can select "show all hidden files" and "Show System Files ".
In the folder-> toolbar-> Tools-> Folder Options, set the hidden and suffix names of system files to display,
3. Delete viruses
Right-click a partition disk and choose "open". The autorun. inf and tel.xls.exe files are displayed in each disk and directory and deleted. USB flash disks are the same.
4. Delete automatic run items of Viruses
Start-
Common Methods for clearing AutoCAD viruses (Acad. FAS, Acad. LSP)
Acad. FAS and ACAD. LSP are the most common CAD viruses. Because it is not harmful to the system itself, but it is not a prank program, so most anti-virus software does not work for them, the following describes the manual deletion method.
Step 1: Search for the hard disk and the Acad in the USB flash drive. FAS, LCM. FAS, Acad. LSP, acadapp
Intended audience: general online usersObjective: To prevent and solve common Trojan viruses without using any external tools
There are too many documents on the Internet about virus and Trojan Horses. It is hard to say that they are their original articles. Therefore, Jinzhou explains that no more information has been written on the Internet, the main idea is to explain it. This article was originally written to a friend of mine in Shanghai. It is ve
Larry Seltzer, editor of The eWEEK Security Center, expressed his views on why Mac and Linux are rarely attacked by viruses while Windows is attacked by viruses.
He said the recent appearance of a malicious script against Mac OS X made him feel a little uneasy. Although this malicious script is not a great threat because it does not have a propagation mechanism, it is a real worm tool developed using socia
minute. In the next infected machine, the virus has changed its hidden position. Here is called: three-dimensional deformable virus.
The characteristics of the fourth type of deformable virus are: the characteristics of three-dimensional deformed virus, and these characteristics change with time. For example, in the infected machine, just open the virus in memory changes to a look, after a period of time and become another look, again after the virus in memory is a different look. There are al
Your system is not XP SP1, but after installing the 2005 Rising antivirus software, always prompts that the system has two vulnerabilities: MS-4011 Exploit and blster Rpc Exploit ......
The most direct method is to close all ports that are not used by the system and start them again. If rising still prompts a vulnerability attack, you can't do it. Note: The ports that are closed are 135,137,138,139,445,102, and, 3127, 6129, 3389,593, and tcp.
The specific operation is as follows: by default, Win
The specific operation is as follows: by default, Windows has many ports that are open. When you access the Internet, network viruses and hackers can connect to your computer through these ports.
To change your system to a copper wall, you should close these ports, mainly including TCP 135, 139, 445, 593, 1025, and UDP 135, 137, 138, and 445, some popular Backdoor Ports (such as TCP 2745, 3127, and 6129) a
Windows has many ports that are open by default, and Internet viruses and hackers can connect to your computer via these ports when you surf the Internet.
In order to make your system a fortress, you should close these ports, mainly: TCP 135, 139, 445, 593, 1025 ports and UDP 135, 137, 138, 445 ports, some popular virus backdoor ports (such as TCP 2745, 3127, 6129 ports), and remote service access port 338
When you delete files on your computer, you will often encounter the following prompt: "An error occurred while deleting files or folders", because these files and folders are being called by the system or used by some programs. For example, when a Word file is opened, it is rejected and important system files cannot be deleted. This is a protective measure taken by the system to avoid file disorder.
Some viruses
EndurerOriginal
2005.11.24 No.3The version supplements Kaspersky's response to the three gray pigeon files.
2005.11.192Supplement Rising's reply to the file C:/Windows/system.exe of the suspicious service cryptographic servicesini.
2005.11.16 th1Version
I went to a friend's house tonight and used his computer to access the Internet. Before opening QQ, I often use anti-virus software to scan the memory and Windows system folders (this is a good habit o
the I P address and use the network administrator (h t p: // w. m y d o W n. c o m/s o f t/2 3 6/2 3 6 6 7 9. h t m L). After running the software, enter the I P address segment of the LAN in the "specified Monitoring range" and click "Add/modify, the newly added I p address segment will be added to the following I p list. If multiple I p segments exist in the LAN, you can add them multiple times.
Click OK to go to the main program page. The cyber law enforcement officer began to scan all compu
program to the system32 and dllcache directories.
Step 4: Clear the Temporary Folder and IE Temporary Folder, Run "SREng", click "Download", and click "system repair> advanced repair> Automatic Repair ". Restart the computer, press F8 to enter the safe mode with network connection, Upgrade anti-virus software to the latest virus database, and then completely eliminate virus residues.
Appendix: methods to prevent online gaming
any viruses and Trojans exist in the system, can not completely and process out of the relationship, even if the use of hidden technology, but also can find clues from the process, therefore, viewing the process of the system activity is the most direct way to detect the virus Trojan. but the system runs at the same time so many processes, which is the normal system process, which is the process of Trojans, and often the virus Trojan fake system pro
Kaspersky Anti-Virus software (Kaspersky Antivirus), formerly known as Antiviral Toolkit Pro (AVP), out of habit and simplicity, is called AVP or Kav.
Learning the significance of the detection of AVP is one aspect of AVP's detection method is a theoretical and practical test of the scientific and reasonable method, another DOS friends over the anti-virus has had such experience: "The machine infected with the virus?" OK, please use the clean and non-toxic system disk to start, and then the who
With unlimited broadband popularity, in order to facilitate BT download, many friends love 24-hour hanging machine. All-weather online, which gives some viruses, trojans "intrusion" system has brought great convenience, they can invade our computer in the middle of the night, wanton abuse. Recently, the author in helping a friend antivirus, encountered a "cannot remove virus", the following will be killing
A Trojan is actually a spy quietly running on your computer. It secretly controls your computer and steals your information. Poor people will make your system slow or even paralyzed.
How do I install it on your computer? There are three main approaches:
1. You installed
2. download and install
3. system vulnerabilities are installed through the network
Simple and
After computer poisoning, many friends turn on the "Process Manager" and close some unfamiliar programs, but sometimes this happens: when you turn off one program and then close the other program, the one that was closed just now runs again. Delete the startup item from the Registry, restart it, and restore the items that have just been deleted. Because only one operating system is installed on the computer
How to quickly discover Windows viruses without external tools
After several years of emergency response work, I think it is very useful to summarize a "methodology" to quickly determine whether a computer is infected with Trojans and viruses. This is obviously not that simple, but I found that the infection exists in almost all non-Complex attacks. If you per
Check Registry
The Registry has always been a parasitic place favored by many Trojans and viruses. Note that you must back up the registry before checking the registry.
1. Check HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/run and HKEY_LOCAL_MACHINE/software/Microsoft/Windows/CurrentVersion/runserveice in the registry, check whether there is any unfamiliar Automatic startup file in the key value. The extension is usually EXE, and r
In the network to our work to learn to bring great convenience at the same time, viruses, Trojans, backdoor and hacker programs also seriously affect the security of information. One common feature of these programs infecting computers is the writing of information in the registry to achieve such purposes as automatic operation, destruction, and propagation. The following is the author collected online, by modifying the registry to deal with
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.