- 5
- 0
- 约9.03千字
- 约 7页
- 2017-09-01 发布于河南
- 举报
攻击个人电脑手法(Attacks on personal computers)
攻击个人电脑手法(Attacks on personal computers)
Commonly used attacks on personal computers
You surf the network, people chat with you, and you send e-mail, you must have a common agreement, this agreement is the TCP/IP agreement, any network software communication is based on the TCP/IP protocol. If the Internet is the highway network, computer is a roadside houses, houses have a door you can access the TCP/IP agreement, the computer can have 256 times 256 door, from 0 to 65535, door, the TCP/IP protocol called it the port. When you send email, E-mail software gave the letter to the mail server port 25, when you receive the E-mail software from the mail server port 110 in the door to win, I write the things you see now, is the 80 port access server. The newly installed personal computer opens the port number of 139 ports. When you are on the Internet, it connects with the outside through this port
Systematic. Hackers are not gods, so are they
Enter your computer via the port
How does a hacker get into your computer? Of course, also based on the TCP/IP protocol through a port into your personal computer. If your computer has a shared directory, then the hacker can access your computer via port 139, and pay attention to it! WINDOWS has a defect, even if you set the shared directory how long passwords, a few seconds can get into your computer, so youd better not set up a shared directory, do not allow other people to view your computer information. In addition to port 139, hackers cant hack into your personal computer if no other ports are open. So how did hackers get into your computer? The answer is to enter your computer through the Troy trojan. If you accidentally run the Troy Trojan, some port of your computer will be open, and the hacker will enter your computer through this port. For example, there is a typical Trojan horse software called netspy.exe. If you accidentally run netspy.exe, then it will tell WINDOWS, then every time the computer will run it, then opened a
您可能关注的文档
- 怎开网店(How to open an online store).doc
- 怎样做一个好店长(How to be a good store manager).doc
- 怎样做好服装销售员(How to do a good job as a clothing salesman).doc
- 怎样做笔记(How to take notes).doc
- 怎样利用博客推广自己的网店(How to use the blog to promote their online shop).doc
- 必修5词汇语法精讲(Required vocabulary and grammar 5).doc
- 怎样做好化学教学资料收集和整理(How to do a good job of collecting and arranging teaching materials for Chemistry).doc
- 怎样培养孩子的注意力(How to develop children's attention).doc
- 怎样培养自学能力360(How to develop self-learning ability 360).doc
- 怎样培养读书习惯(How to cultivate reading habits).doc
- 广东省广州省实验中学教育集团2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州大学附属中学2025-2026学年八年级上学期奥班期中物理试题(解析版).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(含答案).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第八十六中学2025-2026学年八年级上学期期中物理试题(解析版).docx
- 广东省广州市第八十九中学2025-2026学年八年级上学期期中考试物理试题(含答案).docx
- 广东省广州市第二中学2025-2026学年八年级上学期期中考试物理试题(解析版).docx
- 2026《中国人寿上海分公司营销员培训体系优化研究》18000字.docx
- 《生物探究性实验教学》中小学教师资格模拟试题.docx
最近下载
- 《专业工程管理与实务》.pdf VIP
- 中国血栓性疾病防治指南(2025版).docx VIP
- 施工质量日志-.xls VIP
- 2025年国家公务员全国总工会面试题及答案.docx VIP
- 合肥市普通高中六校联盟2025-2026学年高三第一次语文教学质量监测+答案.docx VIP
- 局部晚期食管癌患者新辅助免疫治疗与常规新辅助治疗的比较:系统评价和meta分析.pdf
- 2025以骑手为代表的新就业群体研究报告:职业技能与跑单时长对收入的共同作用.pdf VIP
- 年产一亿片别嘌呤醇的车间工艺设计.doc VIP
- 商务型(带电梯、地下室、效果图)三层别墅设计图.pdf VIP
- 2026年详版个人信用报告征信报告最新Word可编辑模版样板doc文件.docx
原创力文档

文档评论(0)