Five emergency measures after computer poisoning

Source: Internet
Author: User

1. If an online user finds an exception, he/she should immediately disconnect the connection.

If you find that IE often asks you if you want to run certain ActiveX controls, generate Mo Ming's files, and ask about debugging scripts, be sure to be vigilant. You may have been tempted. There are two typical cases of intrusion into the Internet:

1. it is easy to modify the default homepage or title of a browser when you browse a webpage with malicious code. In addition, you can format the hard disk or keep Windows open, wait until the resource is exhausted and the machine crashes. This situation is much worse. data that you have not saved or already stored on the hard disk may be lost in part or whole.

2. it is a potential Trojan attack or a worm-like virus attack that allows your machine to continuously send your privacy to the outside world, or use your name and email address to send spam to further spread the virus; there is also a hacker's Manual intrusion to snoop your privacy or delete your files.

Solution: disconnect immediately to reduce your losses and prevent viruses from spreading to more online computers. Do not restart or shut down the system immediately. For further measures, see the following section.

Ii. Backup transfer documents and emails should be made immediately after poisoning

It is easy to run anti-virus software after virus poisoning, but in order to prevent the virus software from mistakenly killing or deleting the documents and important emails you have processed, you should first migrate them to other storage media. Some files with long file names and unprocessed emails must be backed up in Windows. Therefore, we recommend that you do not exit windows first, because once a virus occurs, you may not be able to access Windows.

Regardless of whether these files are infected with viruses, you should back up the files and mark them as pending. Because some viruses are designed for a specific anti-virus software, other files will be damaged as soon as they are run. Therefore, backup is just in case. After removing the virus from the hard disk, you can analyze and process the extra backup files.

3. Clean DOS boot disks and anti-virus software under DOS

Up to now, we should follow the standard manuals of many anti-virus software to do it in a step-by-step manner, that is, cold start after shutdown, with a clean DOS boot disk boot should not be less; in addition, virus viruses may cause some key files to be damaged by Windows and may cause frequent illegal operations. Therefore, anti-virus software in Windows may fail to run. Therefore, please also prepare an anti-virus software for DOS in case of any attacks.

Even if you can run anti-virus software in Windows, use two or more tools to perform cross-cleaning. In most cases, Windows may need to be reinstalled, because the virus will damage some files, slowing down the system or causing frequent illegal operations. We recommend that you do not be biased against a type of anti-virus software. because the focus is different during development and different anti-virus engines are used, various anti-virus software have their own strengths and weaknesses, and the cross-use effect is ideal.

4. If there is a backup of GHOST, partition table, and boot area, use it to restore the most secure

If you perform Windows Ghost backup at ordinary times and use the image once, the operating system is the safest. In this way, the potential unkilled trojan programs are cleared by the way. Of course, this requires that your GHOST backup is absolutely reliable.

5. Change your network password after the system is restored again

This includes the username, password, email password, and QQ used to log on to the network. This prevents hackers from knowing your password during the last intrusion. In addition, because many worms randomly send your information to the outside, appropriate changes are necessary.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.