Primary self-rescue method after system poisoning

Source: Internet
Author: User

Although many anti-virus software and firewalls are used as computer protection networks, due to the continuous updates of unpredictable viruses, unknown system vulnerabilities, and more concealed hacker intrusion, computer poisoning is common in the Internet era. So what should we do if we get poisoned? Next, let's talk about some measures to deal with the virus (for beginners, write it out to some people who are new to learning computers. If any error occurs, please note it .)

1. users who are surfing the Internet should immediately disconnect if an exception is found

The so-called exception: 1. The machine speed slows down significantly. 2. After opening a webpage, numerous dialog boxes are displayed. 3. Screen and Strange messages. 4. Uncontrolled mouse and keyboard.

There are two typical cases of Internet poisoning:

First, the default homepage or title of the browser is modified when you browse a webpage with malicious code. There is also a situation where you can format the hard disk or keep Windows open until resources are exhausted and dead-this situation is much worse, data that you have not saved or already stored on the hard disk may be lost in part or whole.

The second is a potential Trojan attack or a worm-like virus attack, which allows your machine to continuously send your privacy to the outside world, or use your name and email address to send spam to further spread the virus; there is also a hacker's Manual intrusion to snoop your privacy or delete your files.

Self-help measures: disconnect immediately, so as to avoid virus spreading to more online computers while reducing losses. Do not restart or shut down the system immediately. For further measures, see the following section.

Ii. Backup, transfer documents and emails should be immediately taken after poisoning

Running anti-virus software after virus poisoning is taken for granted. However, to prevent virus software from mistakenly killing or removing documents and important emails that you have not yet processed, you should first back up them to other storage media. Some files with long file names and unprocessed emails must be backed up in Windows. Therefore, we recommend that you do not exit Windows first, because once a virus attack occurs, you may not be able to access Windows.

Regardless of whether these files are infected with viruses, you should back up the files and mark them as "to be checked" on the tab paper. Because some viruses are designed for a specific anti-virus software, other files will be damaged as soon as they are run. Therefore, backup is a preventive measure. After removing the virus from the hard disk, you can analyze and process the extra backup files.

3. Run the anti-CIH software (even in a virus environment) in Windows)

If the CIH virus is detected, you must note that the measures recommended by newspapers and manuals should not be followed, that is, shutdown the system disk, and then use the system disk to guide anti-virus, the software that specifically kills CIH should also be run in the environment with viruses. In this way, anti-virus software may report that some files cannot be cleaned up due to read/write protection, but the actual purpose of running the virus is not to completely clear the virus, but to minimize the damage caused by CIH upon next boot, in case of damage to the BIOS hardware of the motherboard when it is powered on again, leading to a black screen, making your next anti-virus work impossible.

4. Clean DOS boot disks and anti-virus software under DOS

Up to now, we should follow the standard manuals of many anti-virus software programs step by step. That is to say, after the shutdown is cold started, boot with a clean DOS boot disk; in addition, due to viruses, Windows may have been damaged by some key files, and illegal operations will be reported frequently, therefore, anti-virus software in Windows may fail to run. Therefore, please also prepare a DOS anti-virus software such as KV300 series and Kingsoft drug overlord just in case.

Even if you can run anti-virus software in Windows, use two or more tools to cross-clean the software. In most cases, Windows may need to be reinstalled, because the virus will damage some files, slowing down the system or causing frequent illegal operations. For example, Microsoft's Outlook mail program is slow to respond even if CIH is killed. We recommend that you do not be biased against a type of anti-virus software. Due to the different focuses and different anti-virus engines used during development, all anti-virus software has its own strengths and weaknesses, and the cross-use effect is ideal.

5. If there is a backup of Ghost, partition table, and boot area, use it to restore the most secure

If you use Ghost backup for Windows at ordinary times and use the image once, the operating system is the safest. In this way, potential unkilled trojan programs are cleared by the way. Of course, this requires that your Ghost backup is absolutely reliable. If you "Back up" the trojan during the Ghost operation, the problem will be endless.

6. Change your network password after the system is restored again

This includes the username, password, email password, and QQ password used to log on to the network. This prevents hackers from entering your system with the password obtained during the last intrusion. In addition, because many worms send your information randomly, it is necessary to change your information in a timely manner.

 

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.