Forwarded from UNDERCODE NEWS
Tetris Effect: The classic game was reborn as a spectacular sensory experience not to be missed.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Need to install pygame
1) The initialization interface displays a clock interface
2) Realize the movement of the hour, minute, and second hands according to the current time
import pygame, sys, random, math
from datetime import datetime
from pygame.locals import *
def print_text(font, x, y, text, color=(255, 255, 255)):
img_text = font.render(text, True, color)
screen.blit(img_text, (x, y))
pygame.init()
screen = pygame.display.set_mode((600, 500))
pygame.display.set_caption"
font1 = pygame.font.Font(None, 24)
pos_x = 300
pos_y = 250
radius = 250
r = random.randint(0, 255)
g = random.randint(0, 255)
b = random.randint(0, 255)
while True:
for event in pygame.event.get():
if event.type == QUIT:
sys.exit()
keys = pygame.key.get_pressed()
if keys[K_ESCAPE]:
sys.exit()
screen.fill((0, 0, 100))
color = r, g, b
pygame.draw.circle(screen, color, (pos_x, pos_y), radius, 6)
for i in range(1, 13):
angle = math.radians((360 / 12) * i - 90)
x = math.cos(angle) * (radius - 20) - 10
y = math.sin(angle) * (radius - 20) - 10
print_text(font1, pos_x + x, pos_y + y, str(i))
hour = datetime.today().hour % 12
hour_angle = math.radians((360 / 12) * hour - 90)
hour_x = math.cos(hour_angle) * (radius - 90)
hour_y = math.sin(hour_angle) * (radius - 90)
pygame.draw.line(screen, (255, 0, 0), (pos_x, pos_y), (pos_x + hour_x, pos_y + hour_y), 12)
minutes = datetime.today().minute
minutes_angle = math.radians((360 / 60) * minutes - 90)
minutes_x = math.cos(minutes_angle) * (radius - 70)
minutes_y = math.sin(minutes_angle) * (radius - 70)
pygame.draw.line(screen, (0, 255, 0), (pos_x, pos_y), (pos_x + minutes_x, pos_y + minutes_y), 8)
seconds = datetime.today().second
seconds_angle = math.radians((360 / 60) * seconds - 90)
seconds_x = math.cos(seconds_angle) * (radius - 30)
seconds_y = math.sin(seconds_angle) * (radius - 30)
pygame.draw.line(screen, (0, 0, 255), (pos_x, pos_y), (pos_x + seconds_x, + pos_y + seconds_y), 4)
pygame.draw.circle(screen, (255, 255, 255), (pos_x, pos_y), 10)
pygame.display.update()
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Need to install pygame
1) The initialization interface displays a clock interface
2) Realize the movement of the hour, minute, and second hands according to the current time
import pygame, sys, random, math
from datetime import datetime
from pygame.locals import *
def print_text(font, x, y, text, color=(255, 255, 255)):
img_text = font.render(text, True, color)
screen.blit(img_text, (x, y))
pygame.init()
screen = pygame.display.set_mode((600, 500))
pygame.display.set_caption"
font1 = pygame.font.Font(None, 24)
pos_x = 300
pos_y = 250
radius = 250
r = random.randint(0, 255)
g = random.randint(0, 255)
b = random.randint(0, 255)
while True:
for event in pygame.event.get():
if event.type == QUIT:
sys.exit()
keys = pygame.key.get_pressed()
if keys[K_ESCAPE]:
sys.exit()
screen.fill((0, 0, 100))
color = r, g, b
pygame.draw.circle(screen, color, (pos_x, pos_y), radius, 6)
for i in range(1, 13):
angle = math.radians((360 / 12) * i - 90)
x = math.cos(angle) * (radius - 20) - 10
y = math.sin(angle) * (radius - 20) - 10
print_text(font1, pos_x + x, pos_y + y, str(i))
hour = datetime.today().hour % 12
hour_angle = math.radians((360 / 12) * hour - 90)
hour_x = math.cos(hour_angle) * (radius - 90)
hour_y = math.sin(hour_angle) * (radius - 90)
pygame.draw.line(screen, (255, 0, 0), (pos_x, pos_y), (pos_x + hour_x, pos_y + hour_y), 12)
minutes = datetime.today().minute
minutes_angle = math.radians((360 / 60) * minutes - 90)
minutes_x = math.cos(minutes_angle) * (radius - 70)
minutes_y = math.sin(minutes_angle) * (radius - 70)
pygame.draw.line(screen, (0, 255, 0), (pos_x, pos_y), (pos_x + minutes_x, pos_y + minutes_y), 8)
seconds = datetime.today().second
seconds_angle = math.radians((360 / 60) * seconds - 90)
seconds_x = math.cos(seconds_angle) * (radius - 30)
seconds_y = math.sin(seconds_angle) * (radius - 30)
pygame.draw.line(screen, (0, 0, 255), (pos_x, pos_y), (pos_x + seconds_x, + pos_y + seconds_y), 4)
pygame.draw.circle(screen, (255, 255, 255), (pos_x, pos_y), 10)
pygame.display.update()
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Nokia is planning to break into the market for notebooks and tablets. There are currently nine models ready.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Adding, Removing, and Granting Sudo Rights to Users on CentOS:
Log into the CentOS system as root or any user with sudo privileges.
