Computers, Security
Hacking tools and examples of protection from them
Increasingly, PC users are faced with the dangers that lurk in the network, and they have to comprehend at least the basics of protection from intruders. Hacker utilities are programs that harm remote computers. By themselves they are neither Trojan platforms nor viruses and can not cause any harm to all local devices on which they are installed. However, this problem is becoming more urgent every day. Let's study the question.
What programs are related to hacking utilities
These programs include: hacker tools for automating the generation of viruses, Trojans and worms, designed to create such software; Software libraries, utilities that hide the code of "sick" files from anti-virus checks (file encryptors); Various "jokes" that complicate the work with the device; Programs that tell the user false information about the actions in the system; Other utilities that cause in one way or another damage to a remote or a given computer.
Fighting hacking tools
Since the day the hacking tools have appeared, the struggle with them has begun. Developed a lot of software for this. In this article we will consider part of it. HackTool. This program is used by different attackers when attacks are directed to a remote or local computer. For example, a user is added unauthorized to the list of allowed visitors to the system; Purge logs to hide what was in the system.
"Hoax", virus hoaxers
These are hacking utilities that do not cause direct harm, but they deduce fraudulent reports that the harm has already been caused or will be inflicted under certain conditions, or inform the user of the danger that does not exist. Such "jokes", for example, include programs that frighten the user with various messages about the formatting of the logical disk, although it was not, display various virus-like, strange notices, etc.
Protection from hacker utilities Trojan-Dropper.Win32.Agent.albv
It is a program for unauthorized hidden installation of a malicious program on the victim-device , which are located in the body of this Trojan. Recommendations for the delete operation are as follows. Complete the malicious process by the task manager. The file is deleted and deleted in the system registry, the key is one parameter. You need to delete one more file:% WinDir% \ system \ svhost.exe.
The program of electronic espionage Trojan-Spy.Win32.PcGhost.340
Hacker utilities and protection from them - the theme is now eternal and constantly relevant. This program is designed to conduct electronic espionage for the user himself (screenshots, input information, a list of active applications). The information received in this way is always transmitted to the attacker. And for this, HTTP, FTP, e-mail and other methods are used. The removal options are standard, only the files are different. We end the Trojan process with the task manager.
Similar articles
Trending Now