Chapter 886: Penguin Guard: Professional Trojan Hunt

Trojan viruses.

There are two types of computer viruses, one is a virus that is destructive to a computer, and the other is a Trojan horse that is not harmful to a computer.

Essentially, viruses and Trojans work on the same principle, they are both viruses.

It's just that viruses are generally designed to damage computer systems, and they only have a destructive effect.

But Trojans are different.

Generally speaking, Trojan horses do not damage the computer, and you will not notice anything abnormal in the computer after the user has fallen for the Trojan. He doesn't affect the speed of the computer, and he doesn't break the computer system. Trojans, however, love to steal. He is good at disguising himself as a normal boot program, but once the user starts the computer, once he hits the Trojan horse, all the accounts and passwords on the computer may be stolen by the Trojan horse.

Not only that, Trojans can not only steal the user's account password, but at the same time, the Trojan can sometimes remotely monitor the computer, and even treat these computers as the meat machine of some hackers.

Naturally, this Trojan virus has also become the target of monitoring by major antivirus software.

However, seeing this post, Zhang Ning had a different idea.

Undoubtedly, Trojans are also viruses.

However, Trojans are sometimes distinguished from viruses.

Although traditional antivirus software can kill Trojan horses, antivirus software is still in the stage of antivirus in people's cognition. In other words, everyone thinks that antivirus software is virus-killing. Although Trojans are also viruses, not everyone knows about them. It looks like this is an opportunity.

Why should users install antivirus software because they are worried about a virus on their computer?

Once you get a virus, your computer may not boot up, or something messy may pop up.

However, Zhang Ning thinks.

Compared with a virus in a computer, users are most worried not about a destructive virus, but about a Trojan horse. That is, they are worried about their account being compromised. Like bank accounts, game accounts, online shopping accounts, instant messaging accounts...... Wait a minute. If these accounts are stolen, it will be impossible to find the original account, or it will directly cause their own economic losses. Like the bank account number, if it is stolen, it will be a real loss.

Since Penguin Defender can't enter the anti-virus field for the time being, why not launch a Trojan detection function first?

Although a Trojan is the same as a virus, the Trojan does not want to damage the system, and at the same time, the Trojan must install a backdoor on the computer. In other words, Trojan horses are more complex than viruses in nature. Not only does he have to hide, he also needs to steal, and this series of functions is inevitably easier to detect than viruses.

From a technical point of view, it is undoubtedly easier to detect and kill Trojans than viruses.

Great, let's let Penguin Defender add the ability to detect and kill Trojans.

Soon, Zhang Ning directly informed Zhou Hongwei to immediately start developing the function of detecting and killing Trojans.

The progress of a qiē is very smooth, and the function of checking and killing the Trojan horse is quickly completed.

In just 3 days, Penguin Defender has successfully added the option to kill the Trojan.

This is not because of Zhou Hongwei's high efficiency, nor is it because of Penguin's technical strength.

The reason why it is so fast is entirely because of the previous 360 antivirus, and he already has the function of detecting and killing Trojans.

Yes, any antivirus software, he can detect and kill Trojans.

Moreover, it is much easier to detect and kill Trojans than to detect and kill viruses.

Zhou Hongwei only needs to implant the Trojan function in the original 360 antivirus into Penguin Guard, and one qiē is fine.

However, although it was successfully implanted, Zhang Ning did not launch it so quickly for the time being.

Before launching the Trojan horse function, Zhang Ning also needs to publicize it to the outside world.

For example, publicize the dangers of Trojan horses.

At the same time, I also take this opportunity to popularize some knowledge about Trojan horses to the public.

Of course, the most important thing is that when the Trojan horse was popularized, it was when Penguin Defender was launched.

……

Penguin Company once did a Trojan virus survey, and the survey showed that 9 percent of netizens were attacked by Trojan viruses, and only 5% were spared. Trojan viruses are ubiquitous, and we can be invaded by Trojan viruses or malware when we shop online, chat online, and even carry MP3s with us.

This is a Trojan horse special made by Zhang Ning.

In order to do a good job in this topic, and in order to completely popularize the Trojan horse into the user's brain, Zhang Ning completely mobilized almost all the resources of Penguin Company this time.

Weibo, Facebook, Penguin Video, and even the Yahoo website with Yahoo Inc., the Yahoo search engine.

According to the statistics of domestic and foreign security vendors, Trojan horses, whose main goal is to "steal digital property and snoop on other people's privacy", have replaced viruses as the most threatening online public enemy to netizens. In the past year, there have been 9743122 Trojans and malware in the world, up from just 731849 in 2002, a 13-fold increase in one year.

