Jinshan Poison PA Visionary is where

Source: Internet
Author: User

1. Garbage File Cleaning

In the daily computer application and the Internet process, the system will produce a lot of garbage files, scattered in different folders in the computer. In order to optimize the performance of computer systems, it is necessary to regularly clean up junk files.

Hundred Treasure box of "garbage file cleanup" function, one click, you can clear all the garbage (note: 64-bit operating system temporarily does not support the function).

1. Click the "Select All" button to select all junk files that are swept out;

2. Click "Purge Files" to clear all the files under the selected file.

2. System Repair Tools

System repair tools for the operating system, ie, such as the key location of the strong repair, restore to the initial state of the system, eliminate viruses, trojans and malicious software malicious tampering and other actions brought about by the impact.

Not only can fast virus-killing Trojan, but also intelligent repair system missing and damaged files. Strong repair of various system anomalies.

Click the "System Repair" button in the "Security visionary" main interface,

Click the "Process now" button to fix it.

3. LSP Repair Tool

LSP (Layered Service Provider), the Chinese name is a tiered service provider that network administrators can use to better monitor system network traffic, but at present many malicious programs use LSP to hijack browsers, such as the famous New.net plug-in or Webhancer component. If you have a pop-up ad window or are often redirected to another site when you visit the site, you can fix the LSP repair tool. (Note: This feature is temporarily not supported on 64-bit operating systems)

Click the LSP Repair Tool button on the "Secure visionary" main interface and the following interface appears:

Click Automatic Repair to complete the LSP repair operation;

If you need to restore the LSP to its original state, click "Revert to Initial state" in the pop-up interface. The LSP Repair feature will completely restore your LSP, please confirm before use.

4. Process Manager

Process Manager, is the use of "Internet trusted Authentication" Technology of the process manager, can be identified in real-time system Trojan Horse, virus, malware and other suspicious and threat processes, while adding detailed process description information to help you quickly locate the threat source, management process.

Click on the "Process Manager" button in the "Security visionary" main screen to see the following interface:

In the panel on the left shows all the processes running on your computer system, and the right panel corresponds to information about these processes, including names, paths, and so on.

Click "Identify risk process" to help you locate the quick risk process, and you can select it and click "End selected Process" for a process that is really risky.

At the same time, the upper right side of the interface also shows the CPU footprint and memory footprint, so that each process CPU and memory footprint are at a glance.

5, the historical traces clean up

Internet surfing, watching movies, Internet downloads and other computer use process will always produce the corresponding historical records and temporary files, in the war with the computer hard disk space at the same time there is the risk of privacy leakage. The historical Trace Cleanup Tool can help you clean up the content completely, and a variety of cleaning patterns are more satisfying for different computer users. (Note: This feature is temporarily not supported on 64-bit operating systems)

Click the "Historical Trace" button on the "Security visionary" main interface to display the following interface:

Click on the items in the left panel, the right panel to display the appropriate list and information.

Check the items in the left panel and click "Clean Now". (We recommend that you select "Default Cleanup" in the right panel.) )

Tips:

Some historical traces may be due to the system or software consumption can not be fully cleaned up, if encountered in such cases, please close their programs and then try again;

Clean up the use of IE when the address list to restart IE to be effective;

Clean up the run history that you used in the Start menu and need to restart Windows to take effect.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.