Position: Home page » Pool » How to be implanted by mining machine Trojan horse

How to be implanted by mining machine Trojan horse

Publish: 2021-04-26 05:09:51
1. This trojan takes advantage of the "eternal blue" vulnerability to attack and spread in the local area network. It builds a robust botnet of the infected machine, supports the self-renewal of the intranet, and lurks in the computer for a long time to extract Monroe money. Because most ordinary personal computers have been patched by windows security update and Tencent computer manager and other security software, they are basically not affected by wanna miner. It is suggested that if the suspected wanna miner mining Trojan horse is found, the poisoned machine can be located and isolated in time. It can be judged by scanning port 26931. If the port is open, the host has been infected; If you need to patch the intranet, all the computers that have not been patched. It is suggested that professional terminal security management software should be installed in the whole network, such as Tencent Yudian. The administrator should carry out mass antivirus and patch installation for the whole network to avoid unnecessary losses.
2. In view of such Trojan invasion, it is recommended to install security software for protection
Download Tencent computer manager and turn on the real-time protection function

once you browse the virus webpage or download the virus software, you will give a security warning
if there is a virus invasion, you can immediately prompt and kill the virus
3. Now there are more and more mobile phone viruses, such as downloading any software or entering any trojan website, which may lead to the occurrence of mobile phone poisoning, so what should we do if the mobile phone is poisoned? There are many kinds of mobile phone poisoning, such as relatively easy to kill viruses. You can install anti-virus software to scan and kill viruses. If you can't kill viruses, you can format memory card, hard grid or soft grid. Now let's share the three solutions for mobile phone poisoning< Method 1: anti virus

Step 1: how to deal with mobile phone poisoning? First, connect the data line of mobile phone to the computer, but the computer must be equipped with anti-virus software. If 360 security guard, rising anti-virus software and so on are OK

Step 2: check and kill the virus after the mobile phone is connected to the computer

Step 3: after the computer detects the virus, it is enough to clean up the virus< Step 1: first, turn on the mobile phone and enter * # 7370 #

Step 2, you will be asked to enter the initial password, which is generally 12345, which is the password in general

Step 3: restore the mobile phone to the factory mode, so that the virus in the mobile phone can be removed< First, turn off the mobile phone and press the dialing key, "*" key and "3" key at the same time

Step 2. Turn on the power until the power on interface appears. It must be noted that you can't release any key in this process. Be careful that the hard box will not succeed

Step 3. Wait a few seconds until the word "forming... /" appears, then release the key

Step 4. After a few minutes, the system format is completed, the mobile phone will automatically restart and enter the standby screen, and re-enter the time of the mobile phone.
4. Unfortunately, I'm not a local one, but I'm a professional one. If there is a virus in my mobile phone, you can give priority to some anti-virus software. If there is a phenomenon of mobile phone fee dection after anti-virus, then you have to consider "brush solution", because brush can completely remove all the files in the mobile phone system and re install them, However, pay attention to the selection of the brush package. You should go to a safe and regular website to download it, so as to avoid downloading the brush package that already contains viruses or fee dection plug-ins,
5.

You can install anti-virus and other security software on your mobile phone to detect whether there are malicious programs

if there is a virus in the mobile phone, the recommended operation is:

1. Back up the important data (contacts, photos, memos, etc.) and restore the factory settings

2. If the problem still exists, it is recommended to bring the purchase invoice and Three Guarantees certificate and send the mobile phone to the after-sales service center for inspection and maintenance

extended data

prevention

1

random code SMS and MMS may contain virus, so delete them immediately after receiving them to avoid virus infection

Do not accept strange requests

when using wireless transmission functions such as Bluetooth and infrared to receive information, you must choose a safe and reliable transmission object. If there is a strange device requesting connection, you'd better not accept it. Because as mentioned earlier, mobile phone viruses will automatically search for wireless devices to spread viruses

3. Ensure the security of download

there are many resources on the Internet that can be downloaded by mobile phones, but some resources are bundled with viruses, which requires users to ensure that the download site is safe and reliable when using mobile phones to download various resources, and try to avoid downloading from personal websites

6. Hello
first of all, it is recommended that you install the genuine anti-virus software, install Jinshan drug bully, and uninstall the trial version of Kaspersky and 360 guard. You can install another Tencent computer manager. This can not only avoid computer poisoning again, but also optimize with Tencent computer to ensure the smooth operation of the computer
at present, since you reformatted the hard disk, it should not be a Trojan horse problem. Because the hard disk format, the computer should be empty, without any corresponding program
after formatting, it is recommended that you install a formal version of the system, just win7 professional version. There is no need to install it as a flagship version
then install Kingsoft and Tencent computer manager. Other security software and optimization software do not need to be installed
any questions are welcome
I hope I can help you!
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750