China Naming Network - Naming consultation - What kinds of Trojan viruses are there? Seek an answer

What kinds of Trojan viruses are there? Seek an answer

Different kinds of Trojans

Remote access to Trojans:

This is the most widely distributed Trojan horse. Everyone wants such a Trojan horse because they want to access the victim's hard drive. RAT (Remote Access Trojan) is very simple to use. As long as someone runs the server and you get the victim's IP, you will access his/her computer. They can do almost anything on your machine. In addition, RAT has the common features of remote access to Trojan: keyboard recording, uploading and downloading functions, starting "screen capture", etc ... This is not complete. But one of them is the best guide to using Trojan horses. You should read it.

There are quite a few popular Trollos, which are carved on the wheel hub and on the thistle and squid plants (3).

Of course, the Trojan will also create some files in the Windows\System directory. Those files always look like some normal Windows executable files to the victims. Most trojans are hidden in the Alt Ctrl Del dialog box. This is not good for some people, because they will only view the running process from the Alt Ctrl Del dialog box. Some software will tell you how the file runs correctly. But as I told you, some Trojans use deceptive names, which is a bit difficult for some people who know how to terminate the running process. When everyone can connect, Remote Access Trojan will open a port on your computer. Some Trojans can choose to change the port and set the password, so that only people infected with your machine can control the Trojan. Changing the port option is very good, because I believe you don't want your victim to see that port 3 1337 on your computer is open. Remote access trojans appear every day and will continue to appear. Use this Trojan horse: Look out! You will be infected yourself, and others will control the computer. You will be very bad! If you know nothing about them, then don't use them!

Password sending Trojan horse

The purpose of this Trojan horse is to find all hidden passwords and send them to the designated mailbox without the victim's knowledge. Most of these Trojans don't restart every time Windows restarts, and most of them use port 25 to send emails. There is a Trojan horse that sends emails and other information, such as ICQ numbers and computer information. These Trojans are dangerous if you have hidden passwords.

Keyboard recording of Trojan horses is very simple. They only do one thing, that is, record the keystroke of the victim and look for the password in the log file. According to the author's experience, this Trojan horse started with the start of Windows. They have options such as online and offline recording. In the online option, they know that the victim is online and record everything. However, when recording offline, everything will be recorded after Windows starts and stored on the victim's disk for moving.

The only function of this destructive Trojan is to destroy and delete files. This is because they are very simple and easy to use. They can automatically delete all. Dll or. Ini or. Exe file. This is a very dangerous Trojan horse. Once you are infected and are sure that you didn't kill it, your computer information will disappear.

FTP Trojan Horse

This Trojan opens the 2 1 port of your computer, and everyone can have an FTP client to connect to your computer, without a password, with complete upload and download options.

These are the most common Trojan horses. They are all dangerous things, so you should use them carefully.