If you are prawns, this article doesn't have any value for you, if you are a little bird, then come in and see. This article introduces seven common hacker tools, enough to arm to teeth. At the same time, this paper also gives defense measures to deal with these seven tools, you can strengthen vigilance. 1. The ice river (http://yaya2000.home.chinaren.com/binhe1.zip). The most sophisticated Trojan in the country. Sentence truth, if this software makes a regulation
The commercial remote control software is definitely not inferior to the bulky, using complex pcanywhere, but unfortunately, the author makes it hacked
Part. This software division server-side (controlled) version and client (control terminal) version are an executable file, the client icon is a Swiss army
The knife, the server, it looks like a negligible program, but this procedure is enough to make your computer become someone else's palm. After a computer implemented the server software software, several ports of the computer are open to the outside. If you enter this computer's IP address in the client, you can fully control
This computer. Since most personal IP addresses are random, the client software has an IP scan tool that automatically scans an IP section infected.
Computer, once found, this computer is facing the disaster of a top. Since the iceberg is broadcasted, it can be found within ten minutes.
Infected unfortunaters. Defense Measures: The latest version of anti-virus software. This hacker tool is greatly backed, and most anti-virus software recognizes, but the software is upgraded, anti-virus software is
If you upgrade in time, it will inevitably have omissions.
2, iphacker (http://yaya2000.home.chinaren.com/iphacker.zip), this is a tool to attack others with a "security vulnerability test". This one
The software attacks according to the vulnerability of the Windows series, and the light causing the Win98 blue screen to crash, and the Wealth will not start the WinNT server. And this software has
"Host Information Detection", "Port Scan", etc., you can detect the operating system of the remote computer and the open port. Defense measures: patch. Don't be too lazy to get the unbearable patch package, many times, these "patch" can save our computer.
3, OICQ "Patch" (http://yaya2000.home.chinaren.com/oicq1201.zip). This is a very interesting software, known as OICQ
Ding ", in fact, a adaptive OICQ detector, you can detect your friends' IP address, if you use the" iPhacker "above, the consequence is you
OICQ "friends" were attacked. As shown in the figure, add this "patch" OICQ show a window that displays the other party IP: Defense measures: Because it can easily find your IP, the consequences are very serious (if used in conjunction with the IP attack tool ...). Try not to use OICQ,
Because of the design problem, the OICQ confidentiality is particularly poor. It has become a "test field" that hackers often takes experiments. Many hackers are from black OICQ. If
Don't have your friend, then add "Friends Verification" in the system settings, unreliable people don't add a list of friends. Or use the proxy server, if you use a generation
If it is, it attacks that the great guy will let him crash!
4, Superscan 3.0, personalized by Lion, download address: http://go.163.com/ ~leyaya/superscan.zip, there are a lot of functions, powerful performance, fast, detect all IP sections in Taiwan (the response value is less than 200MS) is only 6 hours. You can view the IP address and domain name to scan all the online owners of an IP segment.
The machine and its detectable port number. And you can save and import all detected information. Defense measures: Defense measures to iphacker.
5, file bundle of experts. (Http://go.163.com/ ~leyaya/binder.exe) This destined guy has the functions that are not available in other similar software: pressure
Shrink. Many file bundles have no compression, and the two software bundles can be seen through the size of the file, but this file bundle is uniquely compressed and
Quick decompression function, make the merged software may be as large as the original file. So, if you receive a beautiful screen saver, it is impossible to bundle the ice.
Trojan! Defense measures: Do not perform unknown software, do not download software from unreliable small sites, any program, you must use the latest anti-virus software to check before
use.
5, email terminal (http://yaya2000.home.chinaren.com/mailbomb.zip). Among the similar bombs, the principles are basically consistent, nothing more than rising your mail
The box allows you to get Email normally. Defense measures: Try to pay less people on the Internet J, don't leave the Email address, enabling filtering function (the general website has this service), approve
Big email (such as Zhonghua Net 88M, Sina 50m).
7, stream. Xiaoxia software download. This ghost software can almost make a person who has just used the mouse to become a professional hacker, the author almost uses the network
Some vulnerabilities and designed crack programs for various vulnerabilities. Defense measures: Since it integrates a variety of scanning methods, it is difficult to prevent it, dealing with it is not online J, or use the fire prevention described below.
wall. How to further enhance defense measures? In addition to trying to be careful, it is best to use a firewall. Of course, it is recommended to recommend the best domestic personal firewall - Tianwang, many websites have
Download, but I recommend you to go to China.com, Sina.com or Tianwang homepage download, don't say more? Tianwang almost makes up for all communication vulnerabilities under Win98 and Win2000, and very sensitive (total than is not sensitive), often transfer some normal files
Be a hacker invasion. But this does not hinder this firewall software to become excellent software, it is more difficult to be free for such free software free registration, free use, even
Do not register does not affect the use. Email: chesheng913@yahoo.com.cn