Ghost has vulnerabilities, be careful of traps when restoring images

by ellie on 2008-08-12 16:40:27

Nowadays, various universal Ghost installation CDs and files for the Windows XP system are popular on the market and online. They are indeed convenient to use; installing a system only requires restoring the Ghost image file, installing some drivers, and it's done in less than ten minutes. However, among these universal Ghost versions of the system discs, there are both high-quality ones and garbage, and even traps with hidden backdoors!

**Analysis of Windows XP Universal Ghost Systems**

When creating a universal Ghost system, after successfully installing the system, the creator deletes unnecessary files that come with Windows and removes hardware information before packaging the system. If, prior to installation, the creator intentionally replaces a certain system file with a Trojan backdoor or opens certain ports, activates dangerous services, or leaves accounts with blank passwords, then the resulting Ghost system will have numerous security vulnerabilities. When these Ghost systems are distributed and used by others, users of these systems may be controlled by the creator and turned into "zombies" (compromised computers).