How to make all Trojans ineffective (abnormal)

Source: Internet
Author: User

1. Preface:
The danger of a Trojan is that it can remotely control your computer. When you become a "zombie", other people (control terminals) can enter your computer, peek at your files, steal your passwords, and even use your QQ to send messy things to your friends ......
A large number of Trojans occur because they have direct commercial interests. Once your online bank password is stolen, it's too late to cry.
Because of this, the more Trojans breed, the more wild they are. Trojans and viruses work together and complement each other, causing greater and greater harm.
To put it bluntly, a Trojan is a thief who walks into your house from a network cable. Anti-trojan has become a required course for modern computer users.
2. Principles:
Trojan hazards: Although there are many means, they are always different. The necessary steps are to create administrator users in your system. This article begins with this step to prevent trojans from establishing users. In this way, even if your computer is infected with the trojan virus, because you cannot establish a user, the trojan cannot play the remote control function. In other words, it is to discard it and turn it into [please pay attention to civilized terms ]. Of course, [Note civilized terms] also need to be cleared, but this is no longer within the scope of this article.
3. Method:
Run regedt32.exe to open your registry, which contains a directory tree:
Open the HKEY_LOCAL_MACHINE directory.
Then open the directory Sam.
Then open the directory Sam.
Open the domains directory.
Open the account directory.
Then open the groups directory.
Well, this groups is responsible for creating users. If you delete it, the system cannot create users. No matter how hard the trojan is, users cannot be created, let alone upgraded to administrators. If the files in this directory are deleted, there is no way to restore them. Therefore, before performing this operation, you must back up the data and restore the data if necessary.
Backup method: Right-click groups and select "Export" to give the exported file a name. Save the name.
4. Description:
When you enter the registry, you can only see the first Sam directory, but none of the others. Don't worry, it's because you have insufficient permissions. Right-click the corresponding directory and select "permission". Set yourself (usually the administrators) to "allow full control. And so on, until the groups directory is found.
5. Restore:
Very easy. Find the file you exported and click it.
After the groups directory is deleted, you cannot use the "User Account" and "local user and group" functions in the control panel. Therefore, backup files are important. When you need to use the relevant functions, restore them first, just as before. Of course, if you are a personal user and you have been using this computer all the time, it doesn't matter.
So far, Article It's over. If you are interested, try it. I hope I can help you and wish you good luck.

added:
if you want to make the server run more securely, you can use McAfee and qingcloud Security Settings tools.
server software: s.jb51.net

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.