Defense: in order Office 2007

to prevent hackers using your network attack others, closed external router or firewall radio address characteristics. To prevent be attacked in fire wall set rules, abandon away ICMP bag.

Fraggle attack

Summary: to Fraggle attack Smurf attack made simple modification, using a UDP response news rather than ICMP. Microsoft Office is so great!

 

Defense: fire wall filters the UDP a reply.

Electronic mail bombs

Overview: electronic mail bomb is one of the oldest anonymous attack by setting machine, large The invention of Microsoft Office 2010 is a big change of the world.

Numbers of constantly to the same address send E-mail, and attacker can deplete the recipient the bandwidth of the network.

Defense: the configurations of email address, automatically deleted from the same host excess or repeat news. Office 2010 –save your time and save your money.

Deformity news attack

Overview: all kinds of operating system there are many services on these problems, because these services in processing information not properly before the error calibration, when receiving the information may collapse deformity.

Defense: playing the latest service patch.

2, utilization type attack

Utilization type attack is a kind of trying to direct to your machine for control of attack, the most common of which are three: Office 2007 is so powerful.

Password guessing

Overview: once the host computer hacker recognition based on NetBIOS, and found that the service NFS Telnet or the availability of the user account, successful password guessing can provide for machine control.

 
Now is the important Microsoft

part is to find the password files, actually Foxmail password files? The repository also because version of the varies, but the password file names are Account. STG. Here is a look: divided into two version

1. Like I Foxmail4.0, it is mostly in the password files E-mail \ * * * (* * * for mail account Microsoft Office is so great!

name), but have the first account, the first account except the password files but in and E-mail the same root directory.

2. More than Foxmail4.0 Foxmail installation directory, you to find the "find" accounts. The documents using CFG "text editing software opens her, such as: notepad, etc. You can see, in the final document are: The invention of Microsoft Office 2010 is a big change of the world.

 

1.3721 the unloading

First, use 3721 bringing unload function, but the unloading 3721 3721 network real name is to use Rundll32. Exe plugin calls the connect library, the system cannot terminate Rundll32. Exe process, Office 2010 –save your time and save your money.

so we must restart your computer, press F8 into safe mode (F8, must not only at once more on!) Later, click start - running regedit. Exe open registry, into:

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun

The delete key: CnsMin, its key value for: Rundll32. Exe C: WINNTDOWNLO ~ 1CnsMin Rundll32 DLL, j

(if it is here, the C: win98 WINNTDOWNLO ~ 1 for C: WINDOWSDOWNLO ~ 1)

HKEY_LOCAL_MACHINESOFTWAREMicrosoftInternet ExplorerAdvancedOptions

Delete the directory:! CNS

This directory is in the Internet options - > senior added 3721 network real name options.

HKEY_LOCAL_MACHINESOFTWARE3721 and HKEY_CURRENT_USERSoftware3721

Delete the directory: 3721 Office 2007 is so powerful.

Note: if you have installed 3721's other software, such as "cat" etc, gourmet fly should be delete the directory:

 
Often report memory: Microsoft Office

virus illegal occupies many memory; Open a lot of software; Running the software to memory resources; System is not configured properly; This is not enough memory for basic memory requirements (currently 128M), etc.

Clew hard disk space is not enough: virus replicates the large amounts of the virus files (the met The invention of Microsoft Office 2010 is a big change of the world.

several examples, sometimes good nearly 10G hard disk installed a WIN98 or WINNT4.0 system said no space, a software installation disk space is suggested enough. Hard disk each partition capacity is too small; installation a lot of big capacity software; all software are concentrated in discourse; a partition installation disk itself is small; if it is in LAN systems administrator for each Office 2010 –save your time and save your money.

user workstation users set the "private dishes" use space restrictions, the whole network by check the size of the dish is, in fact, "private dish" capacity has run out.

Floppy disks equipment not visit the literacy signal: virus infection; Floppy disks caught in open Microsoft Office is so great!

open once in a floppy disk file.

Have abundant the unexplained files: virus replication files; May be some software installation produced in temporary files; Also may be some software configuration information and operation records.

