Intermediary transaction http://www.aliyun.com/zixun/aggregation/6858.html ">seo diagnose Taobao guest cloud host technology Hall
Many people use tools like ice blades to destroy virus files, but 8630.html "> sometimes the effect is not ideal; some people will be deleted after the virus file to generate a text file with the virus file name, the number of bytes to the same size as the virus file, and set it as read-only property, the following steps:
1, point start-run, input "CMD", preferably with the NTFS format support
2. Go to the partition where the virus file resides and use the CD command to enter the directory where the virus file resides, such as:
C: Enter into C disk
CD Windows\System32 Enter System32 folder
3, remove the virus file hidden and read-only properties (if not omitted), such as virus file name Bfdarx.exe:
Attrib-s-H Bfdarx.exe
4, delete virus files:
Del Bfdarx.exe
5, the establishment of the same name folder to prevent virus file regeneration (This step is the most important OH):
MD Bfdarx.exe
Ps: Note to bring the suffix too
PS: Some directories in DOS are forbidden to write operations, such as Windows\System32\Drivers, if most of the virus files have been processed after the remaining can be used to operate in Windows
6, to the same name folder lock, to avoid virus coverage
attrib +s panes Bfdarx.exe, but better with the cacls command, you can directly reject anyone to modify the folder!
7, OK, after the completion of the restart into the Windows security model in a comprehensive killing virus it, after the completion of the anti-virus can be the establishment of their own garbage folder deleted