How can we restore the computer when it's poisoned?

Source: Internet
Author: User
Tags email account

People who have used computers have more or less encountered computer poisoning incidents, how to solve? Look here!

Please do not reboot

Generally speaking, when you find that there are abnormal processes, unknown programs run, or the computer runs significantly slower, or even IE often ask whether to run some ActiveX controls, debugging scripts and so on. Then it means that you may have been poisoned at this time.

And a lot of people feel poisoned, think the first thing to do is to restart the computer. In fact, this approach is extremely wrong. When a computer is poisoned, if it is restarted, it is highly likely to cause greater damage.

Break the network in a hurry

Because of the outbreak of the virus, not only slow the computer, but also damage the data on the hard disk, but also may send out your personal information, viruses and so on, so that the harm further expand. To this, found that after poisoning, the first thing to do is to disconnect the network.

More ways to disconnect the network, the easiest way is to run to the computer behind the cable, which is the most straightforward way. However, in the actual application, we do not need such trouble, after all, running to the back of the computer is still relatively irksome. If you have a firewall installed, you can disconnect the network directly from the firewall, if you do not have a firewall, you can right-click on the "Network Neighborhood" icon, select "Properties" from the pop-up menu, and right-click "Local Area Connection" in the open window to set it to disabled. If you are a dial-up user, just disconnect the dial-up connection or turn off the Moden device.

Total Antivirus

In the absence of worries, we can carry out the killing of the virus. The killing should include two parts, one is in the Windows system for a full antivirus, the second is in DOS under the antivirus. At present, the mainstream anti-virus software is generally able to directly create a DOS antivirus disk. In the antivirus, we recommend that the user first to the anti-virus software to make the necessary settings. such as scanning files in a compressed package, scanning e-mail, and so on, and handling files that contain viruses, such as "purge viruses" or "quarantine", rather than "delete files", in order to prevent important files from being deleted because of misuse.

Change important data settings

Because viruses, trojans are often to steal the user's personal data for the purpose, so after a comprehensive anti-virus operation, must be some important personal data, such as QQ, email account password reset. Especially after the discovery is Trojan horse program, especially need to carry out this work.

Check your Network Places

If it is a LAN user, after processing the virus of their own computer, but also to check whether other computers on the network are also infected with the virus. Because many viruses will attack other computers on the network. A virus in one's own computer is most likely to infect other computers on the network. If it is not cleaned up in time, it is highly likely that it will be transmitted in reverse.

The method of checking is to perform a comprehensive virus removal on each computer, can also install Jinshan such virus firewall, if there are other computers on the network virus, then the virus firewall will stop the attack, we only need to open its interception log, you can know which IP address issued by the virus database, According to the IP address and then find the computer, and according to the above method to deal with it!

Note : More wonderful tutorials Please pay attention to the triple computer tutorial section, triple Computer office group: 189034526 welcome you to join

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.