Internet Explorer virus killing

Source: Internet
Author: User

Today's anti-virus tools have many categories, but many cannot completely solve various stubborn viruses. In particular, various IE viruses and malicious code make it difficult for many netizens to defend against them. The most common phenomenon is that when you open IE, you can easily pull out an advertisement website window. IE is tampered with, and system resources are seriously damaged. In severe cases, you even need to reinstall the system. Is there any way to effectively prevent IE viruses? After a hard work, I found some ways to share with you.

Anti-virus software reduces workload

Use various anti-virus tools to kill all the viruses that can be killed first, so as to reduce the subsequent workload. Such as IE virus exclusive tools such as 3721 Yahoo Assistant (which can scan and kill most IE viruses and restore browsers), Anti-Spyware experts, Kingsoft drug overlord, rising star, and Jiangmin. Of course, if you cannot delete the virus, you can also try to press F8 at system startup to enter safe mode and start the antivirus tool and IE Repair Tool for scanning and killing.

Scan process manual killing

My computer once turned the CPU into a hot topic and found that RUNDLL32.EXE runs 99% of the CPU resources, which is in the SYSTEM32 folder in WINDOWS and should not be a virus. From experience, it should be used to run DLL files with certain viruses. And resolutely cancel the launch. Find the location of the file and delete it. As long as it is in a non-system folder, you can delete it with confidence.

In addition, I recommend that you use hijackthis, a free process scanning tool, to scan processes. According to the scan process file, there are comments next to the normal file, and you can delete all comments without comments. Of course, some abnormal files, especially the abnormal .exe file hidden in the System32 folder, and its parent folder, are often not easy to touch. In fact, you can go to c:/windows/system32, find the file, and view "properties ". At this point, you will find that these files are often marked by XX advertising companies. These viruses are usually a single executable file, which can be directly deleted in SYSTEM32 or a folder.

However, it is still necessary to delete objects that cannot be deleted directly. For example, some file shredders are used to delete the files. For example, the Windows XP of SP2 has the file crushing function to delete the running virus. Some parent folders also contain the. ini text files of some ad sites and other folders. These are the sources of spam websites and can be deleted directly.

Clear residual viruses

Sometimes, some viruses are not running, but run at a certain time after IE is opened or some events are triggered. Some are still some. DLL files that are hidden in the system folder, which are hard to find and often mistakenly believe that they are system files and do not dare to scan and kill them. You can determine the creation time of folders and files based on these stubborn viruses.

You can manually adjust the folder property to view all files, including hidden files and system files. Right-click the file and choose View details from the shortcut menu. The detailed information list is displayed. You can select the last time to sort the information and view the newly created folders and files. If you remember the first day of the virus attack, you can directly find that the creation time of the abnormal folders is roughly the same as that of the virus attack, and you can directly view them, sometimes it is often found that these folders contain information about the advertising website or other abnormal content. Delete these folders. Some may worry, but in fact, these new files will not affect the system operation.

Of course, you can also use WINDOWS search to find the most recently modified files. In this way, you can analyze and delete the files one by one. For those that are neither created or recently installed, it is very likely to be viruses. Judging from the time of the virus attack is even more foolproof.

The trilogy above is summarized by the author in my work. It may be troublesome, but it is quite effective. Thank you for your correction.

 

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.