It feels like there are more and more viruses and various types of Trojan programs on the Internet nowadays, and they appear in different ways. In addition to strengthening awareness of prevention, how do we determine whether our computer has been implanted in the back door? In fact, this is very easy. You only need a simple line of code to query the exceptions in the computer. Today I will share with you several simple and effective detection methods.
Method 1, first we find my computer icon on the computer desktop, and then right-click on this icon to click "Manage".
Then we see an option for "Local Users and Groups" in the left column in the hypervisor dialog box, and quickly double-click the left mouse button on this option. You can see that this option has been expanded and two folders are displayed, namely "User" and "Group".
We left-click on "User". At this time, we can see the list of all users in this computer in the options bar on the right. You can double-click the left mouse button on any user name to view the usage permissions that the corresponding user has. I checked here and found that there are several unknown accounts that actually have the Administrators super administrator privileges. This way, it is very suspicious.
can delete all guest accounts that are not used very much and some unknown users. Don't leave any opportunity for those ill-intentioned hackers. This first method is relatively simple to operate and has no threshold.
The second detection method, we can click on the start menu in the lower left corner of the desktop, and then enter cmd in the input box. At this time, a cmd icon option will appear. Just right-click on this cmd icon and select to manage Just run as a member. Enter the following command in the black command prompt dialog box to view the corresponding system information.
1. Command: nat user [This command can view all users in the operating system. Users with $ hidden characters cannot view it. They can be processed through user management tools]
2. Command: ne localgroup administrators [This command can view the operating system, All users with super administrator permissions]
3. Command: netstat -ano [This command can view all network connection status in the operating system, and check whether there is a suspicious IP connection, so as to determine whether there is a suspicious backdoor]
Operation summary :
By managing users in the operating system and network connection status, we can clearly and transparently understand. Whether there is a Trojan backdoor for the computer? In daily use, we must always remember that we should not download programs of unknown origin from the Internet. If we want to use a certain software, we should download and install it at the official website of the software. Avoid computer infection.
usage tips:
1. In addition to using the netstat -ano command to view network connections, you can also use the TCPView program officially launched by Microsoft to view the detailed networking status of each program in the system.
2. After the above operations are completed, you can install antivirus software on the computer and update it to the latest version, which can safely reinforce the operating system and immediately avoid frequent hackers.