First, let's add sudo privileges to the new user.
1) Add sudo users to CentOS
Let me create a new user named "senthil".
To do this, I will run the following command as root from the terminal:
# adduser senthil
Set a password for the new senthil user:
# passwd senthil
He is not yet authorized to perform any administrative tasks.
Let's check if the senthil user can use the sudo command:
# sudo -l -U senthil
Output example:
User senthil is not allowed to run sudo on centos8
That's right, it is not yet allowed to run sudo on my CentOS 8 system.
Let's give it sudo rights now.
2) Grant sudo privileges to users on CentOS.
To add a regular user to the sudoers group, you need to add him to the wheel group.
For those of you curious, wheel is a special group on some Unix-like operating systems.
All members of the wheel group are allowed to perform administrative tasks.
The Wheel group is similar to the sudo group on Debian based systems.
We can add users to sudoers in two ways.
The first way is to use the chmod command.
2.1. Adding users to sudoers using usermod command on CentOS
Now, let's grant sudo privileges to the newly created user βsenthilβ by adding him to the wheel group using the usermod command as shown below:
# usermod -aG wheel senthil
Here -aG refers to the optional group.
In our case, this is the wheel group.
That's it, we have just granted sudo permissions to senthil.
Let's check if the user is in the sudoers list using the command:
# sudo -l -U senthil
Conclusion:
Matching Defaults entries for senthil on centos8:
!visiblepw, always_set_home, match_group_by_gid,
always_query_group_plugin, env_reset, env_keep="COLORS DISPLAY
HOSTNAME HISTSIZE KDEDIR LS_COLORS", env_keep+="MAIL PS1 PS2 QTDIR
USERNAME LANG LC_ADDRESS LC_CTYPE", env_keep+="LC_COLLATE
LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES", env_keep+="LC_MONETARY
LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE", env_keep+="LC_TIME LC_ALL
LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY",
secure_path=/sbin\:/bin\:/usr/sbin\:/usr/bin
User senthil may run the following commands on centos8:
(ALL) ALL
As you can see in the last line of the above output, user "senthil" can now execute all commands.
2.2. Add users to sudoers by editing the sudoers config file on CentOS
Another way to add users to the sudoers list is to directly add him / her to the sudoers config file.
Edit the sudoers config file with the command:
# visudo
The system will open the / etc / sudoers file in your Vi editor or whatever you have in your $ PATH.
Scroll down until you find the following entry:
root ALL=(ALL) ALL
Add the following line immediately after the above entry:
senthil ALL=(ALL) ALL
Here the line ALL = (ALL) ALL indicates that the user "senthil" can execute any command on any host.
Replace βsenthilβ with your username.
Save and close the file.
That's all.
The user βsenthilβ has been added to the sudoers list.
2.3. Checking sudo users on CentOS
Log out of the current session and log in again as the newly created sudo user.
Alternatively, you can switch to another user directly without leaving your current session using the following command:
# sudo -i -u senthil
Now check if the user can perform any administrative task with sudo privileges:
$ sudo dnf update
3) Remove the sudo privileges from the CentOS user.
We can revoke sudo rights from a user without completely deleting their account.
