Seven weapons of the Red Guest Empire

zhaozj2021-02-16  63

If you are prawns, this article doesn't have any value for you, if you are a little bird, then come in and see. This article introduces seven common hacker tools, enough to arm to teeth. At the same time, this paper also gives defense measures to deal with these seven tools, you can strengthen vigilance. 1. The ice river (http://yaya2000.home.chinaren.com/binhe1.zip). The most sophisticated Trojan in the country. Sentence truth, if this software makes a regulation

The commercial remote control software is definitely not inferior to the bulky, using complex pcanywhere, but unfortunately, the author makes it hacked

Part. This software division server-side (controlled) version and client (control terminal) version are an executable file, the client icon is a Swiss army

The knife, the server, it looks like a negligible program, but this procedure is enough to make your computer become someone else's palm. After a computer implemented the server software software, several ports of the computer are open to the outside. If you enter this computer's IP address in the client, you can fully control

This computer. Since most personal IP addresses are random, the client software has an IP scan tool that automatically scans an IP section infected.

Computer, once found, this computer is facing the disaster of a top. Since the iceberg is broadcasted, it can be found within ten minutes.

Infected unfortunaters. Defense Measures: The latest version of anti-virus software. This hacker tool is greatly backed, and most anti-virus software recognizes, but the software is upgraded, anti-virus software is

If you upgrade in time, it will inevitably have omissions.

2, iphacker (http://yaya2000.home.chinaren.com/iphacker.zip), this is a tool to attack others with a "security vulnerability test". This one

The software attacks according to the vulnerability of the Windows series, and the light causing the Win98 blue screen to crash, and the Wealth will not start the WinNT server. And this software has

"Host Information Detection", "Port Scan", etc., you can detect the operating system of the remote computer and the open port. Defense measures: patch. Don't be too lazy to get the unbearable patch package, many times, these "patch" can save our computer.

3, OICQ "Patch" (http://yaya2000.home.chinaren.com/oicq1201.zip). This is a very interesting software, known as OICQ

Ding ", in fact, a adaptive OICQ detector, you can detect your friends' IP address, if you use the" iPhacker "above, the consequence is you

OICQ "friends" were attacked. As shown in the figure, add this "patch" OICQ show a window that displays the other party IP: Defense measures: Because it can easily find your IP, the consequences are very serious (if used in conjunction with the IP attack tool ...). Try not to use OICQ,

Because of the design problem, the OICQ confidentiality is particularly poor. It has become a "test field" that hackers often takes experiments. Many hackers are from black OICQ. If

Don't have your friend, then add "Friends Verification" in the system settings, unreliable people don't add a list of friends. Or use the proxy server, if you use a generation

If it is, it attacks that the great guy will let him crash!

4, Superscan 3.0, personalized by Lion, download address: http://go.163.com/ ~leyaya/superscan.zip, there are a lot of functions, powerful performance, fast, detect all IP sections in Taiwan (the response value is less than 200MS) is only 6 hours. You can view the IP address and domain name to scan all the online owners of an IP segment.

The machine and its detectable port number. And you can save and import all detected information. Defense measures: Defense measures to iphacker.

5, file bundle of experts. (Http://go.163.com/ ~leyaya/binder.exe) This destined guy has the functions that are not available in other similar software: pressure

Shrink. Many file bundles have no compression, and the two software bundles can be seen through the size of the file, but this file bundle is uniquely compressed and

Quick decompression function, make the merged software may be as large as the original file. So, if you receive a beautiful screen saver, it is impossible to bundle the ice.

Trojan! Defense measures: Do not perform unknown software, do not download software from unreliable small sites, any program, you must use the latest anti-virus software to check before

use.

5, email terminal (http://yaya2000.home.chinaren.com/mailbomb.zip). Among the similar bombs, the principles are basically consistent, nothing more than rising your mail

The box allows you to get Email normally. Defense measures: Try to pay less people on the Internet J, don't leave the Email address, enabling filtering function (the general website has this service), approve

Big email (such as Zhonghua Net 88M, Sina 50m).

7, stream. Xiaoxia software download. This ghost software can almost make a person who has just used the mouse to become a professional hacker, the author almost uses the network

Some vulnerabilities and designed crack programs for various vulnerabilities. Defense measures: Since it integrates a variety of scanning methods, it is difficult to prevent it, dealing with it is not online J, or use the fire prevention described below.

wall. How to further enhance defense measures? In addition to trying to be careful, it is best to use a firewall. Of course, it is recommended to recommend the best domestic personal firewall - Tianwang, many websites have

Download, but I recommend you to go to China.com, Sina.com or Tianwang homepage download, don't say more? Tianwang almost makes up for all communication vulnerabilities under Win98 and Win2000, and very sensitive (total than is not sensitive), often transfer some normal files

Be a hacker invasion. But this does not hinder this firewall software to become excellent software, it is more difficult to be free for such free software free registration, free use, even

Do not register does not affect the use. Email: chesheng913@yahoo.com.cn

转载请注明原文地址:https://www.9cbs.com/read-16506.html

New Post(0)