攻击个人电脑手法(Attacks on personal computers).docVIP

  • 5
  • 0
  • 约9.03千字
  • 约 7页
  • 2017-09-01 发布于河南
  • 举报

攻击个人电脑手法(Attacks on personal computers).doc

攻击个人电脑手法(Attacks on personal computers)

攻击个人电脑手法(Attacks on personal computers) Commonly used attacks on personal computers You surf the network, people chat with you, and you send e-mail, you must have a common agreement, this agreement is the TCP/IP agreement, any network software communication is based on the TCP/IP protocol. If the Internet is the highway network, computer is a roadside houses, houses have a door you can access the TCP/IP agreement, the computer can have 256 times 256 door, from 0 to 65535, door, the TCP/IP protocol called it the port. When you send email, E-mail software gave the letter to the mail server port 25, when you receive the E-mail software from the mail server port 110 in the door to win, I write the things you see now, is the 80 port access server. The newly installed personal computer opens the port number of 139 ports. When you are on the Internet, it connects with the outside through this port Systematic. Hackers are not gods, so are they Enter your computer via the port How does a hacker get into your computer? Of course, also based on the TCP/IP protocol through a port into your personal computer. If your computer has a shared directory, then the hacker can access your computer via port 139, and pay attention to it! WINDOWS has a defect, even if you set the shared directory how long passwords, a few seconds can get into your computer, so youd better not set up a shared directory, do not allow other people to view your computer information. In addition to port 139, hackers cant hack into your personal computer if no other ports are open. So how did hackers get into your computer? The answer is to enter your computer through the Troy trojan. If you accidentally run the Troy Trojan, some port of your computer will be open, and the hacker will enter your computer through this port. For example, there is a typical Trojan horse software called netspy.exe. If you accidentally run netspy.exe, then it will tell WINDOWS, then every time the computer will run it, then opened a

您可能关注的文档

文档评论(0)

1亿VIP精品文档

相关文档