First, traffic Trojans are pirated. Trojan authors write trojans and trojans generators, do a good job of killing them (avoid killing them with antivirus software), and sell them or monopolize them to some powerful studios or bosses. Usually these Trojans send some traffic, but generally they can't meet the demand. So people who buy horses can find their own traffic providers. The so-called traffic providers are mostly hackers who are proficient in website intrusion. They hang Trojans on some websites, so these websites are divided into theme stations and external G stations. The theme station is similar to the current 17 173 and Monkey Island. Of course, these two websites are unlikely to be invaded, but some small and medium-sized stations often become victims. With traffic, the horse buyer will find someone to make the box, which is to visit the website of stolen number information and data. The account number of each region will be automatically sent to the box of each region, and an account number is called a letter or ID. At present, DNF accounts are generally divided into large boxes and small boxes. 25-stage filtration for large box, price 1.8-2.4-ID, small box 1-25. The person who left the boxes sold them to the person who washed the numbers. He was called the letter washer. They washed all the letters they bought ~ then sold the materials and equipment in the game, and then sold YXB to make a profit ~
Second, the Trojan horse is tied to fishing, which is lower than the flow box. They mainly shout the horn in the game, saying that a website has an external G, so everyone should use it quickly. People who believe in it will win the Trojan horse as long as they download the external G, and then log in and the game will be hacked ~
Third, pure phishing websites, hackers will make highly simulated websites, which are exactly the same as official websites. They also honk their horns in the game and say that they want you to go to a website to collect resurrection, fashion and so on. Generally speaking, such websites do not have Trojans. After logging in, you will be asked to log in to your account to get the prize. Once you log in, your account password will enter the mailbox.
Four, pure personal release your horse, such as shouting in the game, please join the XXXXXX group, there is an extra G in the group! ! Many people can't resist the temptation to go to the store after going in, and the horse was stolen immediately ~!
Fifth, aiming at the target and releasing the horse also belongs to the type of individual releasing the horse, but this kind is more vicious and only chooses the rich to start. Classic case: One day, a person shouted in the game: The studio has been selling black goods for a long time, with a discount of 4-6. If a powerful businessman comes, add qq XXXXXX, and you can add qq to him. First, he asked to see the screenshots of your YXB, saying that he wouldn't talk to you if you weren't strong enough, and then he would send some screenshots of the warehouse inventory, which were amazing and made you happy, and then he would send you a text document. The title is still "price list" or "DNF regional shipping price list" sent to your online. Generally, people with a little common sense will not answer it easily, but when they see a file with only 18-20K, no one will be suspicious. You know, the size of a kill-free DNF Trojan is only 14K. Pick it up and open it. The result is a horse or a gray pigeon. A skilled letter washer can fill a gold warehouse in 3 minutes and wash away dozens of W materials and equipment in 5 minutes.
Some people may ask, why did I get the secret card or get washed? Let me answer that.
1, online insurance is broken. This broken security requires players to be online. They are using computers and Trojans. First, they use broken security equipment, that is, things that directly control the Trojan horse, to kick the player off the line, and then hackers will log on to his computer with the player's account password, but because of the password card, they can't enter the game, but it doesn't matter. If the hacker's password card coordinates are A 1 of C3 B2. He will send this information that needs to be cracked to Trojan horse, that is, the player. If the player logs into the game, Trojan Horse will create a fake password card coordinate interface, which needs the real coordinates of the hacker logging into the player's account at the other end, so the player will input, for example, 35, 57 and 86, and then the information will be sent directly to the hacker's end, so he can log into the player's account directly with these three coordinates.
2. Block off-line protection full screen. This is the latest way to crack the security. Trojan horse can intercept the full screen picture of the computer and JPG or BMP or GIF files when the player opens the game, and then send them to the stolen number box. This method is much more powerful than online security cracking, but it requires the player to open the password card on the computer. If you use a physical card or copy it on paper, it is invalid.
3, qq hard disk is broken, many people put their password cards on qq hard disk, which is the stupidest way, so I won't bother you here.
How to prevent: 1, install anti-virus software on the computer and update it regularly, install 360 security and safe, and need to patch the system.
2, don't be greedy and cheap, go to any black goods studio, I can tell you responsibly that a truly sufficient studio has its own long-term stability. If you are not a professional player, don't take this road.
As for the external G, whether it is used or not is my own business, but I can tell you that there is no such thing as a free lunch. Many people who write Trojans are also people who write plug-in G. If plug-in G works, his daily traffic can make him eat 1 month. Want to use the external G for free, what can the author eat and drink? It's free. Give me the account number!
4. It learned to enter the password. For example, your password is abc 1 1 1. When entering, please enter11,then point to the cursor with the mouse and enter abc, so that your password will be displayed as 1 166 in the box.
5. It is very important to input the password card to prevent the online insurance from being breached. Isn't there a different picture on the interface where you enter the coordinates of the password card? Originally you wanted A 1, B2, C3, so you changed it. If A 1, B2 and C3 still appear, congratulations, you won the horse. Kill the virus quickly. Change the coordinates more than twice, indicating safety, but don't take it lightly. If the three coordinates entered first are incorrect, press a few numbers casually, and the password card coordinate verification will be displayed.No..
6. The storage of the password card is exquisite. It is silly to put qq space, photo album and hard disk directly. Because of full-screen interception, physical cards are the best. When applying for a security card, immediately copy the digital coordinates of the security card with paper, and the security card stored in the computer must be deleted. Also, the secret card exists directly in your hand, but remember that the original can't be saved in the computer!
7. The password card can be used at most 1 month, otherwise, when the computer has a Trojan horse to record 60% of your secret number, it can steal your number.
8. Let everyone know that the infinite disconnection of garbage TX is cursed to death, and it also adds a lot of trouble to the number washer. You want to break into the game online and see that there is more than 1000 W in the bag, but it has been interrupted before you can start work. Players can't break the insurance without going online. What's that feeling? There is also a number washing interrupt that has been interrupted countless times. What is the feeling of fire in my heart? Haha, it is also considered that TX has done a good thing unintentionally ~! Many people have washed something, but they haven't washed it yet. Don't think it's a pity to change the number, the interruption has helped you a lot ~
If you think it's ok, give a satisfactory answer.