Increasingly, PC users are faced withthe dangers trapped in the network, and they have to comprehend at least the basics of protection from intruders. Hacker utilities are programs that harm remote computers. By themselves they are neither Trojan platforms nor viruses and can not cause any harm to all local devices on which they are installed. However, this problem is becoming more important every day. Let's study the question.
What programs are related to hacking utilities
К этим программам относятся:hacker tools for automating the generation of viruses, Trojans and worms, designed to create such software; software libraries, utilities that hide the code of "sick" files from anti-virus checks (file encryptors); various "jokes" that complicate the work with the device; programs that tell the user false information about the actions in the system; Other utilities that cause damage to a remote or a given computer in one way or another.
Fighting hacking tools
Since the day the hacking tools have appeared,began and the fight against them. Developed a lot of software for this. In this article we will consider part of it. HackTool. This program is used by various intruders when attacks are organized on a remote or local computer. For example, a user is added unauthorized to the list of allowed visitors to the system; purging logs to hide what was present in the system.
"Hoax", virus hoaxers
These are hacking tools that do not cause directharm, but they deduce fraudulent reports that harm has already been done or will be inflicted under certain conditions, or inform the user of a hazard that does not exist. Such "jokes", for example, include programs that frighten the user with different messages about the formatting of the logical disk, although it was not, display various virus-like, strange notices, etc.
Protection from hacker utilities Trojan-Dropper.Win32.Agent.albv
Is a program forunauthorized hidden installation by the user on the victim-device of malicious programs that are located in the body of this Trojan. Recommendations for the delete operation are as follows. Complete the malicious process by the task manager. The file is deleted and deleted in the system registry, the key is one parameter. You need to delete one more file:% WinDir% systemsvhost.exe.
The program of electronic espionage Trojan-Spy.Win32.PcGhost.340
Hacking tools and protection against them - the theme noweternal and constantly relevant. This program is designed to conduct electronic espionage for the user himself (screenshots, input information, a list of active applications). The information received in this way is always transmitted to the attacker. And for this, HTTP, FTP, e-mail and other methods are used. The deletion options are standard, only the files are different. We end the Trojan process with the task manager.