With the rapid development of network technology, more and more viruses have begun to intrude into our operating systems through new technologies, undermining system files to gain a glimpse of our privacy, at this critical moment, we need powerful anti-virus software to help us protect our systems from viruses. Coincidentally, I recently got a well-evaluated anti-virus software-the Destroyer, after testing, I feel good. Next I will introduce his installation and usage and performance. I hope that readers of the IT168 Security channel can use the ideal anti-virus software as soon as possible.
I. installation and configuration of the Destroyer:
As a good anti-virus software, the destroyer's installation method and steps are still very simple, and no complicated configuration is required after use.
Step 1: Get the Destroyer antivirus software installation CD and run the installation program from the CD. The main program of the software will execute the self-extracting command. (1)
Step 2: The Virus destroyer Installation Wizard appears. Click "NEXT" to continue. Note that the version we use is the Virus destroyer Personal Edition, of course, if other anti-Virus software has been installed on our computer, we should first uninstall these anti-Virus programs, although the Virus destroyer can identify Mainstream anti-Virus software and automatically start anti-installation programs, however, some anti-virus programs still cannot be identified, so you need to perform the operation manually. (2)
Step 3: Enter the user information. The product serial number is marked on the registration card on the drive. Follow the serial number information and click "NEXT" to continue. (3)
Step 4: Set the installation directory of the anti-virus software for the destroyer. The default directory is c: program filesvirus chaser. We can modify the directory by clicking the browse browser button NEXT to it and click "NEXT" to continue. (4)
Step 5: Set the check options during the installation process. Here, we mainly set which operations will be automatically run after the antivirus software of the Virus destroyer is installed, including the latest Virus Database Upgrade, local hard disk Virus scanning, and memory and boot Area scanning. This can be set as needed. Generally, the first and third items are selected. The first is to perform a full scan after the upgrade, and the third is to ensure that the current system does not have a virus after installation. (5)
Step 6: The program then copies the required files to the local hard disk. After the installation is complete, relevant operations will be performed based on the user's previous settings, such as scanning the current memory and boot area information to see if the virus is infected. (6)
Step 7: when no viruses are detected in the memory and boot area scans, you can start using the Destroyer Personal Edition. (7)
Step 8: The default destroyer Personal Edition provides a fresh and clear interface. (8)
Step 9: After the installation is complete, a prompt will be displayed indicating that the settings of the Virus destroyer are complete. Now, click "Finish" to close the installation window. (9)
Ii. Basic Application of the destroyer Personal Edition:
Next, let's take a look at the basic application of the destroyer Personal Edition. In general, the software is very easy to use, and all functions and operations can be easily found, unlike some anti-virus software, it takes a long time for a parameter to be set.
Step 1: After connecting to the network, click the "Upgrade" button in the upper-right corner of the main interface of the destroyer Personal Edition. Our destroyer Personal Edition anti-virus software will automatically connect to the upgrade server for download. virus files in the vdb format are upgraded quickly, which is much faster than similar Kaspersky files. (10)
Step 2: Generally, the virus database number is used to determine the upgrade of the anti-virus program of the current destroyer Personal Edition. At the same time, the last upgrade time will also be seen in the "regular" tab on the main interface, this user-friendly setting promptly reminds us to upgrade on time.
Step 3: In addition, you can easily set the monitoring content from the regular labels on the main interface, including the mail monitoring function, system monitoring function, and firewall function. These are all necessary. We need to select them based on our actual situation. Personally, we recommend that you select system monitoring and firewall functions. In this way, the anti-virus software of the destroyer can monitor various processes of the system at any time, and immediately trigger alarms when a virus of a USB flash drive or an automatic virus intrusion occurs, on the other hand, the firewall function can effectively block hacker intrusion. (11)
Step 4: In the "scan" tab on the main interface, we can scan the local hard disk or related directories as we like, and the mobile settings and optical drive are also in the scanning scope. While scanning, temporary files can also be quickly deleted, which has two advantages: on the one hand, it can greatly improve the space usage of the hard disk, and on the other hand, deleting temporary files can also greatly increase the virus scanning speed, when deleting temporary files, we can set the region memory options in the lower right corner, including Cookies, temporary page files, Page Link records, recently opened files, and so on. (12)
Step 5: of course, our destroyer Personal Edition anti-virus software provides fast scanning and Comprehensive scanning functions. We can choose based on our actual situation to quickly scan faster, the tests for these two scans will be described in detail below.
Step 6: under the "log" tab, we can see the name of the virus involved in the currently updated virus database. This is very important, we can learn the most prevalent and harmful virus names on the Internet through the latest updates. At the same time, you can have a clear understanding of the basic information scanned by the destroyer on other interfaces, such as firewall logs, isolation areas, event logs, and scan logs. (13)
Iii. Special Features of the destroyer's soft drive:
Of course, there are still many highlights of the destroyer Personal Edition in terms of special functions. The main points are as follows. Let's introduce them one by one.
(1) more flexible ways for users to handle viruses:
In the "General" Area of the "function Settings" tab, we mainly set security parameters. By default, the anti-virus software of the destroyer Personal Edition provides us with high, medium, and low, you can customize four levels of security settings. High-Automatic Repair of virus infected files. If the files cannot be repaired properly, the destroyer will automatically delete the files, which will cause slow system execution. -Automatic Repair of files infected with viruses. If the files cannot be repaired properly, the destroyer will automatically prompt you that there are files that cannot be repaired on your computer. Low-the system prompts you to discover a virus. You can select the following processing methods, such as repair, deletion, and ignore. User-Defined: the user selects the method to operate and process viruses. At the same time, we can also choose the appearance, language, and interface image of the destroyer's soft drive. This allows users to process viruses more flexibly. (14)
(2) more types of anti-virus targets:
Traditional anti-virus software only detects and removes viruses, while some anti-virus software automatically kills programs that are useful to users, such as Chinese patches and hacker tools, which brings users trouble in actual use, our personal version of the destroyer can be used to set the type of anti-virus targets in detail. Options include advertising software, spyware, hacking tools, potential dangers, and file compression, by default, it does not automatically scan and kill hacker tools. In addition, we can also set "only scan for files smaller than xx mb", because many large video files cannot be infected with viruses, and traditional scanning will spend a lot of time scanning video files, this affects the efficiency of anti-virus detection. (15)
(3) system scanning:
The destroyer Personal Edition can assign different operation methods for different types of scans, such as how to manually scan files that can be repaired, how to operate files that can be repaired during system monitoring and the operation process of mail repair options. (16)
(4) The performance of the built-in firewall is unambiguous:
In addition to the above anti-virus features, the destroyer has built-in system firewall, which does not occupy much resources, but the effect is still very good, we can see this in the "firewall" settings of the "function Settings" tab. (17)
After clicking "firewall settings", we can filter out various programs, ports, and IP addresses of inbound and outbound data packets that are currently communicating with the outside world through the system Nic, to disable communication between a port, you only need to enter the port number in "blocked port. (18)
After "protecting all networks" in the "status", all programs cannot pass the firewall by default, to allow a program to use the network, we need to set "allow" rules. In addition, when we click the "block access to shared folders" option, the system's default sharing and manual sharing will not be available, to a certain extent, protecting the local system from network attacks. (19)
(5) virus hazards:
I used to search for a virus I found when I used other anti-virus software to kill it.