The right remedy recognizes the differences between virus Trojans and rogue software

Source: Internet
Author: User

There are three main threats to our system security: viruses, Trojans, and rogue software. Although the three are relatives, they are completely different, especially when clearing them, you can use a special clearing method to effectively deal with them. Otherwise, they will not only fail to be cleared, but may even miss out, this poses a deep risk to the system. Let's take a look at how we can deal with these three major pests.

You have to deal with the virus.

Among them, viruses are the most harmful. Traditional computer viruses are easy to use, but they only show off a technology used by computer programmers for destruction. However, today's computer viruses have become a method for hackers to profit. For example, pandatv and avterminator all have a strong commercial atmosphere. This type of virus damages the system, it will also add various methods for obtaining benefits. Once the system is infected with a virus, the system will be slow and error messages will pop up constantly. if the system is heavy, the system will crash and data will be lost. Therefore, we must step by step to combat viruses.

Precautions for virus removal

First, we recommend that you have a network-less environment to clear the virus and unplug the network cable, because the virus may have online update functions. Second, it is best to clear the virus in the safe mode of the system, because in Windows, the virus may be linked to the system file, and thus cannot be deleted, in security mode, only the most basic driver is loaded, and the virus cannot run, which is easier to clear. After entering the security mode, we run anti-virus software for full scanning to clear the virus.


● Go to security mode to prevent viruses

Skill is the key to dealing with Trojans

Although Trojans are harmless to the system, they are a private killer. They can not only steal files in our system, but also steal various network accounts, including QQ and various game accounts, you can even sneak peek at our camera. A Trojan can be cleverly hidden in the system. It aims to help hackers steal data and satisfy the hacker's desire to gain a peek. Due to the characteristics of Trojans, we also need to be skillful in removing Trojans. We can start from the following points:

Startup item: automatically starts a trojan by adding itself to the system startup Item. Click Start> Run, enter msconfig to run the System Configuration Utility, switch to the start tab in the window, and check whether any suspicious project exists.

Process: To run a Trojan, a process must be generated or inserted into another process. Press Ctrl + Shift + Esc to run the task manager to check whether suspicious processes exist. If the "Task Manager" cannot run, you can also use a security tool similar to "ice blade.

Service: Remote Control Trojans generally have added service functions to achieve greater system permissions. For service detection, we can go to "Control Panel"> "Management Tools"> "service" to check whether there is a trojan service. Right-click the trojan service, select "properties", and select "disabled" in "launch type" on the "properties" panel ". Finally, we used anti-virus software for thorough detection and removal.


● Check for suspicious startup items

It is easier to clear security tools to deal with rogue software

Rogue software has little harm to the system. Generally, it only modifies the homepage of the IE browser and displays some advertisements. Because it is purely for commercial purposes, it does not destroy the system like a virus, and self-protection is relatively weak. Therefore, it is easier to clear the system. We do not need to manually clear rogue software. We can use some professional security tools, such as "360 security guard" and "Super Rabbit.

Take "360 security guard" as an example. Switch to the "clean up agent" tab after running, select the rogue software to be deleted, and click "Clean up now.


● Cleanup of rogue software

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.