From the registry, cut off all the hacking paths.

Source: Internet
Author: User
Tags key modify string window

In the network to our work to learn to bring great convenience at the same time, viruses, Trojans, backdoor and hacker programs also seriously affect the security of information. One common feature of these programs infecting computers is the writing of information in the registry to achieve such purposes as automatic operation, destruction, and propagation. The following is the author collected online, by modifying the registry to deal with viruses, Trojans, backdoor and hacker programs to ensure the safety of personal computers.

1. Clean up the message of the words left after visiting the "Network Neighborhood"

Under Heky_current_usernetworkrecent, delete the following primary key.

2. Cancel the automatic dialing when landing

Under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionnetworkrealmodenet, modify the "AutoLogon" in the right window to "01 00 00 00 00".

3. Select users when you cancel the login

All users have been deleted, but also to select the user when logging on, we want to cancel the user to choose when logging on, we will be under Hkey_local_machinenetworklogon, in the right window, modify the "Userprofiles" value is "0".

4. Hide the name of the computer user login

Under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionwinlogon, create a new string "DontDisplayLastUserName" in the right window, setting a value of "1".

5. Prevention of Acid Battery v1.0 Trojan damage

Under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunservices if the "Explorer" key value is found in the right window, the Yai Trojan is removed.

6. Prevent the destruction of Yai Trojan

If the "Batterieanzeige" key value is found in the right window under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunservices, the Yai Trojan , delete it.

7. Prevent Eclipse 2000 Trojan damage

Under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunservices, if the "BYBT" key value is found in the right window, it is deleted.

Then remove the right key value "Cksys" under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunservices and restart the computer.

8. Prevention of BO2000 damage

In the hkey_local_machinesoftwaremicrosoftwindowscurrentversionrunservices if the "Umgr32.exe" key value is found in the right window, the BO2000 is shown. Delete it.

9. Prevent the destruction of love worms

If the "MSKernel32" key value is found in the right-hand window under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun, delete it.

10. The "Interner option" in the "tools" bar of the IE menu is prohibited.

The name of the C:windowssystem under the name Inetcpl.cpl renamed to Inetcpl.old or other names will appear prohibited use of the situation to change the names back, you can resume use.

11. Prevention of backdoor damage

If the "Notepad" key value is found in the right window under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun, delete it.

12. Prevention of WinNuke damage

Under HKEY_LOCAL_MACHINESYSTEMCURRENTCONTROLSETSERVICESVXDMSTCP, create or modify the string "Bsdurgent" in the right-hand window, and set its value to 0.

13. Prevention of Keyboardghost damage

In Hkey_local_ Machinesoftwaremicrosoftwindowscurrentversionrunservices If you find KG.EXE this key value, delete it, and find KG.exe files and kg.dat files, delete them all.

14. Find Netspy Hacker Program

Under Hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun, look for the key "Netspy" in the window on the right, and if it exists, it means that the Netspy hacker program has been installed and deleted.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.