1. repair damaged system files
During normal computer operations, some important system files may be lost due to a misoperation. As a result, the system becomes very unstable and error messages are always prompted, if you reinstall the system for this purpose, it will be a waste of time. In fact, using the SFC file detector command can easily help you detect and repair damaged system files.
Specific Method: insert the system installation disc, enter the "sfc/scannow" command in the Command Prompt window, and press Enter. Then, the sfc file detector will immediately scan all the protected system files. In about a few minutes, SFC detects and fixes protected system files.
TIPS: If there is no Windows XP installation disk, but the installation disk file is backed up on the hard disk before, you can use the following small settings to allow the file detector to recover system files from the installation files on the hard disk.
In the registry, expand the "HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionSetup" sub-key, and modify Installation Sources, ServicePackSourcePath, and SourcePath in the right window as the system installer path on the hard disk, for example, if the original installation file of Windows XP is stored in the CDXP folder of the edisk, change the key value of the preceding three keys to "E: CDXP ". In this way, you can directly use the installation file on the hard disk to restore the system without inserting the installation disc.
2. 3. Kill the Trojan Horse
Nowadays, many new technologies have been used to prevent Trojans. However, general anti-virus software can only be used to detect but cannot kill the latest Trojans because these Trojan virus processes are well hidden, in general, the trojan virus process cannot be ended, and the trojan virus program has a strong self-replication protection function. At this time, we can use the tasklist, taskkill, and Del commands at the command prompt to kill the Trojan horse.
First, Run "tasklist/tasks" at the command prompt, and the corresponding PID value is X, then, Run "taskkill/f/t a.exe" or "taskkill/f X" to terminate the process. The parameter "/f" indicates that the process is forcibly terminated, this is effective for stubborn processes. Finally, Run "Del a.exe" on the Windows fault recovery console to completely delete the trojan virus.
TIPS: Execute "tasklist/svc" to display the services corresponding to each process. This will help us to view suspicious services. In addition, you can view and kill hacker processes on a remote computer. For example, the IP address of the remote computer is 192.168.0.55, and the user logon name and password are "zla169" and "123456", respectively ", then run "tasklist/s 192.168.0.55/u zla169/p 123456" to view the processes running on the remote computer, run "taskkill/s 192.168.0.55/u zla169/p 123456/f/t a.exe133" to force the process named a.exe on the remote computer.
3. Attach a "Life and Death" to the undead Process"
Sometimes, even common process managers cannot kill a "weird" process. In this case, we can use a command prompt to compress it with a life-and-death character.
Step 1: Open the Process Manager window and find the process that cannot be killed by the Process Manager, if the "PID (process identifier)" of the process cannot be found in the "process" column of the current process manager )", click "View> Select column" in the "process" tab of the task manager and select "PID (process identifier. Finally, find the process flag of the process.
Step 2: Enter ntsd-c q-p PID and press enter to terminate the process.
Only the System, SMSS. EXE, and CSRSS. EXE processes cannot be killed by this command. The first two are pure kernel state, and the last one is the Win32 subsystem. ntsd needs it.
TIPS: if you are not clear about the parameters of a command prompt, you can enter the command and add "/?" Press enter. For example, if you want to view the parameters of the "cmd" command, you only need to input "cmd /?" You can.
There are many other commands in the Windows Command Prompt. You can view all internal commands by executing the "help" command in the command prompt. For each command, for example, for the COPY command, we can use "COPY /?" To view its usage. In the command prompt, you can solve many difficult problems in Windows. If you have mastered the method, I believe that you will soon learn how to use command prompts flexibly.