To revoke sudo permissions from a user, simply run the following command as root:
# gpasswd -d senthil wheel
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Adding, Removing, and Granting Sudo Rights to Users on CentOS:
Log into the CentOS system as root or any user with sudo privileges.
First, let's add sudo privileges to the new user.
1) Add sudo users to CentOS
Let me create a new user named "senthil".
To do this, I will run the following command as root from the terminal:
# adduser senthil
Set a password for the new senthil user:
# passwd senthil
He is not yet authorized to perform any administrative tasks.
Let's check if the senthil user can use the sudo command:
# sudo -l -U senthil
Output example:
User senthil is not allowed to run sudo on centos8
That's right, it is not yet allowed to run sudo on my CentOS 8 system.
Let's give it sudo rights now.
2) Grant sudo privileges to users on CentOS.
To add a regular user to the sudoers group, you need to add him to the wheel group.
For those of you curious, wheel is a special group on some Unix-like operating systems.
All members of the wheel group are allowed to perform administrative tasks.
The Wheel group is similar to the sudo group on Debian based systems.
We can add users to sudoers in two ways.
The first way is to use the chmod command.
2.1. Adding users to sudoers using usermod command on CentOS
Now, let's grant sudo privileges to the newly created user βsenthilβ by adding him to the wheel group using the usermod command as shown below:
# usermod -aG wheel senthil
Here -aG refers to the optional group.
In our case, this is the wheel group.
That's it, we have just granted sudo permissions to senthil.
Let's check if the user is in the sudoers list using the command:
# sudo -l -U senthil
Conclusion:
Matching Defaults entries for senthil on centos8:
!visiblepw, always_set_home, match_group_by_gid,
always_query_group_plugin, env_reset, env_keep="COLORS DISPLAY
HOSTNAME HISTSIZE KDEDIR LS_COLORS", env_keep+="MAIL PS1 PS2 QTDIR
USERNAME LANG LC_ADDRESS LC_CTYPE", env_keep+="LC_COLLATE
LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES", env_keep+="LC_MONETARY
LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE", env_keep+="LC_TIME LC_ALL
LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY",
secure_path=/sbin\:/bin\:/usr/sbin\:/usr/bin
User senthil may run the following commands on centos8:
(ALL) ALL
As you can see in the last line of the above output, user "senthil" can now execute all commands.
2.2. Add users to sudoers by editing the sudoers config file on CentOS
Another way to add users to the sudoers list is to directly add him / her to the sudoers config file.
Edit the sudoers config file with the command:
# visudo
The system will open the / etc / sudoers file in your Vi editor or whatever you have in your $ PATH.
Scroll down until you find the following entry:
root ALL=(ALL) ALL
Add the following line immediately after the above entry:
senthil ALL=(ALL) ALL
Here the line ALL = (ALL) ALL indicates that the user "senthil" can execute any command on any host.
Replace βsenthilβ with your username.
Save and close the file.
That's all.
The user βsenthilβ has been added to the sudoers list.
2.3. Checking sudo users on CentOS
Log out of the current session and log in again as the newly created sudo user.
Alternatively, you can switch to another user directly without leaving your current session using the following command:
# sudo -i -u senthil
Now check if the user can perform any administrative task with sudo privileges:
$ sudo dnf update
3) Remove the sudo privileges from the CentOS user.
We can revoke sudo rights from a user without completely deleting their account.
To revoke sudo permissions from a user, simply run the following command as root:
# gpasswd -d senthil wheel
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
As of September next year the British telecom firm forbids the installation of new Huawei 5G products.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/StevenBlack/hosts.git
2) Option 1: Generate in a Docker container
We provide a Dockerfile that you can use to create a Docker container with everything you need. The container will contain Python 3 and all its dependency requirements, and a copy of the latest version of this repository.
Build the Docker container like this:
3) docker build ./
Access the terminal like this:
docker run -it (containerid) bash
4) Option 2: Generate it in your own environment.
To generate your own amalgamated hosts files you will need Python 3.5 or later.
First, install the dependencies with:
pip3 install --user -r requirements.txt
5) Common steps regardless of your development environment.
