Has your computer been accessed by hackers?

Source: Internet
Author: User

What is the occurrence of a hacker virus? It is hard to say, because they have a variety of scenarios. However, if your computer does the following, it is likely to be infected with a hacker virus.
The computer sometimes crashes and sometimes restarts. When no operation is performed, the computer is desperately reading or writing the hard disk. The system does not explicitly search for the soft drive, and does not run large programs, the system is getting slower and slower. Right-click to open [my computer] and choose [properties]> [performance]> [system resources] From the shortcut menu. Normally, the system resources are more than 90%; use CTRL + ALT + DEL to call up the task table. Multiple programs with the same name are running and may increase with the increase of time. Especially after connecting to the Internet or local area network, if your machine has these phenomena, you should be careful. Of course, there may be other viruses.

It is best to use the latest "insecticide" to prevent the virus from becoming ineffective for years. If you have no anti-virus software in your hands, but there is something wrong with it, whether it is a virus or not, you still need your experience to determine it! The following are some experiences:

1. Check c: autoexec. bat and c: config. sys. These two files contain drivers required by the system. Check whether there are any strange drivers added. If there is any suspicious object, add "REM" in front of it, and remove "REM" in recovery.

2. Check the first lines in the Windows. ini file:

[WINDOWS]

Load =

Ren =

Here is the program automatically executed after Windows is started. For example, the Chinese star is here. The hacker virus note.exe may be here. If you have any doubts about the object, add ";" before it, and remove ";" during restoration.

3. view the lines in the SYSTEM. ini file in the Windows directory:

[ENH]

Device =

The system itself and the added driver are usually placed here. The added drivers generally use full paths,

For example:

Device = c: abcd1234.386

Similarly, if there are suspicious objects, add ";" to the front and remove ";" from the recovery.

4. Check program> Start in the Start Menu ].

The program is automatically executed after Windows is started.

C: Windows Start MenuPrograms: delete it when it is started, and restore it from the "recycle bin" when it is restored.

5. In Windows, view the registry. Execute regedit in start → run ".

Make sure to back up the data before modification. In the registry.

HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows

What is executed in CurrentVersionRunServices and Run,

The famous "back orifice" virus is here.

6. Execution files in Windows: .exe,. com,. dll,. 386 ...... Both of them may be hacker viruses or carriers. When the system is normal, it is best to back up the above files to be prepared!

7. In the Windows directory, check whether there is a file named Winstart. bat. This file is also an automatic batch processing file similar to Autoexec. bat, but it can only work for Windows and cannot be used in DOS. Take a closer look at the list of drivers you don't know. Generally, this automatic batch processing file will not be used. If you suspect that it can be backed up first,

Delete it and restart the computer.

One thing I often do is:

Run MSCONFIG frequently to see what programs can be started.

In addition to the programs running here, You should also check the services started by the system. If it is suspicious, you should stop.

-The more frequently you read, the more likely you will find suspicious things and the less complicated you will feel. In addition, I update WINDOWS every month to download patches.

If you are a computer that prefers to run naked on the internet, pay attention to the important information.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.