How do I check if I am being monitored by the Grey Pigeon ?

Updated on society 2024-05-14
14 answers
  1. Anonymous users2024-02-10

    In the runtime, type: netstat enter, if you close all the programs and still see that there is an IP connected to you, it means that your computer has been hacked.

  2. Anonymous users2024-02-09

    The gray pigeon is a well-known back door in China. Compared with the predecessors of the glacier and the black hole, the gray pigeon can be said to be the master of the domestic back door. Its rich and powerful functions, flexible operation, and good concealment dwarf other backdoors.

    The client's simple and convenient operation makes it possible for beginners to act as hackers. When used legally, Grey Pigeon is an excellent remote control software. But if you do something illegal with it, the gray pigeon becomes a very powerful hacking tool.

    The function of this tool is specifically designed to find blackhole backdoors and gray pigeon backdoors on your computer.

    A variety of "Grey Pigeon Backdoor Killing Tools" can be used

    To you below**::

  3. Anonymous users2024-02-08

    Give you the addresses of the two gray pigeon killing tools, and then let's kill them again. Toxic antivirus, no poison antivirus, by the way, it is recommended that your computer install Kaspersky + Security Guard 360 With these 2, it is basically invulnerable.

  4. Anonymous users2024-02-07

    Boot with an ice blade to detect whether there is an 8000 port.

    Only connect to the Internet. Do not open any other programs.

    If there are 8000 ports, it is.

    Click. ok!

  5. Anonymous users2024-02-06

    There are gray pigeons on the Internet that are killed, and the next one will do.

  6. Anonymous users2024-02-05

    I don't know much either, I used to be in an Internet café once, and 360 could detect it. I want to find a computer company directly.

  7. Anonymous users2024-02-04

    Reinstall the computer, and there will be no more.

  8. Anonymous users2024-02-03

    Comes with free antivirus. Simple and easy to use.

    The pigeons are basically killed by hand.

  9. Anonymous users2024-02-02

    Gray dove, there is no definition of this thing yet, and I don't know what its nature is. The function is the ability to see what your monitor is displaying. Control your camera.

    Record your keyboard. Turn on any data on your computer, including power on/off. Afraid of the workaround:

    You open the Task Manager and see there's a process.

    If it's followed by your username, then it's not a pigeon, if it's systenm, it's a pigeon.

  10. Anonymous users2024-02-01

    It's not so smelly, it's so long, just go directly to the remote uninstallation tool of the Chinese Army's gray pigeon studio, and you will know whether your computer has gray pigeons in a few seconds.

  11. Anonymous users2024-01-31

    You can go into safe mode with the next 360 first aid kit and see if it works. If that doesn't work, then redo the system, and if the problem persists, format your hard drive and redo the system.

  12. Anonymous users2024-01-30

    Gray pigeon, glacier, remote control king, black hole, falcon and other remote control software can monitor every move on the monitored computer, and even all the information on the computer, this kind of remote control software containing the nature of Trojan horses is running in the background, and the concealment is generally OK, it is running in the background, and it is difficult to find. Some so-called "justifiable" remote control software, but this kind of software is generally not well concealed.

    How do I know that someone else is controlling my computer remotely? It's hard to notice, because the speed of today's computers can be, and the impact of general Trojan software on speed is very small, or even negligible. The upstairs said installation of the Si Izas is a good choice.

    Vassi Izas is the nemesis of remote control software. Although it is not an antivirus software, it can fundamentally block illegal screen monitoring, illegal keyboard and mouse recording, block password theft and document theft, and is a new concept of anti-illegal monitoring software. As soon as there are four major illegal surveillance, Vasiizis will automatically cut it off.

    This is especially true for viruses that are not prevalent, Trojans made by hackers themselves, and some so-called legitimate surveillance software, because these are things that cannot be detected or killed by antivirus software.

  13. Anonymous users2024-01-29

    The easiest way is to kill the next one, otherwise look for a file with hui bytes to see if there is an unknown file to start when the system boots when the system is downloaded in the system32 folder.

  14. Anonymous users2024-01-28

    There's a little blue computer in the task bar that says you have to right-click, and when you click on it, it shows a dialog box that asks you if you want to end the Gray Pigeon program, and if you have this symptom, it means that you've hit the Gray Pigeon, and this is superficial, and if you don't have this on the surface, then you look for the service item in the hijackthis log. 023-**c:\windows\*.

    exe: If you don't have either of these symptoms, then you don't hit the gray pigeon.

    Computers run very slowly, and CPU usage often reaches 100%.

    According to Jiangmin's anti-virus experts, after the "gray pigeon" variant virus runs, it will copy itself to the windows directory and delete the installer by itself. Modify the registry to register the virus file as a service item to achieve automatic startup at startup. Viruses are also injected into all processes to hide themselves from antivirus software.

    Automatically open the Internet Explorer in order to communicate with the outside world, listen to the hacker's instructions, connect to the hacker's designated site without the user's knowledge, steal user information, and other specific programs.

    It is precisely because the main program of the "Gray Pigeon" variant is generally hidden, the file is not easy to be killed by antivirus software in normal mode, and it can be easily modified by some packing tools, so that new variants can be easily generated.

Related questions
14 answers2024-05-14

The intraocular pressure rises by more than 25-30 mmHg, and the normal intraocular pressure in dogs and cats is about 15-30 mmHg. An increase in intraocular pressure often causes the optic nerve to degenerate, leading to blindness. Why does this happen? >>>More

14 answers2024-05-14

Draw venous blood for blood sugar test many times (not necessarily fasting), urinalysis, urine glucose can be done, and a blood lipid test should be done. If your doctor suspects that you have impaired glucose tolerance, he or she will give you a glucose tolerance test. >>>More

22 answers2024-05-14

X-ray chest X-ray can make an impression diagnosis based on the location and shape of the lesion, and the diagnostic coincidence rate is very high, about 85-95%, but it is not 100% accurate. If there are no other symptoms, tuberculosis cannot be ruled out, because the symptoms of tuberculosis are atypical, and the typical symptoms appear one after another with the development of the disease, and there can be no conscious symptoms in the early stage of the disease. >>>More

3 answers2024-05-14

From the point of view of program development, the following comments can be understood: >>>More