To run unit tests, in the top-level directory, run:
python3 testUpdateHostsFile.py
The updateHostsFile.py script will generate a unified hosts file based on the sources in the local data/ subfolder. The script will prompt you whether it should fetch updated versions (from locations defined by the update.json text file in each source's folder). Otherwise, it will use the hosts file that's already there.
python3 updateHostsFile.py [--auto] [--replace] [--ip nnn.nnn.nnn.nnn] [--extensions ext1 ext2 ext3]
Command line options:
--help, or -h: display help.
--auto, or -a: run the script without prompting. When --auto is invoked,
Hosts data sources, including extensions, are updated.
No extensions are included by default. Use the --extensions or -e flag to include any you want.
Your active hosts file is not replaced unless you include the --replace flag.
--backup, or -b: Make a backup of existing hosts file(s) as you generate over them.
--extensions <ext1> <ext2> <ext3>, or -e <ext1> <ext2> <ext3>: the names of subfolders below the extensions folder containing additional category-specific hosts files to include in the amalgamation. Example: --extensions porn or -e social porn.
--flush-dns-cache, or -f: skip the prompt for flushing the DNS cache. Only active when --replace is also active.
--ip nnn.nnn.nnn.nnn, or -i nnn.nnn.nnn.nnn: the IP address to use as the target. Default is 0.0.0.0.
--keepdomaincomments, or -k: true (default) or false, keep the comments that appear on the same line as domains. The default is true.
--noupdate, or -n: skip fetching updates from hosts data sources.
--output <subfolder>, or -o <subfolder>: place the generated source file in a subfolder. If the subfolder does not exist, it will be created.
--replace, or -r: trigger replacing your active hosts
--skipstatichosts, or -s: false (default) or true, omit the standard section at the top, containing lines like 127.0.0.1 localhost. This is useful for configuring proximate DNS services on the local network.
--nogendata, or -g: false (default) or true, skip the generation of the readmeData.json file used for generating readme.md files. This is useful if you are generating host files with additional whitelists or blacklists and want to keep your local checkout of this repo unmodified.
--compress, or -c: false (default) or true, Compress the hosts file ignoring non-necessary lines (empty lines and comments) and putting multiple domains in each line. Reducing the number of lines of the hosts file improves the performances under Windows (with DNS Client service enabled).
--minimise, or -m: false (default) or true, like --compress, but puts each domain on a separate line. This is necessary because many implementations of URL blockers that rely on hosts files do not conform to the standard which allows multiple hosts on a single line.
--blacklist <blacklistfile>, or -x <blacklistfile>: Append the given blacklist file in hosts format to the generated hosts file.
--whitelist <whitelistfile>, or -w <whitelistfile>: Use the given whitelist file to remove hosts from the generated hosts file.
π¦Consolidating and extending hosts files from several well-curated sources. You can optionally pick extensions to block pornography, social media, and other categories.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/StevenBlack/hosts.git
2) Option 1: Generate in a Docker container
We provide a Dockerfile that you can use to create a Docker container with everything you need. The container will contain Python 3 and all its dependency requirements, and a copy of the latest version of this repository.
Build the Docker container like this:
3) docker build ./
Access the terminal like this:
docker run -it (containerid) bash
4) Option 2: Generate it in your own environment.
To generate your own amalgamated hosts files you will need Python 3.5 or later.
First, install the dependencies with:
pip3 install --user -r requirements.txt
5) Common steps regardless of your development environment.
To run unit tests, in the top-level directory, run:
python3 testUpdateHostsFile.py
The updateHostsFile.py script will generate a unified hosts file based on the sources in the local data/ subfolder. The script will prompt you whether it should fetch updated versions (from locations defined by the update.json text file in each source's folder). Otherwise, it will use the hosts file that's already there.
python3 updateHostsFile.py [--auto] [--replace] [--ip nnn.nnn.nnn.nnn] [--extensions ext1 ext2 ext3]
Command line options:
--help, or -h: display help.
--auto, or -a: run the script without prompting. When --auto is invoked,
Hosts data sources, including extensions, are updated.
No extensions are included by default. Use the --extensions or -e flag to include any you want.
Your active hosts file is not replaced unless you include the --replace flag.
--backup, or -b: Make a backup of existing hosts file(s) as you generate over them.
--extensions <ext1> <ext2> <ext3>, or -e <ext1> <ext2> <ext3>: the names of subfolders below the extensions folder containing additional category-specific hosts files to include in the amalgamation. Example: --extensions porn or -e social porn.
