Windows systems are integrated with countless tools that perform their respective duties to meet different application needs of users. In fact, these tools are "versatile". If you have enough imagination and are good at mining, you will find that they can also help us to counter viruses in addition to the industry. I. The task manager gives a knife to the virus
Windows Task Manager is the main tool for you to manage processes. You can view the current
first, the composition of anti-virus softwareAnti-virus software consists of three parts: application, anti-virus engine and virus database.A) The main function of the application is to provide scanning objects to the engine for virus scanning, providing anti-
A few days ago colleagues in the computer process inexplicably appeared 1sy.exe,2sy.exe,3sy.exe,9sy.exe,8sy.exe,svchost.exe,rundl132.exe such files, as long as the. exe files are discolored, change flowers! In addition, the reload system did not, after another think the virus must be linked with the shutdown program, so the patience and reload the system, according to the following detailed steps to kill the virus
If we use a PC, we have to deal with the virus that will never become extinct. They will not only cause computer Rock hosts or crashes, but also damage our network. They can delete files from shared folders on the network, infect other computers, and occupy all network bandwidth. Therefore, we must use some anti-virus solution, but there is too much room for choice. To make the best decision, we need to con
Old Deng said well: No matter white cat black cat, can catch the mouse is a good cat! Antivirus software is not good or bad, can antivirus is the best. Antivirus software all exist false positives, this can not be avoided.
We can according to their own actual situation and computer configuration to install the appropriate anti-virus software. If your love machine configuration is high, you can consider using Kaspersky Kis, in the installation of an a
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the December 24, 2004 popular virus.
Today, users are reminded to pay special attention to the following viruses: "WIN32.TROJ.HARNIG.E" ("Harry") and "Small" (Win32.Troj.Small.ab).
"Harley" Trojan virus, the virus will prevent users to upgrade Windows and anti-
U disk in a 421KB uniform size of the. exe suffix camouflage folder, the virus double-click can be opened, can also be deleted, but deleted and then refreshed removable disk when the virus file appears again. Because it is the same as the original folder name, it is also known as the Disguise folder virus.
Rising security expert Tangwei said, from the
Format by many users is considered to deal with the "ultimate trump card" virus, no matter how you infected, I will be formatted after the system to reinstall, it is not a completely healthy system, this method despite some trouble, but many people think it is an effective poison coup. However, the recent emergence of a new type of u disk virus has broken people's conventional thinking mode, become more int
The principle of LAN virus infection and its prevention methods
Computer viruses have been spreading over networks for a long time, and they can also rapidly breed in the LAN, resulting in mutual infection of LAN computers, making the entire company's network paralyzed and unable to operate normally. The loss is incalculable.Lan virus intrusion principles and Phenomena
Generally, a computer network consists
One: What is mobile virus
Mobile phone virus is a mobile phone as the target of computer viruses. It takes the handset as the infection object, uses the handset network and the computer network as the platform, by sends the virus text message and so on the mobile phone attacks, thus causes the mobile phone status to be unusual.
The world's first mobile
1. Disconnect the networkWhen you are unfortunately suffering from a virus intrusion, one thing you can say is to disconnect your network connection to avoid further spread of the virus.Ii. file backupThen, you can delete emails with viruses and run anti-virus software to clear them. However, to prevent the virus software from mistakenly killing or deleting docum
Editor's note:PConline providesBear Cat burn-in virus nvscv32.exe Variant. It was investigated that this variant appeared on the 16th. The pen is lucky to be in close contact with the maid nvscv32.exe variant on the 17th, and use the following methods to clear it. The first method is recommended.
Related links:Pandatv virus exclusive and manual repair solution-applicable to readers of the
Virus SolutionWaking up: backing up important data in a timely manner is more effective than killing
Introduction: lovgate integrates worms, backdoors, and hackers to send emails via virus emails. It establishes a leak channel for users' computers by creating backdoors, by releasing a backdoor program to communicate with external remote Trojans, by releasing a password theft program to actively steal the co
DoubleHeiji
My friend has a virus W32.Jeefo today. The virus can increase the file space, and the virus is highly contagious and involves a wide area.
Some may first think of anti-virus software, such as rising, but we have not considered that the anti-virus software functio
My friend has a virus w32.jeefo today. The virus can increase the file space, and the virus is highly contagious and involves a wide area.
Some may first think of anti-virus software, such as rising, but we have not considered that the anti-virus software function is to
Personal Summary of computer anti-virus knowledge
Common computers may have been infected with viruses. computer viruses are troublesome nowadays. This is not a computer problem, but a virus problem. The damage and attachment capabilities of the current virus are far better than those of the past. Anti-Virus is also a
The most terrible thing about surfing the internet is when new viruses come out. Although we have installed various powerful anti-virus software on our computers, we also configured regular and automatic updates to the virus database, however, the virus is always updated before the virus database, so the number of atta
As long as the infection, must leave traces. Biomedical viruses are the same, so are computer viruses. Detection of computer viruses, it is necessary to go to the site of the virus to check, find abnormal situation, and then identify "in", confirm the existence of computer viruses. The computer virus is stored in the hard disk while it is active and resides in memory, so the detection of computer
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.