Traditional Culture Encyclopedia - Traditional virtues - How to kill IRC Trojan virus?

How to kill IRC Trojan virus?

The harm of Trojan horse program is enormous, which exposes users' computers to the control and monitoring of hackers at any time. Hackers can easily steal users' data by using the backdoor established by Trojan horse programs, and transmit it to the designated computer, which is much more harmful than the traditional virus that can only destroy users' data. Therefore, it is of great significance to effectively detect and remove Trojan horse programs to ensure computer security.

Typical symptoms of infection with "Trojan horse"

In the process of using the computer, if you find the following phenomena, it is very likely that you are infected with the Trojan horse:

The response speed of the computer has obviously slowed down.

The hard disk is constantly reading and writing.

Keyboard and mouse are not controlled.

Some windows are closed for no reason.

Open a new window for no reason.

The network transmission indicator is flashing all the time.

Without big programs running, the system is getting slower and slower.

System resources occupy a lot.

Running a program does not reflect (such programs are generally relatively small, ranging from a dozen K to several hundred K)

The firewall detected an email when closing the program.

Your password has changed suddenly, or others know your password or private information.

Files are lost without reason, and data is deleted without reason.

Prevention of "Trojan Horse"

With the rapid development of Internet, Trojan horse is becoming more and more aggressive and harmful. Although the Trojan horse program has such destructive and hidden means, it is still a computer program in essence, and it can only work after running, so it will leave clues in memory, registry and system directory, and we can "catch it" through "killing" and "killing".

We can install personal antivirus software and personal firewall software; Install system patches in time; Ignore emails and plug-ins of unknown origin; Always go to a safe website to keep abreast of the latest information.

Of course, users can also choose a professional Trojan horse killing tool-Trojan horse defense line, which integrates killing, monitoring, management and upgrading. It can not only kill malicious programs such as Trojans, but also block computer ports through the built-in Trojan firewall to fully protect computers.

Here is a brief introduction:

Troy (Trojan horse)

There are many kinds of Trojans with complex behavioral characteristics.

Troy. Bomb: Trojans named after this prefix can delete user files or destroy sector information, resulting in user file loss, system failure and other problems.

Trojan.psw: Trojans named after this prefix are thieves who steal users' passwords. They can steal users' system passwords or passwords such as email, icq and oicq, and send them to the designated mailbox or irc channel.

Trojan.irc: IRC: Backdoor script in IRC channel.

Mirc: backdoor script mIRC: mIRC channel.

Troy. Eyedropper: Trojan binding and camouflage tool, which can bind Trojans to other files.

Hacking tool (hacking tool)

Many hacking tools do not destroy the data of the hacked machine itself, but can attack or scan other users' machines through the machine. There are several different hacking tools here.

Denial of service attack tool. Attackers can attack other nodes by remotely controlling and manipulating the user's computer system.

DDOS: Distributed denial-of-service attack tool, which can attack a target from multiple nodes, resulting in target paralysis.

Flooding: flooding the target IP with flooding packets, resulting in node paralysis.

back door

Trojan named after backdoor is called remote control Trojan, which is a common harmful program, including server and client. The server is parasitic on the invaded machine, opening one or more ports and waiting for the connection of the client.

Some machines in public places may be "planted" on the server side of backdoor tools, and users may also receive server-side programs transmitted by attackers from mail, icq, msn, oicq or mIRC. Some backdoor tools don't have a special client (control terminal). In fact, they quietly open web, telnet or ftp services on the invaded machine, thus stealing user resources.

Worm (worm)

Worm is a harmful program with self-replication ability through e-mail, IRC, mIRC or other network channels.

I-worm: Also known as network worm, it spreads through e-mail, ftp and web services.

IRC-worm: a worm that spreads through the IRC channel.

MIRC-worm: a worm spread through mirc channel.