First, create a new Notepad on your computer and enter the code on the Notepad: @echo off attrib-s-h-r-a/s/d.
Then, click on the top left file → Save As, under the pop-up window select Save path, set file name for file recovery. Bat, save
This is a let you use satisfactory anti-virus software, you can automatically or manually scan and check all viruses, Trojan horses, worms, but also all safely removed, support mail attachment Scan, with real-time monitoring, can generate detailed
1, we enter the computer into the "Control Panel---programs and Functions" in the list you will see that you have installed the software, we found "rising anti-virus software", as shown in the following figure:
2, after entering after we click
Maybe you've also had a U-disk inserted into the computer after the double-click can not be opened, and then double-click All drive letters have no way to open, after the test found only using the resource manager can. But after all, do not know
Undeniably, the establishment of a local area network, security is essential. Let H3C's "fortress" to help you stop the virus attack!
Don't get me wrong, we're not talking about firewalls, but building H3C gigabit secure LANs: S5500-si and S5120
Shock wave virus to many Windows user system caused serious damage, some users have to resort to "must kill technology"-reload system, but if the installation method is improper, your system will still "recruit" again.
A reasonable partitioning of
Configure anti-spam features
N Spam is an e-mail message that is forcibly sent to a user's mailbox without a user's permission
N Junk e-mail has the following characteristics:
U recipient has not made a request or agreed to receive in advance
U
Sometimes after the U disk kill virus, found that some of the folders disappeared, do not worry, these ' invisible ' folder is only hidden, with the following method can be restored.
Steps:
1. Open Notepad, copy the following code-paste into
When you see this topic will certainly feel the manual anti-virus really very simple? The author wrote this article is to let all the rookie in the face of the virus can easily kill it, rather than reload the system, or in the reload N system after
E-Mail has become a lot of business day-to-day office of the main mode of communication, in the virus everywhere today, e-mail has become a way to spread the virus, many enterprises are suffering from the mail virus harm. As an enterprise user's
Sopho believes the recent outbreak of new Skype worms has highlighted the importance of early virus defense. Worms spread through Skype's instant messaging system have not been able to attack Sophos users, and Sophos defense has successfully
Http://service1.symantec.com/SUPPORT/INTER/simplifiedchinesekb.nsf/cn_docid
Previous|Next
Document ID
Document title
Product
20011205093435931
How to enable and disable automatic protection for Norton Antivirus
Norton AntiVirus 2000, Norton Antivirus 2001, Norton Antivirus 2001 Profession
Jiangmin anti-virus pure DoS (floppy disk + CD + U disk + NTFS General) v20050805 free version
(The virus database version 9.00.607 is updated to 2005.07.29)
Usage:
KV. rar decompress the package and run kV. bat. The graphic selection menu is displayed. Use the "Rotate" and "Rotate" keys on the keyboard to switch between them.
1. Menu 1 hard disk anti-virus: After the command is executed, the virus is directly eliminated in Windows DOS mode.
2. Menu 2 "anti-virus": After the command is executed,
, resource consumption is only half of the MFC program.
But a temporary enthusiasm can not solve the problem of lack of documentation, although there are many examples of using WTL online and explain the article, almost the MFC can achieve a variety of strange effects have been achieved, but are .... of articles. It was at this point that I saw the "WTL for MFC Programmers" series of Michael Dunn, which I felt almost as much as I did when I first met MSDN in 1995, and also the urge to translate
What is antivirus software?
Antivirus software is a virus, Trojan horse and so on all known to the computer has a harmful program code to clear the program tool.
"Antivirus software" by the domestic generation of anti-virus software manufacturers name, and later because of the world with the anti-virus industry, collectively referred to as "anti-virus software"
to move together on the wrong, and sometimes the start is forced to quit.4, Internet cafes only feel the beam Win2K Pro version, server version and XP system are not infected.5, can bypass all the restoration software.
Detailed technical information:After the virus runs, a file named Virdll.dll is generated in the WINDWS root directory at the%windir% generation Logo1_.exe.%windir%virdll.dll
The worm generates the following key values in the system registry:
Auto = 1
There's something wrong with the disk. Open on the hint to format, but the format can not be successfully completed, in the properties of the USB drive to see the use of space and available space are 0 bytes, with checkudisk view, you can also read the information on U disk, the physical hardware of the USB disk is not damaged, in order to let the flash drive back , the following steps are made:
1. Antivirus, hint no virus;
2. Run the format command
The letter is still there, and as soon as you open it, you are prompted to format it. But the format can not be successfully completed, in the properties of the USB drive to see the use of space and available space is 0 bytes, I use Checkudisk to view, but also read the USB flash drive information, the USB disk has no damage to the physical hardware, how to make the flash drive back to the dead? The following steps are done:
1. Antivirus, hint no vir
repairing the failed U disk instance steps
There's a problem with the USB drive. Open on the hint to format, but the format can not be successfully completed, in the properties of the USB drive to see the use of space and available space are 0 bytes, with checkudisk view, you can also read the USB flash drive information, the USB disk's physical hardware is not damaged, in order to let the USB flash , the following steps are made:
1. Antivirus, hint
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.