Vista Residence (www.vista123.com): QQ QQ answer user concerns and publish the technical principles of safety check
in Tencent's solemn declaration
The following is the official text Tencent regardless of whether
QQ
QQ totally no spy your privacy. A corporation Click to view: The computer software scans consumer files far much more than the QQ quantity of basic safety inspection module (as an example, through the same personal computer to test the number of documents of the corporation scans buyers achieve 1 million, although the QQ quantity of basic safety checks less than 1000), for example by the peep the definition of provider privacy, which alone will be the greatest person privacy snoopers. In reality, in the safety business may be the protection of this sort of security checks the user's privacy.
Tencent answers to those questions
open QQ technical background security check
Why is privacy protection report 360 QQ
QQ doesn't Trojan for killing, QQ boot entry have to be security checks,
Microsoft Office 2010 Home And Business, desktop shortcuts as well as other places are typical. Should the over the internet banking program or even the Workplace plan of those positions will be an executable file as being a routine examine. However, the program files aren't online banking on the web banking account passwords or individual information files, Phrase program just isn't user profile produced Phrase document files (Phrase paperwork to establish a widespread individual file suffix: *. doc / *. docx / *. dot / ... ....) Created a (For more information concerning the killing QQ Trojan basic safety inspections and technical track record, see Part III.)
QQ normal operation which is misleading as being a
example: once the person gets the file by way of QQ and help save towards the desktop or the person will preserve for the desktop screenshot QQ, will be the
Why MSN does not integrate the operate of protection checks?
Following 12 a long time of development, QQ accounts had not only employed in immediate messaging, but additionally extensively utilised in a number of on the internet games, on the web online banking payments, via the internet buying, community room, weblog and e-mail and applications such as micro-Bo, is surely an integrated communications,
Office 2010 Discount, amusement, specifics and valuable organization from the one-stop platform permits the degree of their security wants has far exceeded another immediate messaging products. Tencent has become to protect the user account security as the most vital perform, and by providing a safety examine module QQ sequence of measures to strengthening the protection technique. Tencent by no means spy on consumer privacy, and firmly believe that only the respect and safety of user safety and privacy a real company, to get healthful and sustainable development.
why I set up antivirus software package, QQ also do safety checks?
the 1 hand, each to keep away from Trojan sometimes killing the capacity from the mainstream safety software program. On the other hand, due to a huge number of user complaints and assisted QQ, QQ is often found inside the latest outbreak of the very first Trojan, and produce a targeted killing.
why some Trojan virus, I discovered the anti-virus software program set up,
Office 2010, QQ protection checks haven't found?
QQ primary perform with the built-in protection checks are killing the Trojan for that QQ. We'll continue to improve investment in technical operations to a new Trojan horse for any quicker speed of response.
QQ how efficient the safety verify?
Currently, QQ every day safety inspection module remove Trojan one.seven million, blocking malicious attacks more than 15 million occasions every day, the successful protection of your QQ users of details security. Annual Security Report 2009, Ereli mentioned: Enhanced model of Tencent QQ2009SP5 Trojan virus killing, integrated protection components specific to the QQ, efficiently killing the well-known QQ Trojan, virus signatures updated in real time, assisting QQ customers Trojan optimum harm containment; addition, QQ2009SP5 sensible auto-killing Trojans module, consumers log on with out the will need for manual scanning operation, decreasing the waiting time the consumer login, consumer login When upon QQ Trojan, the application will automatically pop up recommendations. Ereli published in 2009 beneath the instant messaging security report, QQ2009 official edition of built-in basic safety examine module, QQ also substantially strengthen safety efficiency, QQ's inside the industry-leading security performance.
why the QQ procedure of security checks without having prompting?
2007 China's network protection surroundings is deteriorating, a massive amount of Trojan seems, the consumer accounts and virtual house QQ going through key threats. To this finish, Tencent QQ QQ because 2007 integrated security examine module, the consumer is logged before the killing began Trojan, consumers need to log in killing may be successfully finished. But due to security examine takes a while, some bad user encounter feedback. Another class of horse, prior to the consumer logs on and so does not set off but the set off only soon after the consumer login, after which impersonate the consumer to deliver spam messages. QQ login just before the killing on your own, cannot successfully killing these Trojans. So soon after we release the QQ2009 to log in verify, reduce the inconvenience to end users. So as to lessen the harassment on the person, the module is presently only discovered within the security check or QQ Trojan hijacked only when there's prompt to remind the consumer. To make a lot more transparent the method of protection checks and allow consumers to view and set the next version of QQ inside the user interface and prompt manner to optimize the advancement.
addition to other safety checks, QQ What do the safety function to protect the security of the user's account?
starting in 2006, Tencent QQ shaped an impartial staff of security technology, spends a great deal of investigation and development and operational sources, and improve QQ several protection features to help consumers to enhance account security and virtual home. Couple of decades has launched progressive functions for instance all types of security: the soft keyboard password, log in irregular places reminder, a tiny yellow stripe safety schooling push, the second generation password-protected method, the consumer virtual property protection program, cellular mobile phone application to ensure that cards and hardware tokens as well as other safety functions. QQ2010 SP2 supplies a additional comprehensive QQ Computer 2010 released a complete pc butler safety software program, it is possible to visit the Security Middle QQ protection for a lot more information and facts.
