What damage does Trojan horse do to computer
It will accelerate the aging of graphics card
in order to make money, the graphics card works continuously for 7x24 hours and runs at full load. Some people will overclock the graphics card in order to earn more money. The general home game graphics card is not designed for this kind of use environment at all. Long time full load operation will lead to accelerated aging of the graphics card, Generally, the life of the graphics card used for half a year of mining is longer than that of the normal use of the players for three years, so now the major brands have made strict restrictions on the quality assurance of the cards
< H2 > extended data:
principles of computer Mining:
starting from the essence of bitcoin, the essence of bitcoin is actually the special solution generated by a bunch of complex algorithms. A special solution is one of the finite solutions of a system of equations. Every particular solution can solve the equation and is unique. In the metaphor of banknotes, bitcoin is the number of the top word of a banknote. If you know the number of the top word of a banknote, you will have the banknote
and the process of mining is to constantly seek the special solutions of the equations through huge amount of calculation. The equations are designed to have only 21 million special solutions, so the upper limit of bitcoin is 21 million
to mine bitcoin, you can download the special bitcoin computing tools, register various cooperation websites, fill the registered user name and password into the computing program, and then click the operation to officially start. After completing the installation of bitcoin client, you can directly obtain a bitcoin address. When others pay, you only need to paste the address to others, and you can pay through the same client
after installing the bitcoin client, it will assign a private key and a public key. You need to back up the wallet data containing your private key to ensure that your property is not lost. Unfortunately, if the hard disk is completely formatted, personal bitcoin will be completely lost
in the process of development, blockchain has gone through three stages
blockchain 1.0. In this stage, it is mainly to realize digital currency, core nodes and front-end tools
the biggest feature of blockchain 2.0 at this stage is that it supports smart contracts, one of the representative procts is Ethereum. In Ethereum, the smart contract is used to develop the contract program, and finally deployed in the blockchain ledger
blockchain 3.0 blockchain goes beyond the scope of digital currency and regards blockchain as a wide range of solutions, which can be combined with other fields by using blockchain technology
however, many domestic blockchain related projects stay in the stage of blockchain 1.0, and one of their basic modes is to publish white papers, issue digital currency and go to the stock exchange, Then in accordance with the market, trading to earn profits
however, there may be some MLM money, air money and so on. What we can do is to take this kind of thing with a rational eye and not to invest blindly
a complete "Trojan horse" program consists of two parts: "server" and "controller". It is the "server" part implanted into the seeded computer, and the so-called "hacker" uses the "controller" to enter the computer running the "server". After running the "server" of the Trojan horse program, one or several ports of the planted computer will be opened, so that hackers can use these open ports to enter the computer system, and there will be no guarantee of security and personal privacy
A virus is a piece of computer code attached to a program or file, which can spread among computers. It infects computers as it spreads. Viruses can damage software, hardware and files
virus (n.): code written for the purpose of self replication. The virus attaches to the host program and then attempts to spread between computers. It can damage hardware, software, and information
like human viruses classified by severity (from Ebola virus to common influenza virus), computer viruses can be divided into light and heavy ones, light ones only proce some interference, heavy ones completely destroy equipment. It is gratifying that the real virus will not spread without human operation. It must be moved together by someone sharing the file and sending an email
"Trojan horse" is the full name of Trojan horse, which originally refers to the story of ancient Greek soldiers hiding in the Trojan horse to enter the enemy city and occupy the enemy city. On the Internet, "Trojan horse" means that some programmers (or unscrupulous grooms) contain malicious programs that can control the user's computer system or steal the user's information through e-mail in their downloadable applications, game plug-ins or web pages, which may cause the user's system to be damaged, information lost or even paralyzed< First, the characteristics of Trojan horse
Trojan horse belongs to customer / service mode. It is divided into two parts, client and server. The principle is that one host provides services (server side), and the other host receives services (client side). As a server, the host usually opens a default port to listen. If a client makes a connection request to this port of the server, the corresponding program on the server will run automatically to allow the client's request. This program is called a process
generally, Trojans mainly search for backdoors and steal passwords. Statistics show that the proportion of Trojans in viruses has exceeded a quarter. In recent years, Trojans are dominant and will become more and more serious in the next few years. Trojan horse is a kind of special virus. If it is used as a software, it will be planted on the computer. When surfing the Internet in the future, the control of the computer will be completely handed over to the hacker. He can steal the password, information card number and other confidential information by tracking the keystroke input, and can also track, monitor, control, view and control the computer Modify data and other operations< In the process of using the computer, if you find that: the computer reaction speed has changed significantly, the hard disk is constantly reading and writing, the mouse does not listen, the keyboard is invalid, some of its windows are closed, new windows are inexplicably opened, the network transmission indicator light has been flashing, and no big program is running, However, the system is getting slower and slower, the system resource station is used a lot, or a program is not reflected when it is running (this kind of program is generally not big, from tens to hundreds of K), or the firewall detects that an email is sent when a program is closed... These abnormal phenomena indicate that your computer is infected with trojan virus<
Third, the working principle of Trojan horse and the introction of manual killing
