the victim and the victim will execute it immediately.

Why is this an illogical method? The extension of an image file cannot be exe at all, and the extension of a Trojan horse program must basically be exe.

Usually experienced users will not confuse image files and executable files, so many intruders do nothing but call Trojan programs an application.

It is not easy to detect in time that a user's computer is infected with a Trojan.

The Trojan will be very smart and "restrained" when occupying the user's computer resources. "It will always monitor the CPU resource consumption of the user's computer. For example, if the user is playing games and the CPU usage is too high, the Trojan will The use of this computer for mining will be suspended to prevent users from noticing it.

The mining Trojan does this not because it has too much "professional ethics", but to avoid excessive use of CPU resources during operation, causing the computer to It is too slow and generates heat, so it is discovered by the user. Once the user leaves the computer and the computer is turned off, the "lurking" Trojan will start mining at full speed on the computer.

Use external devices of unknown origin (U disk, mobile hard disk, etc.)

There are worm viruses hidden in many U disks or mobile hard disks. When we insert these U disks into the computer, these worm viruses will be copied immediately into the computer. As a result, a Trojan horse program is installed.

When we browse unsafe websites, many small boxes of unknown origin will pop up. If we accidentally click on these small boxes, it may cause the computer to Trojan horse programs are installed by others, causing computer poisoning. It affects the use of the computer and leaks information on the computer.

Receive spam from unknown sources

##Yes The Trojan horse program will be hidden in the email. When we receive such an email and open it on the computer, it is possible that the computer has a Trojan horse program installed.

Therefore, when using the computer, we must Turning on the firewall can prevent some Trojan programs from attacking the computer to a certain extent. At the same time, the computer must be disinfected regularly.

The above is the detailed content of What behaviors may lead to the installation of Trojan horse programs on your computer. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:php.cn
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template
About us Disclaimer Sitemap
php.cn:Public welfare online PHP training,Help PHP learners grow quickly!