Alibabacloud.com offers a wide variety of articles about computer anti virus programs, easily find your computer anti virus programs information here online.
Author: Zhuang Xiaoli (liigo), 2010/7/5
This article first address: http://blog.csdn.net/liigo/archive/2010/07/04/5712547.aspx
Reprinted please indicate the source: http://blog.csdn.net/liigo
Since the release of the easy language 5.0 static compilation version, there are still some anti-virus software false positives. programs compiled in easy language are vir
What is antivirus software?
Antivirus software is a virus, Trojan horse and so on all known to the computer has a harmful program code to clear the program tool.
"Antivirus software" by the domestic generation of anti-virus software manufacturers name, and later because of the world with the
Some days ago a classmate computer infected with a ferocious virus, looking for me to see, the scene is very solemn and tragic: the bottom right corner of the screen is constantly popping bad ads, the system icon part of the changes, more computers out of many programs, CPU occupancy rate 100%, the mouse keyboard is almost unusable.The process of antivirus is tim
Personal Summary of computer anti-virus knowledge
Common computers may have been infected with viruses. computer viruses are troublesome nowadays. This is not a computer problem, but a virus problem. The damage and attachment capa
problem. Haha, I like it, this is not a good thing!
Ii. Initial Diagnosis
After arriving at the site, we will first make a preliminary diagnosis of the computer and learn the details of the computer's problems. By asking the staff, we can make the following judgments:
(1) the computer is definitely infected with viruses;
(2) the computer has never been reinforce
Every day, countless people are plagued by computer viruses. Every day, people boast about how effective the anti-virus software he uses is. Today, hundreds of computers are killed. Anti-virus software vendors do not forget to remind them to buy their genuine
The once-breaking Network viruses, such as the "Shock Wave", "pandatv burning incense", and "Internet Banking theft", have brought a huge shadow to our online life and work.Once a computer is infected with a virus, it will eat away a large amount of internal (slow) Storage and hard disk space, which will paralyze the system, hard Disk Data, confidential information, online banking accounts, online banking p
Conventional:In safe mode, use antivirus software to disinfect.Safe Mode only loads system core processes and some hardware-driven processes.Restart the computer, press F8 on the boot to enter the selection interface, the upper and lower keys to select Safe Mode. Special case, the computer is an ASUS motherboard desktop, when the boot press F8 incredibly entered the ASUS Motherboard Setup interface.Workarou
. The virus overwrites the original system file. Therefore, the operating system cannot be restored even if the antivirus software kills the virus.
Misunderstanding 2: anti-virus software is dedicated to virus detection and removal, while Trojan killing is dedicated to Troja
one, "forced to run the program"
1, first we need to open your computer task Manager, this is any state can be ejected, press and hold the keyboard above the Ctrl+alt+del exhaled.
2, after the outgoing Task Manager, we click on the upper right corner, there will generally be a new button, click to open a new window, found in the inside "new task run."
3, open the operation, in which you want to open the program, such as antivirus software, is 3
Viruses will always find ways to invade our computer to sabotage, although you can use anti-virus and other software, but also must not ignore the usual prevention work. "Resist outside the country" is the most ideal, so we suggest that we should use the "prevent first" principle to deal with the virus. The following
the Super Admin login-no programs will run after you enter the system.
You'll be amazed how the current system behaves completely non-toxic, and that's a good time to open it now:
"Start → procedures → management tools → Computer Management → Local Users and groups → users"
Delete the inside User1 and user2 two user rights,). After doing this, I guarantee that your win2k is just like a new one, and any
, many Trojans have backups, removing the ontology and restarting machines, but in fact, at this time, the connection between the trojan and the outside world has been cut off by Kabbah, and it is just a dead mahle in the machine. It is a bit uncomfortable to see "unhandled threats. False positives often occur, because many software (especially rogue plug-ins) are using virus technology (secretly modifying processes and using a large number of "hooks
virus overwrites the original system file. Therefore, even if the antivirus software kills the virus, the normal operation of the operating system cannot be restored.
Misunderstanding 2: anti-virus software is dedicated to virus detection and removal, while Trojan killing i
administrators. To view and set the application scope of a policy, you must set the "force" attribute of the Software Restriction policy. The method is as follows:
1. Go to the Local Policy Editor or Group Policy Editor and click "Software Restriction Policy". The "force" project is displayed in the right pane;
2. Double-click "force". If the current user range is "all users except the local administrator", select "all users" and click "OK", as shown in figure 4.
The above describes two methods
specific anti-virus tool with conditional permission.
Anti-Virus is very skillful. Therefore, it is very important to select anti-virus software suitable for you and enable monitoring at any time. Do not forget to upgrade it!
in use and cannot be deleted", but these files are not in use, at this point, you can try to restart the computer and enter safe mode at startup. After you enter safe mode, Windows Automatically releases control of these files and deletes them.
"Security Mode" Restoration
If the computer cannot be started properly, you can use "safe mode" or other startup options to start the
engines use the DLL Hook Technology to inject themselves into the system process, which is the same as the DLL Trojan. In order to successfully intercept and kill the driver-level Trojan Rootkit, the Anti-Virus engine needs to run part of itself as a driver to enter the system kernel ...... Speaking of this, users with low computer configurations should be able
, specify your USB flash drive to correctly type the USB flash drive.
2. When Anti-Virus is enabled for a virtual soft drive, the system must first install the virtual soft drive program vfloppy.
3. When you run the virtual optical drive to start anti-virus, the computer wil
Comments: The method of using anti-virus is to use general operations, such as anti-virus software, open the process manager to close unfamiliar processes, and so on. Today, I want to learn about the magical anti-virus Method for
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.