because most players don't know much about security issues, they don't know how to clear the "Trojan horse" in their computer. Therefore, the most important thing is to know the working principle of "Trojan horse", so it will be easy to find "Trojan horse". I believe that after reading this article, you will become a master of "Trojan horse" If you can't be an expert, I suggest you use rubber band to hit the glass of bamboos. Haha)
"Trojan horse" program will try every means to hide itself. The main ways are: hide yourself in the taskbar, which is the most basic, as long as the visible property of form is set to false. If showintaskbar is set to false, the program will not appear in the taskbar when it runs. Invisible in Task Manager: it's easy to disguise yourself by setting programs as "system services"
A. startup group class (that is, the file group that runs when the machine starts)
of course, Trojans will start quietly. Of course, you don't expect users to click the "Trojan horse" icon to run the server every time they start (no one will be so stupid, right?)“ Trojan horse "will automatically load the server every time the user starts, and the method of automatically loading the application program when the windows system starts," Trojan horse "will be used, such as: startup group, win.ini, system.ini, registry and so on, which are good places for Trojan horse to hide. Load trojan through win.ini and system.ini. In Windows system, the two system configuration files win.ini and system.ini are stored in the C: Windows directory. You can directly open them in Notepad. We can modify the "load = file. Exe, run = file. Exe" statement in the windows section of win. INI file to achieve the purpose of Trojan automatic loading. In addition, the boot section in system.ini is normally "shell = explorer. Exe" (graphical interface command interpreter of windows system). The following specific talk about "Trojan" is how to automatically load
1. In the win.ini file, under [windows], "run =" and "load =" are possible ways to load "Trojan horse" programs, so we must pay close attention to them. In general, their equal sign is followed by nothing. If you find that the path and file name are not familiar with the startup file, your computer may be on the "Trojan horse". Of course, you have to see clearly, because many "Trojans", such as "aoltrojan Trojan", disguise itself as command.exe file. If you don't pay attention, you may not find that it is not the real system boot file
through the C: windowswinininit.ini file. Many trojan horse programs do some small actions here. This method is often used in the process of file installation. After the program is installed, the file will be executed immediately. At the same time, the original installed file will be deleted by windows. Therefore, the concealment is very strong. For example, in wininit.ini, if the rename section has the following content: nul = C: windowspicture.exe, This statement sends C: windowspicture.exe to nul, which means that the original file pictrue.exe has been deleted, so it is very hidden to run
2. In the system.ini file, there is a "shell = file name" under [boot]. The correct file name should be "explorer. Exe". If it is not "explorer. Exe", but "shell = explorer. Exe program name", then the following program is the "Trojan horse" program, that is to say, you have been in the "Trojan horse"
win.ini and system.ini files can be viewed through "run" in the "start" menu. Just enter "msconfig" in the "run" dialog box and click "OK" Here we must note that if you do not know much about the computer, please do not enter this command or delete the file inside, otherwise you will be responsible for all the consequences and losses. Banzhu and I are not responsible.)
3. Frequently check the files listed below, and Trojans may be hidden in
C: & # 92; windows\ Winstart.bat and C: \ windows\ Winnint.ini, autoexec.bat
b, Registry (registry is the registry, people who know computer know it at a glance)
1, load from the menu. If the automatically loaded files are added directly through customization on the windows menu, they are usually placed in the "start - & gt; Procere - & gt; In Win98 explorer, the location is "C: Windows startup programs startup". When a file is loaded automatically in this way, it is usually stored in the following four locations in the registry:
HKEY_ CURRENT_ USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ ShellFolders
HKEY_ CURRENT_ USER\ Software\ Microsoft\ Windows\ CurrentVersion\ Explorer\ UserS! hellFolders
HKEY_ LOCAL_ MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ explorer\ UserShellFolders
HKEY_ LOCAL_ MACHINE\ Software\ Microsoft\ Windows\ CurrentVersion\ explorer\ Shell folders
2. In the registry, the situation is the most complicated. Click "hkey-local-machine & # 92; Software\ Microsoft\ Windows\ CurrentVersion\ "Run" directory, check the key value to see if there are any unfamiliar auto start files, the extension is exe, here remember: some "Trojan" program generated files are very similar to the system's own files, want to muddle through by camouflage, such as "Acidbattery v1.0 Trojan", it will register the form "hkey-local-machine & # 92; SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Change the key value of explorer under "run" to "C: &" 92 "; WINDOWS\ There are only "I" and "L" differences between the "Trojan horse" program and the real explorer. Of course, there are many places in the registry where you can hide "Trojan horse" programs, such as: "hkey-current-user & # 92; Software\ Microsoft\ Windows\ CurrentVersion\ Run”、“HKEY-USERS\**** 92; Software\ Microsoft\ Windows\ CurrentVersion\ It's possible in the "run" directory. The best way is in the "hkey-local-machine" directory; Software\ Microsoft\ Windows\ CurrentVersion\ Find the file name of "Trojan horse" program under "run", and then search the whole registry
3_ CLASSES_ ROOT\ exefile\ shell\ open\ Command =
"1" * ", if the" 1 "in it is modified as a Trojan horse, the Trojan horse will start once every time the executable file is started. For example, the famous glacier Trojan horse uses TXT
1. Stealing our online game account, threatening the security of our virtual property
2. Stealing our online banking information, threatening the security of our real property
3. Using instant messaging software to steal our identity, spreading trojan virus
4. Opening the back door to our computer, so that our computer may be controlled by hackers
1. Joke virus is not destructive, but it will cause certain interference to users
2. To control the virus, you will generally control your computer, leaving a back door so that you can enter and leave your computer at will and steal your privacy
3. Number stealing: you can steal your game account< Destructive: directly destroy your computer system and files. Cause the file to be deleted, lost, infected, etc. The plot is very serious
the first and second are usually not infectious. The third and fourth are highly infectious~