Chapter 447: Analyzing the Virus
Text [Rise of the Dragon] Chapter 447 Analysis of the Virus Ding Peng heard Li Hua say this. He also sat down and handed a glass of water to Li Hua in his hand, "Brother Li, what's going on?" Ding Peng asked.
"Your 'Growing Up' forum info page has been hooked with a Trojan horse. Now there are a lot of victims, do you know about it? Li Hua's tone was very anxious.
"What?" Ding Peng was shocked that the cup he was holding in his hand fell to the ground and shattered.
Ding Peng's expression was something Li Hua expected, because Ding Peng always thought that his server would be very safe if it was hosted in the same computer room as Meida Company, but he didn't expect such a problem to occur, but the fact was that there was not a problem with the server.
Ding Peng was stunned for a while before he reacted. "Then, Brother Li, what now? Tell me about the situation. Now Ding Peng's tone became very anxious.
Li Hua paused, and then said: "Your forum news page was hung up with a Trojan horse, this Trojan was discovered by Brother Wen of the Sword League, if it weren't for him, I may not be able to believe that your website was hung by the horse, this Trojan horse is very harmful, he will automatically read the information of Internet users and monitor the process of the browser, if it is found that the user logs in to the Internet banking or Taobao and uses the payment password to pay, the virus code will quickly infect your browser, Next, the virus code will also automatically detect whether the main program has functions that will trigger file operations, such as: open, close, copy and other common operations, and hook these operations to infect these operation functions, because it must be so that the virus can unconsciously send the bank account passwords and certificates of the people who have fallen into the Trojan to the author of the virus program, when I came out to find you, Huaxia has more than 3000 cases of users' online property being transferred, I think it is because of the infection of the Trojan virus. Li Hua explained.
After listening to Li Hua's words, now Ding Peng finally knows why someone in the forum said that the money from the online bank disappeared, it turned out that his website was hung up by a Trojan horse.
"So what now? Brother Li, I..." Ding Peng is at a loss now, and he doesn't know what to say.
Li Hua immediately stood up from the sofa at this time and said to him: "You take me up right now, and I'll see if your computer has been hacked." In fact, Li Hua originally wanted to say that he would check the server first, but after thinking about it, he found that it was very likely that Ding Peng's computer was the target.
"Okay." Ding Peng hurriedly agreed, and then he took Li Hua upstairs, and his steps were very fast, because they all knew that if they were slow, one more person might be tricked.
"Xiaopeng, who's coming?" Ding Peng's mother shouted at him from the room.
"It's my friend, Mom, it's none of your business, continue to practice your yoga!" After Ding Peng finished speaking, he took Li Hua into his room.
When Li Hua saw Ding Peng's computer, he smiled, "You guy actually bought this one." Li Hua said.
"Hey, whoever called them came out with 5 units, I bought it for double the price, it's not bad." Ding Peng said.
Li Hua did not argue with him on the issue of the computer, but moved the mouse, the desktop was displayed, the system is the latest Microsoft system, "Windows7 Ultimate Edition", Li Hua looked at the taskbar in the lower right corner, which displayed the icon of the perfect guard, Li Hua opened the system log with apprehension, but the result was nothing, but Li Hua was not discouraged, and then Li Hua opened the Windows7 dedicated personalized management, Finally, when I looked at the junk file, I found an anomaly, there was a lot of stack data, "Did you leave the computer in the morning?" Li Hua asked.
Being asked by Li Hua like this, Ding Peng immediately nodded, he remembered that when he had lunch before, his mother asked him to come over for dinner, and he had left the computer at that time, "Yes, I left the computer during lunch dinner..."Ding Peng replied.
"What were you doing on your computer when you left?" Li Hua continued to ask.
Li Hua's question was true, and Ding Peng suddenly realized at this time, "When I left, I was still in the management panel of the forum, and I was in a state of login. Ding Peng now finally knows why the screensaver was so early, it turned out that his computer was tampered with.
When Li Hua heard this, "That's really the case." Li Hua said.
"Brother Li, what now?" Ding Peng is now regretting it.
"What else can I do, since things have happened, criminals are targeting the time before you leave the computer to operate your computer, you have become their broiler, which is equivalent to their puppet, do whatever you want your computer to do, the reason why they can commit the crime as soon as you leave the computer, it must be because your computer camera is forced to open, and these are not enough, a few years ago, the foreign hacker community has been able to control the sound card, the emergence of listening to the Trojan, The bottom line is that your every move is under their watch. When Li Hua said this, he immediately opened the recycle bin, and he put a USB flash drive he carried with him into the computer.
But Ding Peng was now shocked into a cold sweat, "Brother Li, then according to what you say, then the content of our current conversation and we are not all seen by them?" Can you still catch someone like this? Ding Peng suddenly said worriedly at this time.
Suddenly Li Hua showed a smile, "You just lack the experience of these knowledge, what you understand is only one-sided, hackers are never as powerful as imagined, but it is not simple, to tell you the truth, the person who can make the program alive is the best hacker, proficient programming knowledge is always the highest standard of hacking, so, if you want to be a qualified hacker, it is not to catch chickens, D some websites can be called, because these will be done by anyone, after all, the tool is someone else's, and other people can also do it with this tool, so say, Everyone's standard for measuring hackers is different, in my eyes, 'God is stupid' is the only person who can be regarded as a super hacker, because there is nothing he can't do in the online world, isn't it, and other hackers can only be regarded as top hackers, because the difference between the top and the super is not one or two points, which can be seen in the hacker war and the Weihua network war. Also, I was disconnected from the internet when I moved the mouse to exit the screensaver to activate the desktop, do you think I wouldn't think of that, hehe? Li Hua smiled, and then opened the drive letter of the USB flash drive.
Ding Peng was stunned for a moment when he heard this, but now he suddenly understood a lot of truth from Li Hua's words, "Thank you, Brother Li, you have made me understand a lot." Ding Peng said with a smile.
Li Hua patted Ding Peng's shoulder, and then said meaningfully: "After all, you are still young, and when you are exposed to more things, you will understand after recognizing some events, and the computer is actually a very wonderful thing." For example, some people like to play games online, this kind of person belongs to the people who are played by the computer, because the source of computer games is written by people, and the pictures are also rendered by people, and that kind of person will play that game, which means that you are being played by something made by others, and people are higher than you. There is also a kind of people who really play computers, this kind of people don't need me to say you know, that is, those who write programs or make game engines, of course, hackers are also counted, they are proficient in computers, the system is thoroughly studied, basically they can do the computer completely personalized, such as building their own operating system, as far as I know, there are countless operating systems in the world, a lot better than Microsoft's Windows system, It's just that those people don't easily release their sweat to others to share, so playing with the computer and being played by the computer are two different things, and it depends on your own choice. Li Hua said a long sentence again.
At this time, Ding Peng respected Li Hua even more, not because Li Hua knew a lot of things, but because of his unique vision and opinions, this time Ding Peng did not speak, he quieted down and watched Li Hua's next operation.
I saw Li Hua running a software called "Super Recovery" from the USB flash drive, the interface of the software is very streamlined, there are only two buttons, recovery and repair, when the software is opened, it automatically reads the data that has been deleted on the computer, and then only needs to click on the recovery, and there is no need to repair the bad sectors like other programs, etc., Li Hua finally found clues from the recycle bin at this time, There is a HackTom.exe file inside, Li Hua knew that this must be a hacking program as soon as he saw the name, so he did not hesitate to choose to restore this program, the speed of recovery is very fast, it can be described in seconds, after a while, the recycle bin reappeared HackTom.exe Trojan program, Li Hua ran the perfect antivirus without networking, but did not query it, Li Hua thought that this Trojan horse is not killing well, and even VC's antivirus engine can't be found.
Li Hua clicked on the USB flash drive at this time, and he found a software called "virtual analysis" from it, the biggest feature of this software is that it can be run after it, if you quit, the system will be restored to the moment it is run, so there is no need to be afraid of being infected with a virus, and Ding Peng couldn't help but sigh at this time, the people of the Ministry of Internet Information are many such super software, you must know how much benefit it will bring if such software comes out.
Li Hua ran the software at this time, after running the software, the software will automatically create a snapshot of the system, which is equivalent to "copying" the system first, if there is an accident, you can "paste" it back in time, which is very convenient, because the configuration of Ding Peng's computer is very top-notch, so the working speed of the software has also accelerated a lot.