--flush-dns-cache, or -f: skip the prompt for flushing the DNS cache. Only active when --replace is also active.
--ip nnn.nnn.nnn.nnn, or -i nnn.nnn.nnn.nnn: the IP address to use as the target. Default is 0.0.0.0.
--keepdomaincomments, or -k: true (default) or false, keep the comments that appear on the same line as domains. The default is true.
--noupdate, or -n: skip fetching updates from hosts data sources.
--output <subfolder>, or -o <subfolder>: place the generated source file in a subfolder. If the subfolder does not exist, it will be created.
--replace, or -r: trigger replacing your active hosts
--skipstatichosts, or -s: false (default) or true, omit the standard section at the top, containing lines like 127.0.0.1 localhost. This is useful for configuring proximate DNS services on the local network.
--nogendata, or -g: false (default) or true, skip the generation of the readmeData.json file used for generating readme.md files. This is useful if you are generating host files with additional whitelists or blacklists and want to keep your local checkout of this repo unmodified.
--compress, or -c: false (default) or true, Compress the hosts file ignoring non-necessary lines (empty lines and comments) and putting multiple domains in each line. Reducing the number of lines of the hosts file improves the performances under Windows (with DNS Client service enabled).
--minimise, or -m: false (default) or true, like --compress, but puts each domain on a separate line. This is necessary because many implementations of URL blockers that rely on hosts files do not conform to the standard which allows multiple hosts on a single line.
--blacklist <blacklistfile>, or -x <blacklistfile>: Append the given blacklist file in hosts format to the generated hosts file.
--whitelist <whitelistfile>, or -w <whitelistfile>: Use the given whitelist file to remove hosts from the generated hosts file.
GitHub
GitHub - StevenBlack/hosts: π Consolidating and extending hosts files from several well-curated sources. Optionally pick extensionsβ¦
π Consolidating and extending hosts files from several well-curated sources. Optionally pick extensions for porn, social media, and other categories. - StevenBlack/hosts
Using NixOS:
To install hosts file on your machine add the following into your configuration.nix:
{
networking.extraHosts = let
hostsPath = https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts;
hostsFile = builtins.fetchurl hostsPath;
in builtins.readFile "${hostsFile}";
}
NOTE: Change hostsPath if you need other versions of hosts file.
β β β Uππ»βΊπ«Δπ¬πβ β β β
To install hosts file on your machine add the following into your configuration.nix:
{
networking.extraHosts = let
hostsPath = https://raw.githubusercontent.com/StevenBlack/hosts/master/hosts;
hostsFile = builtins.fetchurl hostsPath;
in builtins.readFile "${hostsFile}";
}
NOTE: Change hostsPath if you need other versions of hosts file.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
The Italian antitrust regulator has awarded Apple a fine of EUR 10 million because the iPhone is not protected by water.
#international
#international
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Web hacking attacks:
Database Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XEE)
Broken Access Control
Security Misconfiguration
Cross-site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Web hacking attacks:
Database Injection
Broken Authentication
Sensitive Data Exposure
XML External Entities (XEE)
Broken Access Control
Security Misconfiguration
Cross-site Scripting (XSS)
Insecure Deserialization
Using Components with Known Vulnerabilities
Insufficient Logging and Monitoring
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Virus infection diagnosis:
1. Press Ctrl+Shift+Delete (press these three keys at the same time), bring up the windows task manager to view the processes running on the system, find out the unfamiliar processes and write down their names (this requires experience), if these If the process is a virus, it can be cleaned up later. Don't end these processes for now, because some viruses or illegal processes may not end here. Click Performance to view the current status of the CPU and memory. If the CPU utilization is close to 100% or the memory occupancy value remains high, the possibility of computer poisoning is 95%.
γγ
2. Check the service items currently started in Windows, and open the "Services" in the "Management Tools" of the "Control Panel". Look at the line in the right column where the status is "Startup" and the startup category is "Auto"; generally speaking, normal windows services basically have descriptions (except for a few faked by hackers or worms), double-click at this time Open the service item that is considered to be problematic and view the path and name of the executable file in its properties. If the name and path are C:/winnt/system32/explored.exe, the computer is recruited. There is a situation that the "Control Panel" cannot be opened or all the icons in it run to the left, there is a vertical scroll bar in the middle, and the right is blank. Double-click to add/remove programs or management tools, the window is empty. This is the characteristic of the virus file winhlpp32.exe.
