You are here: hacking technology > the virus to be related > Content
Hot Articles
Recommend Articles
New Articles
How does the Trojan Horse assume the partisan tactics to kill the poisonous software to accept a cha
  Add date: 07/10/2008   Publishing date: 07/10/2008   Hits: 59
Total 2 pages, Current page:1, Jump to page:
 
In the security domain, first viral C-Brain appeared since 1987, for long virus's maker (“hacker”) was some have the profound technology in everybody's mind moreover to like the practical joke indignant blue. Their compilation virus's goal is to the web cam demonstrate that their technical ability, or is to challenge these is known as the software empire, 100% kills poisonous or the safety protection company, lets its face countenance through the profound technological attack sweep the floor. However, to 2006, after Yangtze River, before the wave pushes the wave, one batch start the main manufacturer who under the benefit actuation's hackers becomes the security threat. They are realistic, advocate trade the money by the technology, simultaneously cautiously hides itself. This had decided they develop the wooden horse spy software has guerrilla warfare's some typical characteristics:
¡¡¡¡Reasonable choice combat place, pointed
¡¡¡¡Reasonable choice combat place, pointed: A wooden horse disseminates in view of one kind of specific crowd or the application, moreover behind has the benefit actuation the factor. Typical has aims at the net to tour, virus specially and so on net silver, QQ, MSN. Once they obtain the account number password, hypothesized either the reality property or the private dense information, the classified document, the web cams face the serious loss personally.
¡¡¡¡The small scope dissemination, the small scale makes a harassing attack
¡¡¡¡The small scope dissemination, the small scale make a harassing attack: In order to increase the malicious software's validity, prevents to discover rapidly by the security manufacturer that the malicious software's disseminator starts through the reduction dissemination scope, the expanded attack number of times way to attack each kills the poisonous software greatly.
¡¡¡¡The distortion technology contest kills the poisonous manufacturer
¡¡¡¡Lot manufacturing, through Internet fast deployment, reasonable choice combat opportunity: Distortion technology's and so on encryption, Canadian shell day-by-day popularizations enable the malicious software's lot manufacturing evil intention software to become the reality. Even if the web cams have the visit identical website frequently, each time infects the malicious software is not possibly same. This is the virus instead with Mao Zedong Thought that the manufacture virus's vast ocean, causes to kill the poisonous software and to kill the poisonous manufacturer to be unable to make ends meet, deals with difficulty.
¡¡¡¡The partisan tactics retreats rapidly
¡¡¡¡The fight ended retreats rapidly: The Trojan Horse has the very short term of validity generally, moreover basic is the disposable use, belongs to type which is exposed to light dies. Once some virus can kill the poisonous software to look up kills, this virus's enulls immediately in black market transaction price.
¡¡¡¡The global security problem attention first place's zero date attacks (0day) is one typical partisan tactics. “zero date attack " has brought the enormous threat for each scale's organization. Now, these are not decided the benefit actuation's aggressors compose each kind special-purpose, and the complex malicious software, attempts before the specific application software repair or the issue crack has not used these cracks. However, those who are worth everybody thinking deeply: Facing 0day is head's guerrilla individual contribution, has killed the poisonous software to prepare?

 
Other pages: : 1 * 2 * Next>>
Prev:The resistance kills the poisonous software Next:Careful ¡°hard disk devil¡± destruction hard disk district table

Comment:

Category: Home > the virus to be related