; Delphi --- Virus. Win32.Induc. a [Anti infection solution]; By: ZzAge; BBS: http://www.52pojie.cn; Blog: http://hi.baidu.com/zzageRecently, this virus has ignited. A lot of formal software written by delphi won the prize ....Infected with the SysConst. dcu file of Delphi, the compiled programs are infected... but the virus
360 anti-virus software can not open how to solve?
Method One, Ghost computer
is to directly ghost the computer, or to reload the system. If your computer and important files, it will be copied to D disk to draw E-disk, and then directly reload the system C disk, the C-disk format can be.
Methods two, not the virus files
1, first let the file is not
Jinshan anti-Virus weather (January 03, 2004 to January 09, 2005)
Jinshan Anti-Virus Emergency Center this week to upgrade the package update, please quickly to Jinshan poison PA website db.kingsoft.com Download Upgrade package, the following is a brief introduction of several important viruses:
Focus this week
Today, users are reminded to pay special attention to the following viruses: "AutoDownload" (Win32.Hack.AutoDownload) and "Delf" (WIN32.HACK.DELF.TX).
"AutoDownload" hacker tool, the virus is a virus generator, the resulting virus will be created by creating a remote thread into the specified system process, access network download
Anti-virus software has been developing for 30 years and has become a necessary software for everyone's daily life. Most users do not have a deep understanding of anti-virus software. Baidu, Google, forums, or friends can query which anti-
Virus Detection mechanism: a virus is a piece of code, and the final form is a file. Any data streams that are transmitted on the Internet must be composed of files to be detected by the anti-virus scanning engine. When browsing the Web page, we actually get a lot of html files, gif icons, and script files through the
Has the user to reflect, 360 anti-virus software uses after a period of time has not opened the situation. Then anti-virus software can not open how to do it? Usually the computer virus will cause 360 anti-
Anti-Virus Attack and Defense Research: Use WinRAR and AutoRun. inf for self-launchI. Preface from a series of previous studies, we can find that in order to enable the "virus" to start itself, I am also painstaking and have adopted various methods, it is often necessary to write lengthy code and have a lot of knowledge about the underlying system or registry. Th
I wonder if you feel this way. Today's computer viruses are getting more and more attacked, and hackers are getting more and more powerful. If the computer does not install anti-virus software, it cannot be guaranteed to work normally, because it may be infected with some terrible computer virus someday. If the computer network is not strictly protected, maybe th
Every day, we need to help people clean up viruses, especially the current Autorun virus. In fact, I personally think that the current situation cannot be solved only by anti-virus software, it is difficult for non-professionals to fight against viruses, But if you learn to use some tools, it is also good. The following tools hope to help you:
Http://files.cnblo
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 18, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Legendary Boys" (Win32.Troj.MirBoy.ce) and "DDoS" (Win32.Hack.DDoS).
"Legendary boy" Trojan virus, the Trojan off part of the normal operation of anti-
First, we must have a Windows PE boot disc with anti-virus software. Here we recommend the old peach.You can download winpe from thunder and burn it into a winpe boot disc.Start the computer and set the first boot device of advanced BIOS features in BIOSCD-ROM boot (while checking whether there is a blocked optical drive in standard CMOS features ),Put the windows PE boot disc into the optical drive and ent
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 02, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Bugs" (worm.dipnet.b) and "Afcore" (WIN32.HACK.AFCORE.BT).
"Bug" worm, the worm spread through the LAN, the file name of the virus is very deceptive, the virus opens
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the January 24, 2005 popular virus.
Today, users are reminded to pay special attention to the following viruses: "WORM.ANIG.E" and "Concert" (Worm.concier).
"Mud brother" worm, the worm through weak password attacks and ICQ software to spread, steal user's login password, and connect remote host, the user's machine for dangerous control.
"Concert" worm
short time, the ClamAV email server is used on the network to complete the latest protection actions.
III. install and configure f-prot
System requirements: Hardware: Central Processor: compatible with Intel X86 processor Pentium 200 or above, 32 MB (recommended 64 MB) memory, 100 MB hard disk space, display memory 4 MB. Software: kernel version 2.2 or later, and perl version 5. More than 8.
F-prot official website: http://www.f-prot.com/..., is the famous Iceland F-Port
. After confirmation, the task manager will find a strange process, hidel.exe. Although the CPU and memory occupied by it is not very large, the I/O write volume is astonishing, it seems to be a zombie, right-click it and select "Stop process" to terminate. The hard disk read/write has been restored to normal.Ii. Anti-Virus and invisible system backup toolsI have encountered a
In many cases, the same computer often has the same virus repeatedly. For example, it's okay for me to get rid of the virus just after being infected with the bad postmaster. However, after a while, the virus is not recommended. This is the so-called "re-infection of the same virus ". In fact, there are some tips on ho
Beijing Information Security Evaluation Center, Jinshan Poison PA jointly released the December 31, 2004 popular virus.
Today, users are reminded to pay special attention to the following viruses: "Porex" (win32.troj.porex.b) and "Evilbot" (WIN32.HACK.EVILBOT.A).
"Porex" Trojan virus, the Trojan will shut down the operation of some of the security software, theft of user system information and account inf
zombie, right-click it and select "Stop process" to terminate. The hard disk read/write has been restored to normal.
Ii. Anti-Virus and invisible system backup tools
I have encountered a virus "C: \ Program Files \ Common Files \ PCSuite \ rasdf.exe" that cannot be deleted. At the same time, I cannot copy the file and how to clear it. The system backup tool is u
News source: Deep Technology ForumBecause many people blindly believe that they are even superstitious about some anti-virus software with a strong "advertising flavor", I have to write such an evaluation. This is not a small problem. If you are blindly superstitious and have not passed strict tests by yourself, then the virus will talk to your computer in the cl
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.