As a loosely defined set, ActiveX was first developed by Microsoft and is a platform for various programs or computer users to share information. But, perhaps Microsoft workforce thinking too simple to develop ActiveX. They would never think that some people will make use of ActiveX and use it as a kind of Trojans to threaten computer users. For example, when malicious software was widely used to be a site that makes sex seduction to ask users to install Active control of their website automatically. But from then on these users' computers will be in serious risks with ActiveX.
Analysis of the ActiveX Trojans
ActiveX can not only track computer users' information automatically, but also keep popping and upload their Word documents or other important files. Such abusive acts are really harmful to computer users. More and more rogue programs begin to make use of ActiveX for malicious purposes, and that is why Microsoft has to add the approval of measures for the use of ActiveX. Today, instead of popping and tells you to install it in the past, will become the standard ActiveX to be disabled when you fist install IE.
The authentication mechanism of ActiveX is the main reason that it is used by many Trojan horses. In the past, if you visit a site and any content on this site can not be read until the ActiveX is installed, you will probably receive lots of messages from this site that ask you to install ActiveX. Many users can click on the Agree button to continue the installation because of being bombarded with these messages. This can be proved by this story. A group of people go ahead of you and all of them express the idea of making friends with you. Once they cross that you can nod or shake his head to show your position. When you nod your head and some of them are friends, they will feel free to go to your room. The horrible thing is that you will find that some of your friends are actually twenty or rascals when they were your friends.
How to distinguish what is ActiveX control
Currently there are two ways to make use of ActiveX controls: one is through vulnerability normal programs, the other is to write malicious programs and make these programs resemble a certain ActiveX control in order to trick users. For these malicious control, we must be proactive in preventing them. If necessary, we install professional virus protection software to stop attacks from malicious control.
No comments:
Post a Comment