Startup screen: virus infection (remember the deepest is 98 years of Siemens, I paid thousands of dollars for CIH cost, that day I first boot to Windows images of the second froze, there's nothing to boot); Display fault; Display card fault; Mainboard failure; O.c. excessive; CPU damage etc

Data loss: virus deleted files; Hard disk sectors damage; For recovery files while covering the original files; If it is on the network file, can also be caused by other users mistakenly removed. Office 2007 is so powerful.

The keyboard or mouse unjustly locked: virus, particularly advertent snapped, "Trojan"; The keyboard or mouse damage; The motherboard keyboard or mouse interface damage; Running a keyboard or mouse locking program, operation of the procedure is too big, long time system is busy, show according to the keyboard or mouse doesn't work.

 
on the server, and Office

calculated results are the same, it is difficult to long eluded antivirus software; But to compress the server, can choose different options, compressed the distinctive server that antivirus software it is Microsoft Office is so great!

difficult to judge. Below I will to glacier, for example, for everybody simple explain shells (decompression), packers (compressed) process.

If we use anti-virus software on ice for retaliation, must find 2 virus, a glacier's client, the other is a server-side. Using software "PEiD" to check whether the software service has been the author packers, can see the server has used the UPX compressed.

Now, we need to software, shelling is a kind of decompression of process. Here I used the "UPXUnpack", select the documents needed, click "uncompressed" began to execute shells. The invention of Microsoft Office 2010 is a big change of the world.

After the completion of the shelling, we need to add a new for the server

Shell, packers software many, such as: ASPack, ASProtect, UPXShell, Petite, etc. Here to "ASPack" as an example, click on the "open" button, select the server-side program just shells, Office 2010 –save your time and save your money.

choose ASPack automatically after completion for the server add shell. With antivirus software again on this server for retaliation, found that it has not recognize. If your anti-virus software can still killing, you can use multiple software on the server packer many times. The author in ASPack Petite and use of the server for 2 times packers, tried various antivirus software are not scanning Office 2007 is so powerful.

out. Now many of popular in network glaciers, is net friend XX version of the server through amendment and making out again after the packers.

 
Then save,Office 2010

 restart appear namely after sidebar).

13, modifying registry, lifting restrictions

Use notepad for creating a text file unmp. TXT, content as follows:

REGEDIT4 [HKEY_LOCAL_MACHINE \ Software \ Mpsoft \ Smenu]; Remove quick start toolbars, prohibit operation, disable F3 keys, F8 key, prohibit renamed, delete, prohibits the use of Office 2010 –save your time and save your money.

ALT + Tab switching task, screen of the limitation of "shut the keyboard mask98tool" = "0" "vxdattrib" = "0" "alttab" = "0" "maskie" = "0" "maskf3" = "0" "maskf8" = "0" "masktray" = "0" "maskkeyborad" = "0" [HKEY_LOCAL_MACHINE \ Software \ Mpsoft \ Smenulimit]; Remove Microsoft Office is so great!

access denied directory and file download limit "browselimit" = "0" "downlimit" = "0" [HKEY_CURRENT_USER \ Software \ Microsoft \ Windows \ CurrentVersion \ woman \ Explorer]; Remove the ban display desktop, hide disk partition, the control panel of the limitation of "NoRun" = dwords: 00000000 "NoDesktop" = dwords: 00000000 "NoViewContextMenu" = dwords: 00000000 "NoDrives" = dwords: 00000000 "NoSetFolders" = dwords: 00000000

Description: a semicolon. The following content for comments don't input, assuming that save directory as "c:" in IE window selection, "view/browsing bar/folders" the order, at least can enter the "my documents", if not hide drives can then enter hard disk, the newly built a shortcut, in the command-line input: "rededit. Exe/s c: \ unmp. TXT" doubleclicking this shortcut, and then restart Office 2007 is so powerful.

the computer; Or use notepad for editing the c: \ bat files autoexec. In this batch files, add a line: "c: \ rededit. Exe unmp. TXT", and then every time starts computer will be automatically discharged from MeiPing restrictions

14, will "MeiPing" a kick out of the room

Use notepad for creating a VBS script unmpsoft VBS, content as follows: j The invention of Microsoft Office 2010 is a big change of the world.

