Interpretation of years to explore what is truly safe Peak in the clouds – cloud
HC Network Security November 4, 2009 afternoon, some domestic well-known thorn Kingsoft Internet media interview, Executive Director Mr. Chen Yong, around the anti-virus
Technology Discussion of this topic started.
Three changes in the virus transmission mode
The virus this year compared to last year's run, in the mode of transmission has three changes:
The first is the horse or the virus linked to all the main channels, but there are clear downward trend in 2008 largely through the spread of viruses linked to Malaysia accounted for 85% of the entire Internet, only 45% this year. We analyze what the main decline for two reasons: on the one hand, this year's anti-virus software integration with network protection functions. On the other hand, is linked to Malaysia mainly by a handful of groups linked to the control, this year happens to be antagonistic in this respect, to national and
Olympic Games Security work, was more severe blow to hang horse lean group.
The second is the proportion of normal software to download increased, the proportion from last year's 10% to 40%, compared to the mode of transmission linked to horses, there are more hidden, but not easy
Monitor And tracking. Third is advertising fraud, phishing will become the new security focus, mode of transmission is very mature, and basically is the application of some of the Internet
Marketing Spread. Analysis network linked to horse thieves and car thieves
Steal a bike first before check out the location, check out the location after the second group of people in the past, lock, your key is my prized open, but he is not responsible for stolen bicycles. Third person responsible for pushing the bike away, there are some people doing it? Stolen bikes is to come up with to sell. Understanding of the links in accordance with the four horses of our linked group corresponding to each role he is very consistent.
Inside check out the location that is
Hacker , Including some hackers attack code, the hackers were primarily in the Internet sites to find some loopholes in our check out the location to see that some people are the same.
End point step after doing downloader, downloader later sold him hanging horse group, probably every one is 23 million, he would calculate the user's antivirus software
Damage Out, will not let you do your running, and the Trojan downloaded.
The third is the Trojan studio, studio is primarily for Trojan horse, Trojan running game after the main current account is stolen. So we say Downloader object it is to fight against anti-virus software, but the object is to fight against Trojan games.
The last link is to steal some of this information, take to use.
This is a tool the user is linked to a model horse, first of all user access to certain websites linked to horses, these sites are often linked to some of the normal horse website, or the more well known sites, like some large
Company Some of the official website, or some of the more well-known community forum, there are loopholes in them, be used by hackers, and was hung horse. These linked sites have a hidden connection Ma, will point to a vicious web site URLs are often linked to these vicious horse control him, there will be some downloader. When the user when the machine loophole, met malignant software, will the download manager to download to your machine up, then download the finished later users to download Trojans.
We say that the number of websites linked to Malaysia is very much present, according to our statistics are the millions, and the frequency of high horse today is linked to and found this link after the horse removed, but the new site is linked to Ma. The malicious website with the download device is relatively small, it is from 100 to 1000 volume, the Trojans have a lot of, basically 10 million dollars. So we said that this attack model against hanging horse, or horses against hanging the group is the middle of this session, the technical level to block these malicious sites and downloading, and not linked to horse web site.
The e-commerce company in China offers quality products such as Diaphragm Wall Equipment , china CFA Equipment, and more. For more , please visit drilling rigs suppliers today!