Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Linux \ How to prevent page five invisible killer     - PostgreSQL export data dictionary documents (Database)

- Why everybody ought to know LLVM (Linux)

- Linux stand-alone OGG synchronous Oracle 11g DB test (Database)

- Hadoop2.0 configuration yarn success (Server)

- java.net.NoRouteToHostException of Hadoop problem: no route to host (Server)

- Linux, set and view environment variables (Linux)

- CentOS 5.5 kernel upgrade installation iftop (Linux)

- Linux Desktop allows exceptionally different launch applications (Linux)

- Ubuntu 14.04 to install file editor KKEdit 0.1.5 version (Linux)

- Linux daemon (Linux)

- The wrong in Linux: too many open files (Linux)

- Linux Study of --CentOS create local yum repository (Linux)

- Build and verify MongoDB3.0.7 version (shard + replica) Cluster (Database)

- Mahout source code analysis: FP-Growth algorithm parallelization (Programming)

- Installing PHP Memcache extension under Linux (Server)

- Linux boot process and run level (Linux)

- iOS GCD multithreading simple to use (Programming)

- Brief Linux commands (Linux)

- httpd-2.4 feature (Server)

- Postgres-X2 deployment steps (Database)

 
         
  How to prevent page five invisible killer
     
  Add Date : 2018-11-21      
         
         
         
  With the expansion of computer and network applications, computer information security danger facing and has caused losses also grown exponentially, especially an increase in all kinds of hackers, some of the individuals also often suffer different means of attack, which can not be not arouse our attention.

For individual users, in addition to viruses and Trojans, the code page of the invisible began a serious threat to our security, but most people have a lack of self-protection awareness, lack of awareness of the hazards hidden code that, even in his own knowledge of the the case of important information stolen by others. Because the code is invisible has a relatively large hidden, so far, no virus can be a good firewall to block invisible code attacks, most or even simply can not find. So we should be vigilant page code invisible killer. General page code in the "invisible killer" is broadly divided into the following categories.

1 CPU-invisible killer

By constantly consumes system resources of the machine, resulting in CPU occupancy rate of up to 100%, so that the computer can not handle other users' processes.

Typical mischief "invisible killer 1" JavaScript code is generated by an infinite loop. This code may be a malicious site appear to be sent to you as e-mail attachments. Most mail client programs can automatically invoke the browser to open the HTM / HTML file types. So as soon as you open the attachment, it will open numerous new browser window appears on the screen. Finally, so you have to restart your computer.

Avoid evil methods for such problems can only be a stranger Do not open attachments sent by mail.

2 stealth killer illegally read local files

This code of practice is typical in a Web page by calling Activex, JavaScript and WebBrowser control to read local files.

"Invisible killer 2" code than the "invisible killer 1" is characterized by relatively subtle expression, the average person is not easy to find hidden codes to read files on your hard disk. "Invisible killer 2" can use browser vulnerabilities to achieve its own Sha Zhao, as IE5.0 in IFrame vulnerability. Very simple few lines of code that you can read any IE local hard disk can open files.

Avoid evil ways by turning off JavaScript and always pay attention to Microsoft's security patch to resolve.

3 Web spoofing

The attacker scored the first goal of the machine is responsible for domain name resolution DNS server, and then reset the DNS-IP address to a superuser privileges he has won a host.

Such attacks rarely present in the country, but if successful, the harm is very large. And may be disastrous. Its attack is: a fake and target exactly the same environment he has won the super-user privileges that host to trick you surrender your user name and password. For example, our e-mail and even online bank account number and password. Because your face is the same yesterday and a environment, skilled typing in your user name and password when. I did not think the host is not real.

When the Internet method to avoid evil, it is best to turn off your browser's JavaScript, so an attacker can not hide the signs of an attack only when access familiar site to open it, although this will reduce the function of the browser, but I want to do this or worth it. There is not a link from unfamiliar sites to other sites, especially those links need to enter personal account name and password for the site.

4 user machine control invisible killer

At present such problems are mainly concentrated in the use of IE on the Actives.

We can now look at their own IE security settings to "Download signed ActiveX controls" option is now "prompt." But you may not know, IE still have the privilege to download and execute the program without having to prompt. This is a serious security problem, we may be in complete control of others unknowingly. Avoid evil methods in the registry

 HKEY-LOCAL-MACHINESOFTWAREMicrosoftInternet ExplorerActiveX Compatiblity "

Created under the "Active Setup controls" based on the new CLSID {6E449683-C509-11CF-AAFA-00AA00 B6015C} create value REGDWORD type under New: Compatibility Flags 0x00000400.

5 illegal formatted local hard disk

Hazards such code is large. As long as you browse its pages, your hard disk will be formatted.

This is not sensational, in fact IE ActiveX execution by leaving the hard disk is formatted is not a new vulnerability, early foreign hackers have discovered this issue in the last year, and released the source code, but was released the source code is a loophole Spanish version of Windows, if the direct Copy down the words for the Chinese version of Windows, and no use. But recently has been in the country for individual profile was found on the local hard disk formatted Chinese version of Windows code. If you browse pages containing such code, the browser will only be a warning that: "The current page contains incomplete ActiveX, may cause you harm," to ask you whether to perform. If you select "Yes", then your local hard drive will be a quick format, and because when formatting window is minimized, you probably did not even pay attention, and so on have been found too late.

Avoid evil methods for prompt appears similar in browsing the web, unless you know what they are doing, do not just answer "Yes." And said the message also can be modified, such as into a "Windows is to delete temporary files on this machine, and ask you if you continue", so be careful! Another: the native format.com, deltree.exe other dangerous rename command is also a way. Because we really want to use Windows DOS command these is not a lot, but a lot of macro viruses or dangerous code is directly calling these DOS commands, such as the famous domestic macro virus "July Killer", it is in the Autoexec.bat joined deltree c: / y.
     
         
         
         
  More:      
 
- 5 interesting Linux command line tips (Linux)
- Why is better than Git SVN (Linux)
- Configuring ftp server and nfs server under Linux (Server)
- Ubuntu 13.04 configure MyEclipse 10.7 Environment (Linux)
- MyCAT separate read and write to achieve MySQL Practice (Database)
- Linux SVN account password to save your settings (Linux)
- Zabbix monitoring Oracle Database use Orabbix plug (Enhanced Edition) (Database)
- Oracle physical storage structure outline (Database)
- Editor of the popular Linux Gvim (Linux)
- Ubuntu 14.04 LTS installed Hadoop 1.2.1 (distributed cluster mode) (Server)
- Hutchison DG standby database CPU consumption reached bottleneck repair (Database)
- Security of data to create a safe .mdb database (Linux)
- How to determine whether the Linux server was hacked (Linux)
- Exploring the Android Listview display confusion (Programming)
- Android Scroller call mechanism and the relationship of computeScroll (Programming)
- Linux hybrid character device (Linux)
- Linux log management make the system more secure (Linux)
- Offline (local) Yum source structures (Linux)
- Oracle Incident Packaging Service (Database)
- Linux detection command (vmstat) (Linux)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.