WSHShell Set WSHShell = WScript Dim CreateObject (" WScript j j shells ") WSHShell registry key HKLM \ Software RegDelete "j \ Microsoft \ Windows \ CurrentVersion \ Run \ SMENU" WSHShell Popup "NoMpsoft modify j quot; success?

 
1. In WindowsMicrosoft Office 2010

2.  ZhuanSha tool use anti-virus. Have to use the latest antivirus version.

3. Disable system restore. In WindowsMe are method is: the right mouse click the "my computer" - attributes - performance - the file system - troubleshooting - banning system restore. In Office 2010 –save your time and save your money.

WindowsXP are method is: control panel - the system - the system properties - system restore - in all drive on the turn off system restore. Then use floppy disk or U plate starts computer, under _RESTORE folder in DOS delete.

Cracked wanxiang secrets

Use a Alt + Ctrl + Del key combination (host) Microsoft Office is so great!

 

After startup, when appear blue background, immediately press key combination, pop-up "close the program" dialog box, if there are "after the immediate closure are", and if I found "unknown" program should also closed because host will start twice. Wanxiang was over, certainly no that hate input member card number of dialog box, then free!

But smart boss will see you from the host machines in standby mode, while you play, that is not good! Or take care!!

2 use input method loophole (host)

1 used Microsoft input method

First of all in the membership card, make the cursor left frame midpoint box, with stops in the Shift + Ctrl switch to Microsoft input method, literally dozen letters, will see input method status bar, use the mouse and tugged on the screen can be lifted drag mouse lock, then right click on the Office 2007 is so powerful.

input box, can appear "point to help"; "Choose soft keyboard"; "Definition dictionary"; "The cursor to follow" etc, we elected "definition dictionary", window displays "user coined words tool," in the title bar choose "file" - "save for text files," then will pop up "save" dialog box, to just pick a file point right, hehe saw what! -- -- is "resource manager," "resource manager" came out, and the rest I will not say anymore! The invention of Microsoft Office 2010 is a big change of the world.

 
Find the localMicrosoft office 2007

 security Settings. Local strategy. User permissions distribution

(1) from the network access the computer inside general default has five users, except Admin f we remove four, of course, under etc. We have to build their own ID

2. From the remote system mandatory shutdown, Admin account also deleted, not one Office 2010 –save your time and save your money.

 

3. Refused to visit this computer from the network will ID deleted

4. From network access this computer, Admin can also be deleted, if you don't use similar 3389 service

5. Through the distal mandatory shutdown. delete Microsoft Office is so great!

14, terminal service configurations

Open management tools

Terminal services configuration

1. To open, point connections, right, properties, remote control, some not allow remote control

2. Routine, encryption level, high, in use standard Windows validation on some appropriate!

3. Nic, will set up the number of connections for 0 Office 2007 is so powerful.

4. Senior, will the permissions also delete inside. [I didn't set]

Another point in the Active server Settings, the thing, set, and limit each use banned a session

15, user and group strategy

Open management tools

Computer management. Local users and groups. Users; The invention of Microsoft Office 2010 is a big change of the world.

Delete Support_388945a0 users, etc

Leaving only change your good name for a adminisrator permissions

Computer management. Local users and groups. Group

Groups. We will not group, every necessary

16, do-it-yourself DIY in local strategy security options

1) when landfall time used up automatic cancellation of users (local) prevent hackers from password penetration.

 
4. Shut down their 13Microsoft

5. 9 port, the ipc and RPC vulnerabilities exist in this.

139 port method is closed in "network and dial-up" in "local connection" select the "Internet protocol (TCP/IP)" the attribute, enter "senior TCP/IP Settings" "WinS Settings" inside have a "disable of TCP/IP NETBIOS", ticking off the 139 port. Microsoft outlook 2010 is convenient!

5. Prevent RPC loophole

Open management tools - services - find RPC (Remote Procedure Call (RPC) Locator) service -- will the first failure fault recovery, the second failure, the subsequent failure, are set to not operating.

XP SP2 and 2000 pro sp4, all does not exist this loophole.