In a recent survey conducted by Penguin, 71 answered the question "What are the bad things you are most worried about when surfing the Internet?" 78% of Penguin netizens prefer viruses and Trojan horses, and 5% of netizens believe that it is illegal fraud information and pornographic/pornographic information on the Internet. 17。 6% of netizens are most worried about rogue software and plugins.

From the perspective of the purpose of the attack, it has become a common phenomenon for Trojan viruses to steal the accounts of victim users such as online games and instant messaging. 42。 81% of Penguin netizens believe that Trojan viruses can cause the theft of online game accounts and instant messaging passwords,26. 41% of netizens believe that it will affect the security of online banking and e-commerce.

There are three main types of Trojans.

First, the mare downloader.

According to security experts, in the past week, "Mare Downloader" has continued to rank among the top three in the global security center's Trojan horse detection and killing list with an average daily detection volume of more than 1 million. As of the 13th, the Trojan and its mutated malignant Trojan have occupied five of the top six on the killing list, becoming the first high-risk Trojan in 2004.

The Trojan bundles a large number of other Trojans and viruses that disrupt the work of security software. Once it is executed, thousands of "Trojan horses" will be generated, and even if the same computer is hit, a variety of different symptoms will randomly appear after being hit, which shows that its update frequency and mutation ability have reached an unprecedented situation. Many antivirus software cannot completely eliminate it, and most of them will even be "counter-killed" and destroyed by the Trojan.

Second, hijacking browser Trojans.

This is one of the most common types of Trojans.

If you get hit by this Trojan, the homepage of the browser will be changed to a different address.

Third, fishing Trojans.

Fake information to send winning notifications to users to lure them to phishing pages.

This is also a common Trojan horse, and many users click on some unsafe web pages without knowing or realizing it. And once you click on these pages, then the user has been tricked.

Common propagation methods and solutions of Trojan horses.

1: Trojan propagators will spread mass e-mails with malicious code embedded in them, and if such emails are opened without discrimination, the computer will be quietly implanted with a Trojan horse.

Solution: Do not click on word, ppt and other blessing documents and links sent by strangers through guò email. If you can't confirm whether it is safe, use the browser super security mode to open it, and scan the word and other blessing documents with antivirus software before opening them.

2: Phishing websites take the opportunity to publish some deep discounts or "special" information through guò emails or online advertising links to lure netizens into being deceived.

Solution: If the user finds that the website that has been logged in appears "Log in again" and other prompts, be sure to pay attention to the address bar

Whether the URL link in has been changed.

3: Chat tools have always been a common channel for the spread of Trojans and viruses. This kind of spam can even be automatically sent when the netizen is not online.

Solution: Do not open any suspicious links sent by others through the chat tool. After confirming that you have been "tricked", you should remind the sender to change important passwords such as msn, Facebook, and e-commerce websites in a timely manner.

4: Mobile phones and mp3s with storage functions can also spread Trojan viruses. In particular, some digital products with improper sources have been implanted with Trojan viruses or malware before they are sold.

Solution: Before connecting removable storage media including digital products to the computer, make sure that the computer has installed security software with the USB flash drive firewall function, try to turn off the USB flash drive autoplay function of the computer, and always use the latest system vulnerability patches.

It's just a pity that although we have such and such tricks to deal with Trojans, Trojan viruses still have various ways to attack our computers. If we accidentally fall into the Trojan horse, we will lose all Internet accounts, bank cards, e-commerce transaction passwords, etc., and bring a lot of economic losses.

At the same time, we are also very sad.

Trojan viruses have risen to become the number one virus threat in the world, but before that, there was no system security software in the world that specializes in detecting and killing Trojans. Most of the popular antivirus software on the market emphasizes antivirus. While we believe that antivirus is also important, we prefer to see a world without Trojans than the threat of Trojans.

However, there are always some people who can detect these dangers.

After the launch of system cleaning, system maintenance and other functions, Penguin Guardian once again shocked the launch of the Trojan horse killing function.

This software is the world's first professional Trojan detection and killing software.

At the same time, with system vulnerability updates, detection and killing rogue software, cleaning processes, optimizing the system and other functions, Penguin Defender can completely make the Trojan have nowhere to hide.

The focus is often at the end.

After introducing what a Trojan horse is, what are the dangers of a Trojan horse, the types of Trojan horses, and the transmission routes of Trojan horses, the most important thing is the launch of Penguin Guard.

If you're worried about the danger of Trojans to your computer, then use Penguin Defender.

If you're worried about losing your game account, use Penguin Defender.

If you're worried about the threat of online shopping, then use Penguin Guard.