Blocking Privacy Disclosures - Demystifying Spyware

  
In real life, our personal privacy is often leaked, and most of the behind-the-scenes are spyware. The following system home Xiaobian, take everyone to see how spyware steals secret data, and the corresponding preventive measures. hope its good for U.S.. Self-diagnosis, spyware in yours, spyware, as the name suggests, is a type of software that can lurk in our computer like a spy and run quietly in the background. It collects users' online habits, automatically connects to malicious websites, and some steals user privacy files and sneaks them to designated servers. In general, if your computer has always had one or more of the following symptoms, then it is very likely that you will be recruited: 1. The computer does not have any Internet activity, but the desktop has always popped up an advertisement or XX game recommendation window. 2. My system settings have been changed inexplicably, such as the IE home page was changed to XX URL navigation, and can not be changed back. 3. The computer runs slowly, the resource manager can often stop responding, or the desktop can be suspended from time to time. 4. Some confidential information leaked by myself, such as QQ password is leaked for no reason, resulting in QQ being stolen. There are many kinds of harms to your privacy that are leaked by spyware. For example, pop-up advertising game pop-ups from time to time, or secretly record the websites you visit, these hazards are relatively small. The most annoying and most harmful of spyware is stealing your confidential information, such as private photos, QQ passwords, Alipay passwords, etc. The disclosure of such information may result in the loss of your property. So how does spyware steal your secrets and transmit them? From the perspective of how spyware obtains information, it is mainly divided into passive and active. Passive means that spyware manufacturers passively obtain information through software installed on the user's computer, such as many hacking spyware. The workflow is generally like this: first by placing a specific download code on a website, forum or blog page. Once the user visits these pages, the spyware will be automatically downloaded to the user's computer for installation, or by mail, USB flash drive, etc. In order to avoid the killing of anti-virus software, spyware mostly uses the normal process such as Explorer.exe to steal data. Spyware generally includes an in-memory data reading module and a mail sending module. Because the user temporarily stores the QQ account, password, etc., the information is temporarily stored in the memory, so the spyware reads the memory in the pre-compiled code. information. After getting the information in the memory, the mail sending module in the spyware will send the email containing the user password information to the specified mailbox, so that the spyware manufacturer can easily steal your QQ account. Proactive means that the spyware manufacturer directly invades the user's host or web server to obtain information, such as many spyware with hacker software. After installing these software on a computer, they use websites or user system vulnerabilities to invade users' computers through various hacking tools, directly view user privacy information, or transfer user files (such as photos, private documents, etc.) to spyware. The manufacturer, which causes the disclosure of personal privacy data. Tip: In addition to spyware on the computer, spyware on mobile phones is also an accomplice to personal privacy leaks. Because with the popularity of mobile phones, many people take pictures on mobile phones, save photos, use mobile banking transactions, use mobile QQ, WeChat, etc. These are personal privacy data. It's easier to get user privacy data through spyware. For example, Android application, as long as you add a call and SMS permission statement when developing a spyware application, after installing the application, the user can secretly send the user's private data through SMS in the background. In the hands of spyware. Precautionary, spyware VS anti-spyware through the above introduction, I believe you have already understood the harm of spyware. So how can we effectively prevent it in daily operations? 1. Use the system's own firewall spyware to steal confidential information to be transmitted to the network server must go through the network, the system's own firewall is a good tool for managing network transmission. For example, if you suspect that your computer has spyware, but can not find out which program, we can use the Windows 7 firewall to intercept. First click “start →run”, enter secpol.msc, open the local security policy dialog box, expand “security settings →senior security Windows Firewall →senior security Windows Firewall& rdquo;, then select “properties&rdquo ;, in the properties window that opens, the domain configuration file, the dedicated configuration file, and the public settings configuration file are set as follows: Firewall Status: Enabled (Recommended) Inbound Connection: Block all connected outbound connections: After blocking the above settings , return to the local security policy settings window, right click "“outbound rules → new rules", and then you need to use the connected programs such as QQ, IE, etc. to allow outbound rules for your own machine, so even if you are in the process of spyware It also loses its damaging effect due to the lack of network connectivity. 2. Protecting the use of firewalls with professional third-party anti-spyware software requires a certain computer foundation. For ordinary users, professional third-party anti-spyware software, such as 360 security guards, has anti-spyware capabilities. After starting the program, switch to <; Trojan killing & rdquo;, click & ldquo; full scan & rdquo; for spyware killing. 3. Tablets, smart phones can not be taken lightly With the popularity of mobile devices, more and more spyware is eyeing them. These devices can be protected by Kingsoft Internet Security, etc. After you open the drug tyrant on your mobile phone, you can scan and kill spyware by clicking on “Comprehensive Medical Check”. For suspicious spyware, we can also click on "App Behavior Management" to switch to "Privacy", then select the suspicious program and choose to decline the privacy permission, so that the spyware can be disabled from reading the privacy file. . As the saying goes, "Flies are not licking seamless eggs". Many users have spyware, which has a lot to do with their operating habits. For example, often install some cracked, pirated software, so it is easy to recruit spyware. Therefore, we usually develop some good operating habits, such as using genuine software as much as possible, the software should be downloaded to the official website as much as possible, do not visit the vulgar website, regularly update the virus database and system updates, etc., will also increase security. This article comes from [System Home] www.xp85.com
Copyright © Windows knowledge All Rights Reserved