γγ
3. Run the registry editor, the command is regedit or regedt32, check which programs are started together with windows. Mainly look at Hkey_Local_Machine/Software/MicroSoft/Windows/CurrentVersion/Run and the following RunOnce, etc., check the item value on the right side of the form to see if there is an illegal startup item. WindowsXp running msconfig also plays the same role. With the accumulation of experience, you can easily determine the startup items of the virus.
γγ
4. Use a browser to go online to judge. The previous Gaobot virus can go to yahoo.com, sony.com and other websites, but you cannot visit the websites of famous security vendors such as www.symantec.com, www.ca.com, and you canβt access the Internet after installing the antivirus software of symantecNorton2004. upgrade.
γγ
5. Unhide attributes and check the system folder winnt(windows)/system32. If the folder is empty after opening, it means that the computer has been poisoned; after opening system32, you can sort the icons by type to see if there are any executable files of popular viruses. . By the way, check the folders Tasks, wins, drivers. The current virus executable files are hidden here; the file hosts under drivers/etc is the object that viruses like to tamper with. It was originally only about 700 bytes, and it became after tampering. Above 1Kb, this is the reason why the general website can be accessed but the website of the security vendor cannot be accessed, and the famous anti-virus software cannot be upgraded.
γγ
6. The anti-virus software determines whether it is poisoned. If it is poisoned, the anti-virus software will be automatically terminated by the virus program and the manual upgrade will fail.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Virus infection diagnosis:
1. Press Ctrl+Shift+Delete (press these three keys at the same time), bring up the windows task manager to view the processes running on the system, find out the unfamiliar processes and write down their names (this requires experience), if these If the process is a virus, it can be cleaned up later. Don't end these processes for now, because some viruses or illegal processes may not end here. Click Performance to view the current status of the CPU and memory. If the CPU utilization is close to 100% or the memory occupancy value remains high, the possibility of computer poisoning is 95%.
γγ
2. Check the service items currently started in Windows, and open the "Services" in the "Management Tools" of the "Control Panel". Look at the line in the right column where the status is "Startup" and the startup category is "Auto"; generally speaking, normal windows services basically have descriptions (except for a few faked by hackers or worms), double-click at this time Open the service item that is considered to be problematic and view the path and name of the executable file in its properties. If the name and path are C:/winnt/system32/explored.exe, the computer is recruited. There is a situation that the "Control Panel" cannot be opened or all the icons in it run to the left, there is a vertical scroll bar in the middle, and the right is blank. Double-click to add/remove programs or management tools, the window is empty. This is the characteristic of the virus file winhlpp32.exe.
γγ
3. Run the registry editor, the command is regedit or regedt32, check which programs are started together with windows. Mainly look at Hkey_Local_Machine/Software/MicroSoft/Windows/CurrentVersion/Run and the following RunOnce, etc., check the item value on the right side of the form to see if there is an illegal startup item. WindowsXp running msconfig also plays the same role. With the accumulation of experience, you can easily determine the startup items of the virus.
γγ
4. Use a browser to go online to judge. The previous Gaobot virus can go to yahoo.com, sony.com and other websites, but you cannot visit the websites of famous security vendors such as www.symantec.com, www.ca.com, and you canβt access the Internet after installing the antivirus software of symantecNorton2004. upgrade.
γγ
5. Unhide attributes and check the system folder winnt(windows)/system32. If the folder is empty after opening, it means that the computer has been poisoned; after opening system32, you can sort the icons by type to see if there are any executable files of popular viruses. . By the way, check the folders Tasks, wins, drivers. The current virus executable files are hidden here; the file hosts under drivers/etc is the object that viruses like to tamper with. It was originally only about 700 bytes, and it became after tampering. Above 1Kb, this is the reason why the general website can be accessed but the website of the security vendor cannot be accessed, and the famous anti-virus software cannot be upgraded.
γγ
6. The anti-virus software determines whether it is poisoned. If it is poisoned, the anti-virus software will be automatically terminated by the virus program and the manual upgrade will fail.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS