360 Antivirus How to restore quarantine documents? in the use of 360 anti-virus software, many people have encountered a number of files have been wrongly reported. These documents are unified into the quarantine zone. So, 360 antivirus how to restore the quarantine document? Today, small make up for everyone to share 360 Antivirus restore quarantine file method.
Little knowledge: Safe Mode works by starting the computer without loading the driver outside of Windows itself, allowing the computer to run in the minimal mode of the system so that the user can easily detect and repair the computer's errors.
Cause analysis and resolution:
1, the hard drive in this section of the program loading range of bad road failure.
Solution: Recommended hard drive bad road detec
Computer anti-virus everyone will, but you have not found that sometimes you do not kill anti-virus clean so that is not killed the same, and the virus will affect the operation of your computer, resulting in the end of your computer more slowly, and then you do not know how to solve, today we will introduce some practical methods to solve this problem.
1, remov
360 anti-virus software add a whitelist of trust:
1. Find the 360 antivirus icon, double click on "360 Antivirus", click on the top right corner of the "Settings" button, as shown in Figure 1
Figure 1
2. Click "File Whitelist" in the "360 Antivirus-settings" screen, as shown in Figure 2
Figure 2
3. Click the "Add File" button in the pop-up wind
McAfee is highly defensive and properly configured to effectively prevent intrusion or data leakage. Currently, 3721, Internet pigs, Chinese mail, and a search often sneak into your computer, and it is difficult to uninstall your computer. Use coffee to stop them from entering.
Enable Mcafee access protection and create the following rules:
1. It is prohibited to create, write, execute, and read 3721 of a
Simply put, a process is an execution activity of a program on a computer. When you run a program, you start a process. Processes are divided into system processes and user processes. System processes are mainly used to complete the functions of the operating system, while processes of applications such as QQ and Foxmail are user processes.The importance of a process is reflected in the fact that you can observe it to determine which programs are runn
Many people are using the rising anti-virus software. We all know that this software has a firewall function, but some people do not like how to use the firewall, this time how to uninstall the rising anti-virus software firewall? Below are two ways to uninstall the rising anti-virus software firewall Oh, Is the use of rising anti-virus software firewall official uninstall program and the use of 360 security guards to uninstall, take a look at it.
Rising anti-virus software Firewall Uninstall m
"IT expert network Exclusive"Windows System integrates countless tools to meet the needs of users in different applications. In fact, these tools are "versatile", if you have enough imagination and are good at digging, you will find them in addition to the bank can also help us to disinfect . I don't believe you, you see!
One, task Manager to the virus behind a knife
Windows Task Manager is the primary tool for managing processes , and it can view current system process information in its Pr
proxy server This computer, the other clients basically do not have to pipe (Figure 2).
Figure 2
Iii. disabling of the Guest account
The Guest account is often a "hotbed" of backdoor procedures, and there are many articles on the web that explain how to get administrator privileges through the Guest account, so it is absolutely no mercy to play the security First battle and disable the Guest account.
Go to control Panel → user account, click Gu
Win7 System under the file is 360 antivirus security guard quarantine how to restore?
Step One: 360 antivirus
1, open 360 Antivirus, click the bottom left corner of the main interface "View the quarantine zone";
2, check the need to recover the file, and then click on the lower right corner of the "restore the selected" can be.
Step t
of language, a dwarf who grew up unable to act.
Stumbled, I walked all the way, fortunately, never lost the initial feeling, from the initial beginner fun, to the fun of development, and then to today with the team is still interesting, I feel that I am looking for the life of the control, and then a plunge in, in the program, about her out, ah, very fun!
What is in life, I am in the process of imitating what to do, this thing let me creative constantly, in fact, is life to my freedom.
Later
Open Port-NetstatTrojan viruses spread over the network, causing harm. They are all done through open ports on the computer. These open ports are equivalent to a fan of unattended doors.In this case, Run "Netstat-a" at the DOS prompt to display the open connection information for all ports. The Proto in the information indicates the connection protocol, which is generally TCP and UDP. The Local Address is the Local name and Address, and the port numb
This is the legendary World award-winning countless anti-virus software, a total of more than 50 awards, including Virus Bulletin, PC Magazine, ICSA certification, checkmark certification, is the only 28 times in the world through the vb100% test anti-virus software,High according to the top products, and detection speed is amazing, is the general anti-virus software 20-30 times, accuracy up to 100%-NOD32 this very authoritative in foreign anti-virus software evaluation gave NOD32 high score, it
You double-click the email from your friend. However, before you can read it, the virus program pops up a dialog box that tells you that the message contains a virus that is not able to clear the virus in the file, so it isolates the file so that you cannot access it.
If you are dissatisfied, call your friend and he sends you a message with a virus.
Your friend may not have sent you a virus intentionally. It is likely that your friend's computer has
1. Click Start->control Panel (Control Panel)-> Add or remove Programs (adding or removing programs): You will find four programs about McAfee, you can uninstall the following three directly, the other one is uninstall unsuccessful , Remove:
McAfee Virusscanenterprise,
McAfee Hostinstrusion Prevention,
McAfee AntiSpyware Enterprise Module
The McAfee Agent is not uninstalled.
2. Right-click My computer->manage (Admin)->services and applicat
Win8 is able to install Third-party anti-virus software, for can not install some of the famous anti-virus software abroad, the reason should be compatibility, domestic anti-virus software compatibility is very good, can accommodate multiple software without its conflict, and foreign some of the cheap can only tolerate a computer anti-virus software.
There are currently two possible reasons, one is the domestic anti-virus software uninstall is not cl
How to use 360 antivirus software to easily intercept window ads under the Win7 system
1, first open 360 anti-virus software, if there is no installation can go to the system home in the column download installation.
2, open 360 Antivirus, in 360 antivirus home page directly below the right click on the "window block."
3, in the "360 Window Interceptor" Insi
Foreign very authoritative anti-virus software evaluation gave NOD32 a high score. A total of more than 40 awards worldwide, including Virus bulletin, PC Magazine, ICSA certification, checkmark certification, and so on, is the only 26 times in the world through the vb100% test anti-virus software, high according to the top products! Product line is very long, from Dos,windows 9x/me,windows Nt/xp/2000/2003/vista, to Novell Netware Server, Linux, BSD, etc., are available. Can be real-time monitori
First of all thanks to the xhj moderator for the vast number of users to provide anti-virus software CD-ROM, USB disk collection, and provide anti-virus software upgrade methods. When using antivirus upgrades, HXJ uses Windows command-line to provide upgrades, as follows: IEXPLORE http://..., using this command, requires the user to specify the location of the download, very unpleasant (this winrar too), there is no other way, As long as the user a cl
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.