QQ Why do security checks?
QQ to perform safety checks is the user's pc to fix software vulnerabilities, and killing the user's laptop or computer Trojan.
QQ why killing the user's pc hacking Trojan?
killing time QQ Trojan safeguard the user's on line everyday life basic safety. Trojan can be a technical expression that refers for the use of a laptop or computer plan vulnerability malicious virus invasion.
Trojan What is the harm?
simply because domestic QQ and the prevalence of a large amount of on-line game solutions, person accounts and virtual house is eyeing a good deal of criminals. Production of the large number of criminals and network video games towards QQ Trojan, along with the formation of huge amount of professional groups within the Trojan hacking creation, invasion on the user computers,
Office 2007 Professional Plus, steal consumer account and password and steal a black consumer virtual house theft chain,which is caused by QQ end users and on the internet end users to substantial security threat.
Trojan what kind?
Trojan attacks based on their distinctive functions, could be divided into the following types:
one) steal username and password: This Trojan injected through the procedure,
Office Pro, the keyboard hook, study memory along with other indicates to steal person account and password, after which stealing virtual house within the consumer account;
2) to deliver spam: This Trojan soon invade the user's laptop or computer will automatically send spam to all your friends a message, lure buddies fooled. For instance, misconception the winning or receipt of presents fall into the trap of scammers;
four) cultivation of other Trojan: This Trojan by destroying the personal computer operating program, for the cultivation of other Trojan viruses paved roads.
The Trojan has the mainstream security computer software to stay clear of killing ability.
placement by which killing Trojan?
Trojan the potential of distinctive customers in various ways and assault, QQ key location from the killing in the subsequent Trojan:
1) Examine regardless of whether the memory module Trojan ;
2) Examine the registry entry within the boot program corresponding to regardless of whether the horse was replaced;
3) Examine the default of a variety of prevalent file varieties with out opening the plan to be replaced by Trojan horse ;
four) Verify whether the startup goods loaded IE Trojan (for example BHO);
five) Verify the section specifies whether or not the Windows technique files replaced by Trojan horse;
6) Check the or p> nine) Examine whether or not the method hosts file, Tencent domain identify was hijacked.
QQ Why really should prompt the person to fix computer software vulnerabilities?
software package vulnerabilities might be exploited will be the software package defects or errors inside a timely method can significantly reduce the vulnerability patch to be hazardous Trojan invasion, so as to safeguard the safety of consumers on-line everyday life.
Vulnerability What exactly is the hurt?
Windows operating system, IE browsers and numerous common applications, aggregate, practically each and every month one can find new vulnerabilities are found out. Each time a new vulnerability is found out, criminals might be in a highly brief time period maliciously exploited to create a brand new Trojan. Microsoft's monthly patches would create loopholes in the method plan, users can download patches patch vulnerabilities. Mainstream software software package vendors may also release software patches every now and then plan, or offer an updated version fixes vulnerabilities programs. In case the user does not have time to patch or upgrade an application, as soon as hit Trojan to exploit these vulnerabilities, the user's personal computer will likely be quick invasion. Consequently, the person is necessary and timely bug fixes and safety updates for technologies upgrades have applications.
What types of vulnerability?
flaws You will discover two primary types: program vulnerabilities and application vulnerabilities. Will be the running system vulnerabilities (like Windows) within the logic design defects or mistakes, as criminals make utilization of loopholes within the program Trojan personal computer intrusion entrance. Software Vulnerability refers to the software software program (like Workplace software package, Flash software program, player software, P2P application, and other commonly used application) logic style defects or mistakes, resulting in the program itself can be employed to assault or an attack and manage the consumer pc method accessibility.
technique of bug fixes what?
possibly repair vulnerabilities or fix software vulnerabilities, the simple inspection approaches have to open the program file to verify the software package edition quantity along with other details. End users can resolve bugs inside the following approaches:
1) employing technologies provided by Microsoft Windows Update, Microsoft formally launched the method checks the patch installed, the software application vendors release patches or even the most recent edition of Active;
2) the use of assistive software package protection patches, such as QQ pc butler, QQ software program management, Kingsoft, Soaring Antivirus, etc., to facilitate checking the computer files and programs in associated methods could be the latest edition from the file, the have to have for patches, upgrades;
3) QQ2010 built the newest vulnerability checks reminders can remind users the newest fixes a number of vulnerabilities.
Vista Residence (www.vista123.com), love the world wide web, fell in love with Vista123.com