Alibabacloud.com offers a wide variety of articles about common computer virus names, easily find your common computer virus names information here online.
Explorer.exe
Then: Use winrar to open C:\Program Files\Common Files\Microsoft Shared\MSInfo
The way to open it is to start the WinRAR program first, and then click on the--> level to open the above directory, in MSInfo there will be a eight-bit EXE executable file such as: CF62255D.dll and CF62255D.exe. To delete it
Third: Start Explorer.exe
Four: Open the registry (Start--> run-->regedit--> carriage return)
Under Hkey_local_machine\software\microsof
Computer viruses are rampant today, to our information security has caused a great impact, today, the W7 of the small series to introduce you to modify the registration form to prevent computer virus methods!
1. Clean up the message of the words left after visiting the "Network Neighborhood"
Under Heky_current_usernetworkrecent, delete the following primary key
What are the common computer viruses?
According to the virus existence media, the virus can divide into the network virus, the file virus, the boot type virus. Network
to allow the system administrator to configure the desktop environment and system services for minimal management. Therefore, it is of little use to the vast majority of common users. Therefore, you only need to uninstall it to prevent malicious virus intrusion!
The procedure is as follows: in Windows 98 (or Windows NT 4.0 or later), open [my computer] → [Contro
file is generated after virus file instead of virus infection. In this case, only isolation or deletion measures can be taken, because the file contains only virus code and there is no clearing problem.
The virus uses some special methods to infect files and processes the infected files. So that the anti-
There are 2 types of devices in Linux: Character devices (unbuffered and can only be accessed sequentially), block devices (buffered and randomly accessible). Some of these devices are abstractions of physical hardware that actually exist, while others are the functionality provided by the kernel itself (independent of specific physical hardware, also known as "virtual devices"). Each device has a corresponding file (node) in the/dev directory.common devices and file
sense;
6. If you encounter the above problems, and you do not have the ability to solve these problems, we recommend that you choose "one-click Recovery" To restore the factory status of your system (note: This operation will result in your system setup or some loss of some data, please use caution) in case you have backed up important data. Or you can contact our service provider for help;
Virus protection, ease of use
You may have heard about th
Computer as one of our daily use equipment, once the occurrence of such a fault, we can imagine the trouble, especially some rookie friends, once the failure of the hands of the work can not be completed on time, their own blind toss and fear of damage to the hardware equipment, maintenance and bear economic losses. In fact, we do not have so much trouble, computer problems are often a small number of glitc
Computer now has become a daily necessities of life, then how much do you know about computers? The following small series for you to organize some common computer hardware knowledge, quickly to learn!
Computer hardware, including all the physical parts of a computer, to di
deleted, isolation and not, under Windows 98 or DOS Delete will cause Windows XP can not be restarted? , what is the document used, what method to solve??
This file is a driver file for Windows XP multiuser management. A backup of this file is available under the X:windowssystem32dllcache directory. Just copy this backup to X:windowssystem32 to replace the file with the virus. Make a Windows 98 Startup disk and copy the Attrib.exe file to the floppy
Solutions to nine common problems with computer memory
1. Failed to boot normally
Solution: there are three main ways to solve this problem: first, change the memory location, which is the simplest and most commonly used method, generally, the old low-speed memory is inserted in the front position. Second, when the system is able to boot, enter the BIOS settings and set the memory-related settings according
Computer Board common problems and coping strategies Common failure One: no display Computer boot No show, first we have to check is the BIOS. Important hardware data is stored in the BIOS of the motherboard. At the same time the BIOS is also a more vulnerable part of the motherboard, very vulnerable to damage, onc
10 common computer problems to solve by yourself
Sometimes, seemingly complex things can be solved in the simplest way. So, if there are problems with the Windows system, we might as well be able to run the Windows Update System update first, fix all the patches, or try to download a new driver, and the problem is likely to be solved.
Is the computer too slow
Tip One: Minimize Startup items
Now a lot of software is required to boot on the run, they will have a hint, ask you whether to boot on the load, meaning that as long as you turn on the computer, the software will also be loaded, so although to avoid the trouble of looking, but greatly slowed down the system's running speed, while allowing longer boot time, So this optimization is essential, boot run software can not do not.
Tip Two: Try not to open
Computer black screen is more common, usually because of hardware problems, such as hardware aging, there is also because of the graphics driver problem. Also, if you install a system that is not a genuine Windows XP Professional Edition, then the computer will be forced to black screen once per hour, that is, the background of the
One-click restoration is to allow the system to return to the status of the previously backed up system. Generally, the operation takes more than one minute. This simple method has become a common method for many computers to "cainiao" to handle system problems.
"One-click restoration" is equivalent to Resetting the system andHardware will not cause harm, so you can use it with confidence. It is worth noting that the "one-click restoration" function
Name:MD Usage:MD "folder name" Useful: Batch Build folderThe shutdown command shutdown At 18:00 shutdown–s:xx shutdown Shutdown-s-T 3600 3600s rear shutdown03.ping Command-l Specifies the size of the packet , up to 65500 -n Specifies the number of packetsttl=64 description is win7 system ttl=250 description may be Unix system -T Unlimited number of commands issued04.nbtstatUsed to query the NETBIOS information of the network machine and the MAC address of the machine . Used to eliminate t
configuration portal, click All under Certificates to see all the certificates
Creating a certificate can be divided into two steps:(1) Generate a certificate request file(2) Submit the certificate request file to the configuration portal site
(1) Generate a certificate request file
In MacOSX OS Mac computer, turn on "applications" → "Utilities" → "Keychain access" into the Keychain Access tool, the interface is as follows
At th
Some time ago, Gu Lei's blog showed him sharing articles about the auxiliary software on his computer. He thought it was good, so he decided to share some of the commonly used tools on his computer to promote progress, if you are also a tool controller, you are welcome to come to the sun.Launchy -- Quick Start Program
Two years ago, a colleague recommended this software to me.
I press Alt + space countless
Computer motherboards FAQ and Coping strategies
Common fault One: no display on the boot
No display on computer boot, The first thing we need to check is the BIOS. The motherboard has important hardware data stored in the BIOS. At the same time the BIOS is also a more vulnerable part of the motherboard, very vulnerable to damage, once the damage will cause the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.