Development of the Internet to the present, bringing convenience to people, but also nourish a growing number of viruses, Trojans, and now the network to steal important information, files and important information of the case has not rare, and even intensified, and with hiding back quietly, "stealing" Trojan horse of different user privacy, the new Trojan virus emerged in recent years the consciousness of the user to "grab" and even direct "threat to blackmail." Daohao threat Traditional Daohao Trojan if compared to the "thief", then this new form of Trojan horse is "bandits." Such software is called "extortion Software (Ransomware)" or "blackmail virus." Usually "blackmail virus" will encrypt the user's important documents, or hidden, and explicitly require users to pay in exchange for important documents. Such as "Agent Trojan variant AYV (Trojan.Agent.ayv)" blackmail virus is a typical virus, which requires users to pay 300 dollars to re-obtain their own access to encrypted files. Then the "natural forest (Trojan.Ransom)" virus will ask users to Western Union money transfer (WesternUnion) paid 10.99 U.S. dollars to the hacker, or they will delete a file every 30 minutes until payment is received. And that a wider spread in the Russian regions "GP code (Harm.Gpcode)" virus, is used RSA260 bit and 330 high-strength encryption algorithms on the user's important files encrypted, and blackmail. Subjected to the virus attacks the user must be a professional information security vendors to look for help "lost" document. Last year China experienced the first large-scale extortion virus spread?? Process killer variant Q (Trojan.KillProc.q), the Trojan will run after the user's Word documents, Excel spreadsheet files and RAR and Zip compression packages and other important file hidden. At the same time on the desktop to establish a "rescue disk. Txt" file, the content along the lines of: "Your hard drive data lost, because the phone's strong currents affect the normal hard disk read and write, you must use the disk repair tools to retrieve lost data files to save, but you are not using genuine software is pirated, you have to save the lost data restoration and purchase of licensed software as soon as possible .... " The virus also in the Start menu's "annex" the group generated called "repair disk information" shortcut. Users run the "repair disk information" program (malware), it will prompt the user to transfer to an account to retrieve hard drive data. Software Description Read the above examples of Trojan extortion theft and robbery, you are not in the information for their computer, file fear, actually thinking we might another, pre-emptive armed their important information, documents, first will be important folders, file encryption, so not only can prevent online hacker Robbery, you can prevent your computer front is not, the other person with evil intentions peek. Jiaotusanku encryption is a lock to help you achieve this wish a good helper, as Jiaotu general, so that the "enemy" no start. We are high quality suppliers, our products such as Linear Bearing , China Cylindrical Roller Bearing for oversee buyer. To know more, please visits Angular Contact Ball Bearing .
Related Articles -
Linear Bearing, China Cylindrical Roller Bearing,
|