Some viruses are very stubborn, after the deletion and so you restart the computer, it came again, together to see how to remove the stubborn virus.
First, empty Internet Explorer (IE) temporary files
Antivirus reported viruses If you are under a path like this: C:documents and settingsadministratorlocal settingstemporary Internet Files, which usually means that the virus is downloaded through a web browsing , when your browser does not have a patch installed, then you are likely to be poisoned. For such a virus, the easiest way to clean it up is to empty ie temporary files.
Second, display file name extension
Show view all files and folders (including protected operating system files), many Trojans use double extension, hide property camouflage, by viewing this can make the virus no hiding place.
Third, turn off System Restore
System Restore is the most convenient and efficient tool to repair the system, if you have to create a system restore point, in the discovery system error or poisoning, restore to the relatively early restore point, you can repair the system.
If you find that a virus exists in a directory similar to the C:system Volume information, which indicates that a virus was backed up in a previously created restore point, the way to clear it is to turn off or disable System Restore, when the restore point is removed and the virus does not exist. After a few minutes, you can reopen the System Restore and create a non-toxic restore point.
Iv. ending the virus process
Open Task Manager to find an abnormal process. The end process is a manual antivirus method.
Five, modify the service "Startup Type" stop/start service
Sometimes the virus is loaded as a service, and you can use this method to shut down the virus program.
Vi. setting up a secure account password
Simple passwords are dangerous, easy to hack by hacking tools, and hackers can then embed Trojans from remote computers. Even if there are anti-virus software is not taboo, hackers can easily from remote shutdown your antivirus software. For a system that uses only simple passwords and Internet access, the stakes are too great.
Seven, open Automatic Updates using Windows update
Using Automatic Updates is a good way to fix your system vulnerabilities in a timely manner, and you can also use the Golden Hill cleanup expert to manually complete the download and installation of the patches. Cleaning experts offer a good solution for a computer system that does not have genuine validation.
Viii. access to Safe mode
Normal mode can not clean up the virus, we usually have to kill the virus in safe mode, and some viruses and even safe mode to eliminate the failure, you should try to boot to the security mode with the command line,
The difference between the two is that with the command line security mode, only the console (CMD) character interface, no resource Manager (desktop), requires some DOS command experience. You can access the antivirus software installation path, execute the command line antivirus tool. Jinshan Poison PA's command line is type KAVDX, enter after the antivirus.
Nine, close the shared folder
There is a serious risk of writable sharing in a local area network, but if necessary, turn it off.
X. Use Registry Editor for simple delete/edit operations
Registry editing is risky, and if you are unfamiliar, it is recommended that you create a System restore point before you modify it, or you can back up the registry key branch that you want to modify, and then use Registry Editor to modify it.