View Single Post
Old 07-28-2011, 02:14 PM   #2
ua1tg6hs8ooe
Lieutenant General
 
Join Date: Feb 2011
Posts: 1,225
ua1tg6hs8ooe is on a distinguished road
Default

| Back to logs list

68454 2010 年 10 月 11 日 21:51 Reading (loading. ..) Comments (1) Category: Personal Diary
recently launched a Here,gucci shoes, we solemnly declare: QQ attaches great importance to user privacy protection, and must not spy on privacy. QQ stigmatized mainly security check module. QQ is a security check module exists in the killing Trojan computer security software,gucci sale, Trojan QQ login will easily invade the memory, boot items, startup items commonly used software, desktop shortcut to the location of the documents and other security checks. Check the specific procedures: First, whether the file is an executable file (such as *. exe / *. sys files, etc.), if not an executable file, QQ safety check module free of any operation; if it is executable file, QQ security check module will further trojan checks. Executable file is a Trojan disguised or parasitic place,gucci heels, check the executable file is the industry's anti-virus software for all common techniques, not involving user privacy.
the company's
one, in the see the
Second, the implementation of the user's normal operations QQ twisted peep user privacy. For example: When a user receives the file via QQ and save to the desktop or the user will save to the desktop screenshot QQ, are the
third, QQ security check module checks the executable file twisted peep user privacy. For example, the In fact Word.exe an executable program, does not include user profile. In another example, the Internet banking is the actual executable file publicly available financial institutions, the standard procedure and does not include user online banking accounts, passwords and other personal information. These are a vast number of users is clearly misleading.
After 12 years of development, QQ accounts had not only used in instant messaging, but also widely used in many online games,gucci outlet, online internet banking payments, online shopping, community space, blog and email and applications such as micro-Bo, is an integrated communications , entertainment, information and important business permits one-stop platform, its security needs has far exceeded the level of other instant messaging products. QQ product team has been to protect the user account security as the most important work, and by providing a security check module QQ continuing series of measures to strengthen security system, QQ never spy on user privacy, and firmly believe that only by respecting and protecting the safety of users and the real private enterprises, to get healthy and sustainable development.
We must point out that, as a self-proclaimed For the company to achieve its malicious purpose against QQ, prizes as bait to deceive the public means of dissemination of false information, we feel disbelief and anger. This deceived the user's behavior has seriously damaged the reputation of QQ, we will take legal measures to protect their legitimate interests.
We also call upon the spirit of peer companies principle of the supremacy of the interests of users of products and services do a good job and welcome to the media, the user just monitoring, and jointly promote the healthy development of the Internet industry. In order to facilitate better understanding of the principles of security checks QQ, mechanisms and effects, we provide a more detailed description can be found, please the majority of users right from wrong, a company not to be deceived by the security threat,cheap gucci shoes!
QQ product team
2010 年 10 月 11 日

I can only say, Tencent QQ, you are too powerful, no wonder QQ open your program will occupy so much CPU and memory, and you still an all-powerful killing Ah Trojan software. Please,gucci sunglasses 2011, do not help me killing Trojans line does not, I have a professional anti-virus.
on any executable file renamed to QQ.EXE will be monitored, in fact, quite normal, 360 people developed the software, made clear that QQ you to check what procedures are done in the software page 360 on can be seen. Investigation is QQ.EXE procedures, play is for the problem is you QQ you are afraid of you, are you afraid of what people can find you.
360 Tingyou use of this software is, it should improve it. Become all-powerful software to monitor procedures. For example, you downloaded a suspected Trojan horse program to execute, you can rename the program QQ.EXE first and run, from 360 to monitor the software has done, is not very clear horse, remember gray pigeons were also done to do a similar program, but is to monitor a folder or what drive letter change, 360 of this will be better for the software should support it. And and
; ; above made entirely personal opinion, different views are not need Paizhuan, I do not accept.
ua1tg6hs8ooe is offline   Reply With Quote

Sponsored Links