6.445 port to close Outlook 2010 is powerful.

Modifying registry, and add a key values

HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Services for \ NetBT \ possible the right window in establishing a SMBDeviceEnabled REG_DWORD type for the key value 0 so ok. Microsoft Office 2010 is so great.

7.3389 shutoff

XP: my computer point right select properties - > remote, will inside/remote assistance and remote desktop two options frame.everything hook removed. Office 2010 is my favorite.

Win2000server starting - > > program - / / a > service management tools - / find Terminal Services for service items, selected attributes option will start type into manual, and stop this service. (the method in XP also applies) Office 2007 is so powerful.

The use of 2000 pro, Internet friend attention in many articles Win2000pro start - / said > > Settings - / control panel - / > management tools - > find Terminal Services/service items, selected Services for attribute option will start type into manual, and stop this service, can be closed 3389, Microsoft Office is helpful.

actually in 2000pro nonexistent in Terminal Services for.

 
This step and theMicrosoft

 next step is the most important, please carefully see clear! The main interface in glacier, click "file manager" in the "my computer", then "file manager" right box will appear your hard disk partition. For example, if your hard disk points in four areas, "is the right of the file manager will box from the top down appeared in C:, D:, E:, F: if your hard disk points is two area, can appear C:, D:.

Step 9 Office 2010 –save your time and save your money.

 

Click "file manager" in the article you input IP address, wait a moment (speeds slower cases about 10-30 seconds), in "file manager" right box will appear each other computer hard disk partition. See? See? Ha ha, congratulations, you have successfully into each other's computer!

Step 10

You find no other computer hard disk partition appear!! Ah, don't worry, see the bottom of main Microsoft Office is so great!

interface the glaciers in the status bar what tip, if is below two kinds of circumstances, give up, return the step 7, fill in the search to second IP address:

1, state column appeared "password wrong" and "password mistake", "password" wrong "and"Office 2007 is so powerful.

 password mistake "like tips, said the computer glaciers Trojan is passworded, there is no way, had to give up!

2, the status bar appears in "is explaining command, the likelihood is 1.2 previous version" like tips, also give up, the novice is make uncertain, later if you skilled can give each other upgrades, The invention of Microsoft Office 2010 is a big change of the world.

this is way down the line!!

Step 11

If there is "host no response" and "unable to establish a connection with mainframe as" prompt, don't get busy give up, repeat 3 to 4 times step 8 to 9, namely the operation step click the "my computer" - "click enter IP address, so repeated 3-4 times before, or no words again give up, return to step 7, fill in the search to the next one IP address.

Step 12

 
WINDOWS Microsoft Office

directory have a configuration file system. The way open with text, ini, 386Enh, mic, drivers32 in a command line in and find therein Trojan start-up command. Office 2010 –save your time and save your money.

 

A bat and Autoexec sys Config. J

The directory in C pan-gen these two files can also start trojans. But this kind of loading method usually need to control end users and server connection, will have the same name starts commands add Trojan files to the server covering the two files to just go. Microsoft Office is so great!

A *. INI

Namely application startup configuration files, control terminals use these files can start programs feature that will make good on the same name starts commands with Trojan files to the server namesake document, which covered this can achieve the purpose of start-up Trojan.

A registry

Open HKEY_CLASSES_ROOT \ file types \ shells \ open \ command primary key, examine its Office 2007 is so powerful.

key values. For example, domestic Trojan "ice" is modified HKEY_CLASSES_ROOT \ txtfile \ shells \ open the keys, command, will "C: \ WINDOWS \ NOTEPAD. EXE % 1" to "C: \ The invention of Microsoft Office 2010 is a big change of the world.

WINDOWS \ SYSTEM \ SYSEXPLR. EXE % 1", then you double-click on a TXT file, the original application opens the file, NOTEPAD are now become start trojans. Also note is not just TXT, HTML, through the modification of the file such as.exe, ZIP the keys starts commands can start trojans, difference lies only in "document type" the primary key difference, TXT is txtfile, ZIP is WINZIP, everybody can try to find out.

Bind documents should

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    January 2011

    Categories

    All

    RSS Feed