The function of the glacial Trojan

  
Computer security is becoming more and more important in today's society. Among them, the Trojan horse program that jeopardizes computer security is the biggest. The following is a brief introduction to the basic situation of the glacial Trojan. In 1999, the glacial Trojan was born. The glacial Trojan itself is a powerful remote control software. However, after the launch, hackers discovered their powerful functions and directly used the glacial Trojan as a tool to launch the invasion. Therefore, the current glacial Trojan is the domestic leading Trojan and is made in China. Trojan logo and synonym. The following describes the function of the glacial Trojan. The glacial Trojan can automatically track the screen changes of the target computer in the LAN, and can fully simulate the keyboard and mouse input, that is, the computer operation of the other party can be completely seen; the various password information appearing in the dialog box, such as the power-on password, can be recorded. Screen saver password, wireless network password, and more. The glacial Trojan can easily obtain the other computer system information (computer name, system path, operating system version, etc.), and can limit system functions (remote shutdown, remotely restart the computer, lock the mouse, etc.) for remote file operations (create, upload) , download, copy, delete files). The glacial Trojan can also perform a variety of registry operations such as browsing, adding, deleting, copying, renaming primary keys, and reading and writing key values. In addition, the unique feature of the glacial Trojan is that it can send short messages to the target computer in four commonly used icons, and chat online with the target computer in the form of a chat room.  
Copyright © Windows knowledge All Rights Reserved