Saturday, May 7, 2011

【 Weak current College 】 how to check your computer for someone else "broiler"


We definitely need regular check their computers are not intrusion, intrusion if found, will have to try every possible way to clear out a Trojan, when necessary, the preferred format reload nor give an attacker the opportunity to leave behind any.
Next, we introduce the "broiler" computer some phenomenon, remind users encounter these phenomena, it is necessary to pay attention to check. The final article will introduce several tools to help analyze the native security.
In 1: QQ, MSN login reminder of exception
When you log on QQ, prompted the previous login IP and you are completely irrelevant. For example, you obviously only in Shanghai's home on the QQ but remind your last login in Shenyang.
Also, when you log on MSN, you may have a friend you will receive your message, ask what you have just made a very clear, but you never give this what messages from your friends.
In 2: network game logs found equipment lost or your last location of the next line, even using the correct password to login
Obviously, you are not logged in this game, others have for your login.
In 3: sometimes suddenly found your mouse twitched, you do not move the mouse, the mouse will move, and click on the relevant button operation
You're not moving, it is that someone is moving. Note that this mouse movement trajectory and poor the optical mouse automatically shift markedly different. You can feel that this is someone in your computer.
4: normal Internet phenomena, suddenly feeling very slowly, and the hard drive light is flashing, just like you do in the COPY file
This situation is most likely attacker is attempting to COPY your files, in a large number of COPY paper, disk read and write clearly increases, the system will slow down. At this point, you should not hesitate to unplug the network cable, to immediately check your system processes is abnormal.
In 5: when you are ready to use the camera, the system prompts, the device is in use
Finished, an attacker has stolen your camera, in this case, the camera's operation is not visible.
We strongly recommend that you don't have the camera, the lens to the lid, the attacker can see dark images, you will understand what is the problem.
In 6: you are not using a network resource, you discover network card light flashing. If you set to display status when connected, you will also find the bottom right corner of the screen in a Flash card icon
Normally, when you use or instead of network resources, network cards blinking will not be obvious that the data passed over the network traffic will not be too high.
The above phenomenon, basic is subjective and not very accurate, but you need to call your attention.
Next, we can make use of some software for observation of network activities in order to check whether the invasion.
1. pay attention to check the status of the firewall software
For example, Jinshan Wangbiao. In the network status page will display the currently active network connection, carefully review the related connections. If you find yourself not to use the software to connect to a remote computer, you should be careful.
2. it is recommended to use tcpview, you can very clearly see the current status of the network's activities
General Trojans connection, is available through this tool to view the results.
In this connection, the General Trojans is distinct from some carefully constructed more clever Trojan's rootkit hidden technology not easily found.
3. use kingsoft cleanup specialists online diagnosis, pay particular attention to the full diagnostic process item
Cleaning specialist for each item for security assessment, when encountered an unknown item, require special care.
4. cleaning expert knowledge of the process manager
You can find a suspicious file, and give you a simple check for dangerous programs reside






No comments:

Post a Comment