This year, the domestic anti-virus software is still free for the theme, the domestic three kill soft manufacturers in the rising and Jinshan has entered the free camp, only the remaining jiangmin a struggling support, have to say that this is Zhou 祎 alive to force.
The following small series first for you to introduce the virus classification. According to the virus algorithm can be roughly divided into five major categories.
2011 Annual Free
In today's WIN10 system use tutorial, we will share with you the use of the system's own anti-virus software Windows Defender production offline antivirus disk method. Now, let's take a look at the specific steps! More tutorials, welcome to the WIN10 system usage manual!
Windows Defender
How to use:
1, the program double-click to run, all the way to click "Next", and then select the media you made: CD, u disk or ISO image.
Windows Defender
2,
360 anti-virus software add a whitelist of trust:
1. Find the 360 antivirus icon, double click on "360 Antivirus", click on the top right corner of the "Settings" button, as shown in Figure 1
Figure 1
2. Click "File Whitelist" in the "360 Antivirus-settings" screen, as shown in Figure 2
Figure 2
3. Click the "Add File" button in the pop-up wind
Win7 System under the file is 360 antivirus security guard quarantine how to restore?
Step One: 360 antivirus
1, open 360 Antivirus, click the bottom left corner of the main interface "View the quarantine zone";
2, check the need to recover the file, and then click on the lower right corner of the "restore the selected" can be.
Step t
First, a comprehensive killing
Install the anti-virus software, the first thing to do is to all the files in the computer for a comprehensive check, especially in the inspection must not forget to detect memory. After a full inspection can return the computer a "clean".
Second, timely upgrade
Antivirus software is able to kill the virus, one of the most important thing is that it stores a variety of common virus virus information, in the virus kill
effective way to cut off its transmission.
In the field of information security technology, the anti-virus gateway based on hardware development has been introduced for some time, and the software products with the same function appear earlier in the market. From the application effect to see, hardware products with high performance and stability of the user's favor. The biggest flaw of software antivirus wall is that software has some differences wi
of language, a dwarf who grew up unable to act.
Stumbled, I walked all the way, fortunately, never lost the initial feeling, from the initial beginner fun, to the fun of development, and then to today with the team is still interesting, I feel that I am looking for the life of the control, and then a plunge in, in the program, about her out, ah, very fun!
What is in life, I am in the process of imitating what to do, this thing let me creative constantly, in fact, is life to my freedom.
Later
Custom killing:
Click on the custom killing, we can choose their own to check the disk (including U disk)
Lightning killing
Click the Lightning Kill, Baidu Antivirus will quickly kill your system disk
Overall killing
Click on the overall killing, Baidu Antivirus will be your system carefully kill the
Baidu Antivirus already has the
In order to prevent malicious Trojan virus Uninstall, Baidu Antivirus does not allow third-party programs to uninstall; The specific Baidu antivirus uninstall method has the following three kinds:
Method One, when you install this software, the software itself with an uninstall program, as long as click: Start---program---find baidu anti-virus software----above will have this program uninstall program.
Me
How to use 360 antivirus software to easily intercept window ads under the Win7 system
1, first open 360 anti-virus software, if there is no installation can go to the system home in the column download installation.
2, open 360 Antivirus, in 360 antivirus home page directly below the right click on the "window block."
3, in the "360 Window Interceptor" Insi
When we use 360 protection, we often encounter some files have been quarantined, or you are using the computer often accidentally delete some files, so it will be your work can not be done, but now the anti-virus software has basically a file recovery function, Small make up to share the next 360 antivirus How to recover files? I hope that in the work or study can help everyone Oh!
The first step: Open 360 Antivi
Presumably, users are deeply harassed by window ads or spam ads, but many people do not know how to intercept. Today, small make up to share 360 antivirus how to carry out spam advertising interception, take a look at it!
1, open 360 antivirus interface, click the window to intercept.
2, then will pop up to a 360 window blocker.
3, then select the strong interception, and
Foreign very authoritative anti-virus software evaluation gave NOD32 a high score. A total of more than 40 awards worldwide, including Virus bulletin, PC Magazine, ICSA certification, checkmark certification, and so on, is the only 26 times in the world through the vb100% test anti-virus software, high according to the top products! Product line is very long, from Dos,windows 9x/me,windows Nt/xp/2000/2003/vista, to Novell Netware Server, Linux, BSD, etc., are available. Can be real-time monitori
First of all thanks to the xhj moderator for the vast number of users to provide anti-virus software CD-ROM, USB disk collection, and provide anti-virus software upgrade methods. When using antivirus upgrades, HXJ uses Windows command-line to provide upgrades, as follows: IEXPLORE http://..., using this command, requires the user to specify the location of the download, very unpleasant (this winrar too), there is no other way, As long as the user a cl
Some anti-virus software often will be some ASP files as a virus deletion, sometimes simply impossible, the program inexplicably can not use, because fewer documents AH ~ ~. This is mainly because the antivirus software will be some ASP code as a trojan keyword, record preservation, so encountered with this keyword, it will prohibit the operation or deletion.
The solution is to take these keywords apart.PutDim TstreamSet tstream = Server.CreateObject
eration=2) [*] X86/countdown succeeded with size 2199 (iteration=3) [*] X86/countdown succeeded with size 2217 (iteratio N=4) [*] X86/countdown succeeded with size 2235 (iteration=5) real 1m33.468s user 0m52.195s sys 0m39.830s Roo t@bt:~#
Upload Read.exe to XP, then run in cmd, antivirus software does not report the threat:
Microsoft Windows XP [version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\Documents and SETTINGS\ADMINISTRATOR>CD
The first step, open 360 anti-virus software can see the main interface at the bottom left there will be the number of isolated threats, we click "View Quarantine" into 360 antivirus quarantine zone;
If you still can't find the blue isolation tip shown above in the above steps, it is hidden and you need to point the mouse to the area to eject the hint.
The third step, in the quarantined content to find the file to be recovered, and the
Often found that some pro-test software and no poison, but the anti-virus software will appear false positives, if it is 360 anti-virus software false positives, we can set the software into a white list, the next time the launch will not appear to report the drug situation.
1. Open 360 antivirus software, click ' Set ' in the upper right corner.
2. There is a ' file white list ' in the Navigator click to enter.
3. There are three whi
Still in the computer poisoning and worry? Make yourself a virus-killing disk. Do not know how to do? Don't worry, here are one by one ways for you:
First download Kaspersky Portable version, unpack, put inside the AVP6 and Kav6 (USB). EXE copy to u disk root directory.
Then create a new text document in the root directory of the U disk and write the following code:
[Autorun]
SHELLEXECUTE=KAV6 (USB). Exe
Icon=avp6avp.exe
(Note: Shellexecute= behind is to kill the soft path, icon= is the ic
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.