查看: 2220|回复: 6
收起左侧

[分享] 玩游戏获取 TrustPort Antivirus 半年或 TrustPort USB Antivirus 一年授权

 关闭 [复制链接]
jzhone
发表于 2013-6-21 23:26:02 | 显示全部楼层 |阅读模式
本帖最后由 jzhone 于 2013-6-21 23:45 编辑

来自“反”斗限免

TrustPort 官网有个游戏,可以赢取一年的 TrustPort USB Antivirus 或者半年的 TrustPort Antivirus,下面我就带你玩游戏啦。



游戏地址:http://www.trustport.com/game/index.html

最少要玩完 5 关才会获得奖励,而由于玩 5 关跟玩完全部的奖励都一样,所以省点力就可以了。点击每一关后面的 「Play」 ,然后进入游戏。



游戏内容是输入文字,而本文最后有全部答案,大家可以参考。在对应的位置里输入对应的字符,这不用我教你了吧?



5 关过后出现奖励,点击 「Go To Prizes」 就可以获取奖励了。



选取你想要的奖励,然后在下面输入邮箱地址,点击 「Send」 即可。测试不用邮箱会收到不同的授权。


下面为答案:


MALWARE IS software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. MALWARE IS a general term used to refer to a variety of harmful code.



SHOULDER SURFING refers to using direct observation techniques, such as looking over someone’s shoulder, to get information. It is commonly used to obtain passwords, PINs, security codes, and similar data. SHOULDER SURFING IS particulary effective in crowded places because it is relatively easy to observe anybody.



PHARMING IS a hacker’s attack aiming to redirect a website’s traffic to another bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. PHARMING HAS become of major concern to businesses hosting e-commerce and online banking websites.



A TROJAN HORSE can be easily and unwittingly downloaded. For example, if a computer game is designed in a way that when opened by the user, it opens a back door that allows a hacker to control the computer of the user, then the computer game is said to be a TROJAN.



HIJACKING IS the modification of a web browser’s settings by a malware, spyware or a virus. A browser HIJACKER may replace the existing web page with its own. These are generally used to force hits to a particular website. Some browser HIJACKING can be easily reversed, while other instances may be difficult to reverse.



RANSOMWARE comprises a class of malware which restricts access to the computer system that it infects, and demands a RANSOM paid to the creator of the malware in order for the restriction to be removed. Some forms of RANSOMWARE encrypt files on the system’s hard drive, while some may simply lock the system and display messages intended to coax the user into paying.



BOTNET IS a term for a collection of software bobots, or bots, that run autonomously and automatically. A botnet’s originator can control the group, remotely and usually for bad purposes. More experienced botnet operators program their own commanding protocols from scratch.



SKIMMING IS the theft of credit card information used in an otherwise legitimate transaction. The thief can procure a victim’s credit card number using basic methods such as photocopying receipts or more advanced methods such as using a small electronic device (Skimmer) to swipe and store hundreds of victims’ credit card numbers.



DIALLER IS a malicious program that changes Internet access via a modem. It diverts dial numbers to lines with excessively high rates. Users usually only discover this once they receive a phone bill which is unusually high. However, with the growth of permanent Internet connections as ADSL or Wi-Fi, this form of malware is slowly fading.



PASSWORD CRACKING IS the precess of recovering passwords from data that have been stored in your computer. The purpose of PASSWORD CRACKING MIGHT be to help a user recover a forgotten password or to gain unauthorized access to a system.



SPYWARE IS mostly used for purposes such as tracking and storing internet user’s movements on the web and serving up pop-up ads to internet users. SPYWARE CAN collect almost any type of data, including internet surfing habits, user logins, and bank account or credit card information.



ADWARE IS any software package which automatically gives advertisements in order to generate revenue. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising options to the types of goods or services featured.



KEYSTROKE LOGGING, often referred to as KEYLOGGIOG, is the action of recording or logging keys struck on a keyboard, typically so that the person using the keyboard is unaware that their actions are being monitored. This means the attacker can easily gain sensistive information such as passwords.



BAITING IS like the real-world Trojan Horse that uses physical media and relies on the curiosity of the victim. The attacker leaves a malware infected USB flash drive in a location sure to be found and gives it a legitimate looking label, and waits for the victim to use the infected device. If a user inserts this device into their PC, they will install malware without knowing.


本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

x
老马儿子
发表于 2013-6-21 23:34:35 | 显示全部楼层
这么麻烦啊。。。
jzhone
 楼主| 发表于 2013-6-21 23:36:37 | 显示全部楼层
老马儿子 发表于 2013-6-21 23:34
这么麻烦啊。。。

有总比没有好
heqinlin
发表于 2013-6-22 23:11:08 | 显示全部楼层
我还是没看明白怎么玩
brisklee
发表于 2013-6-23 02:08:14 | 显示全部楼层
多谢楼主,弄个usb杀毒玩玩
卡江东N
发表于 2013-6-26 08:02:14 | 显示全部楼层
还是不会玩。。。
Ayer
发表于 2013-6-26 08:29:12 | 显示全部楼层
这个是多引擎重武器,需要电脑配置比较高。
@J熊桑
您需要登录后才可以回帖 登录 | 快速注册

本版积分规则

手机版|杀毒软件|软件论坛| 卡饭论坛

Copyright © KaFan  KaFan.cn All Rights Reserved.

Powered by Discuz! X3.4( 沪ICP备2020031077号-2 ) GMT+8, 2025-5-17 20:02 , Processed in 0.136041 second(s), 18 queries .

卡饭网所发布的一切软件、样本、工具、文章等仅限用于学习和研究,不得将上述内容用于商业或者其他非法用途,否则产生的一切后果自负,本站信息来自网络,版权争议问题与本站无关,您必须在下载后的24小时之内从您的电脑中彻底删除上述信息,如有问题请通过邮件与我们联系。

快速回复 客服 返回顶部 返回列表