"Customers" "impersonate the leader", "pay the deposit", "winning variety shows", and nowadays, the lawbreakers have a variety of modus operandi and new forms of online fraud continue to emerge. In recent days, many users have sent help to Tencent computer butlers, claiming that they have encountered cyber fraud. The novelty and concealment of the modus operandi is hard to prevent.
Case I: Disguised customer service, send "repair software"
According to the netizen Mr. Wang, a lot of pop-up windows appeared on his computer. During the process of browsing the webpage, one pop-up window was seen. Please contact XXX for computer problems. With a mentality of trying it out, Mr. Wang added the contact information shown in the popup window. “Looking at his avatar is the avatar of the security software, he feels that the credibility is relatively high.†After several conversations, Mr. Wang downloaded and installed the repair software provided by the customer service, but this also went into the trap designed by lawbreakers.
After installing the so-called repair software, Mr. Wang not only failed to solve the problem, but also had more troubles. After further negotiations, the customer service expressed that he would need to collect a fee of 20 yuan to help repair. At this point, Mr. Wang felt faint. I may be cheated.
Tencent computer butler analysis found that the repair software sent by the customer service actually has a remote control Trojan, when the user downloads and installs, the computer will not be controlled, personal account privacy, file security will face a great threat. It is recommended that users do not install and download software of unknown origin through social networking platforms, forums, and other social platforms. At the same time, computer security software must be kept turned on for security detection of downloaded software.
Case 2: Pretending to lead and layout "work content"
If the law-breakers who use the remote control Trojan to steal user privacy are described as hateful, then the following forms of fraud will not only make people angry and helpless.
Recently, the HR of a foreign trade company posted on the Internet that it had encountered the notorious "blackmailer virus." According to the post, the HR received an e-mail one day and the attachment indicated that it was a resume. It was downloaded to open the attachment and wanted to see the details. The result was intercepted by Tencent Computer Manager. The original is a Trojan mail, often see a similar red pop-up window, at first glance did not mind, but the word "blackmailer virus" which appeared in awe-inspiring reminds her of her friend's experience.
According to reports, this HR friend also received an e-mail, but the content is to confirm his ticket to the Frankfurt Book Fair next month. After downloading the attachment, the computer files were all encrypted and replaced with the file name and format. He wasn't able to recover the format before consulting the entire company's technical masters.
At the same time, computer desktops also have information left behind by criminals. Translating it basically requires paying “Bitcoin†to decrypt files. Since HR's friend computer has archived many important documents, quotes, plans, customer resources, etc., if these files cannot be recovered, the impact will be disastrous. In desperation, he can only start to inquire about Bitcoin's market price.
Tencent computer housekeeper analysis found that such emails are usually sent in plain English. There will be recipients' names in the content. Common keywords include but not limited to: flight tickets, invoices, travel expenses, etc. Such topics as the day-to-day work are closely linked, and lawbreakers often imitate the tone of the boss, colleague, or partner in order to increase the credibility of the mail.
It is understood that the Bitcoin blackmailer virus has a long history and began to erupt in the country in 2015. It not only extorts users but also steals personal privacy. Tencent anti-virus laboratory research found that extortion Trojans are often spread through office macros, js script files, hta files, and network hang horses. In addition, the domestic version of the copycat version of the Bitcoin blackmailer Trojan horse, extortion Trojans in a highly active state, Tencent computer stewards only in September daily killing extortion Trojan horse variants up to more than 30,000 kinds.
The embarrassing new network fraud allows all users to build a healthy and clear network environment while accessing the Internet conveniently and at the same time. Not only does the user need to improve their awareness of security protection, but security vendors are also duty-bound. The newly enhanced Tencent computer butler's 12.0 version of the Trojan horse's ability to combat the virus will undoubtedly give everyone a strong shot.
In the 12.0 version of Tencent Computer Manager, the new attribute “File Identification†was introduced on the basis of the traditional real-time main defense function, and the real-time rule control system in the cloud was added. After the behavior on the user's computer triggers the main defense monitoring point, Tencent Computer Manager Cloud Master Defense combines the file engine results, file identification, and cloud real-time rules with three latitudes to intelligently determine whether the behavior is abnormal in the cloud and deliver a corresponding solution. With the Trojan horse developed for persistent viruses and deep hidden viruses in the computer, killing the "Sanlijian" - bootclean removal technology, rootkit killing, system first aid kit, Tencent computer butler, both offensive and defensive, killing the Trojan horse in the cradle In order to further protect the user's online security.
Semiconductor Fuse and Ferrite
Fuse refers to an electric appliance that, when the current exceeds the specified value, melts the fuse and disconnects the circuit with the heat generated by itself.When the current exceeds the specified value for a period of time, the fuse melts and disconnects the circuit with the heat generated by the fuse itself.A current protector made from this principle.The fuse is widely used in high and low voltage power distribution system and control system as well as power equipment.
Ferrite is a metal oxide with ferrous magnetism.As far as electrical properties are concerned, the resistivity of ferrite is much larger than that of single metal or alloy magnetic materials, and it has higher dielectric properties.Ferrite magnetic energy also shows high permeability at high frequencies.As a result, ferrite has become a non-metallic magnetic material widely used in the field of high frequency and weak current.Due to the low ferrite magnetic energy stored in the unit volume, saturated magnetic induction strength (Bs) and low (usually only pure iron 1/3 ~ 1/5), and thus limits its higher requirements in the low-frequency magnetic energy density in the field of high voltage and high power applications.
Semiconductor Fuse, Fuse Cutout, Protection Fuse, Square Fuse, Fuse Link, Ceramic Fuse, Fuse Box, Fuse Resistors
YANGZHOU POSITIONING TECH CO., LTD. , https://www.cndingweitech.com