Reason:
is generally due to virus trojan, may be users inadvertently downloaded to Trojan virus, resulting in EXE file can not open.
Method One:
1, click the Start menu, find in the attachment and right click on "command designator", select "Properties"; In the open window, switch to the "Shortcut" bar and click "Fi
; This program is compiled by TASM
; CIH file-type virus detection and elimination program
Gofirst MACRO
XOR CX,CX
XOR DX,DX
MOV ax,4200h
INT 21H; file pointer to top of file
Endm
Alterline MACRO
MOV DL,0DH
MOV ah,02h
INT 21H; carriage return
MOV dl,0ah
MOV ah,02h
INT 21H; line Wrap
Endm
Copyhandle MACRO
PUSH BX
MOV ah
software .
It combines an executable module, a module that runs from a compressed file to extract files. Such a compressed file does not require an external program to extract the contents of the self-extracting file, and it can run the operation itself. However, WinRAR can still treat the self-extracting file as any
Instead of storing important files on a USB flash drive, you should develop a good habit of storing important information on your hard disk, and use the USB stick as a temporary tool for file Exchange.
First, abnormal situation introduction
1. In-house editorial office a user due to work needs, often need to use a U disk and counterpart printing units to exchange documents. Because the other machine has an "EX
What file is Rundll32.exe?
Rundll32.exe is used to run DLL files in memory and they are used in applications. This program is very important for the normal operation of your system. Note: Rundl132.exe and rundll32.exe are similar. But Rundl132.
First, we still need to use anti-virus software to kill the U disk Antivirus, remove the computer in those suffixes for exe execution virus.
Second, use Notepad to create a new text, and then enter
Windows Registry Editor Version 5.00[hkey_local_machinesoftwaremicrosoftwindowscurrentversionexploreradvanced
Folderhiddenshowall] "CheckedValue" =dword:00000001
S
Php checks whether the exe file is normal
Include "ExeInfo. php ";$ Pe = new PE_VIEWER ('cmd.exe ');$ Pe-> out ();?>
Normally, the virus is shelled. The node names of programs after shelling are no longer common. text,. data,. rdata,. rsrc, etc., but the node names that contain characters such as UPX and Aspack;2. Generally, the entry point of a program is 1000
PHP to determine whether the exe file is normal
Include "exeinfo.php";$pe = new Pe_viewer (' cmd.exe ');$pe->out ();?>
, usually the virus will shell, after the shell of the program its section name is no longer common. Text,. Data,. Rdata, rsrc, etc., but contains UPX, aspack and other characters of the section name;2, usually the entry point of the program in
Solution to package node-webkit into an exe file by 360 false positive Trojan, and node-webkit false positive
Node-webkit is required for recent projects. It handles the compatibility of ancient users and the 'data security' issues in their minds.
1. Download node-webkit
2. Create an appName. nw file.
3. copy/B nw.exe + appName. nw TestAppName.exe
At present
Most of the information available on the Web today is this:
The popular first form:
The popular second format:
The first format looks like it's going to execute a trojan file or something, and here we don't study it, although some people who study trojans or viruses have also prompted the development of the Internet, but in a certain period of time, they also often bring disaster to the Internet, so I personally still
This article describes how to package node-webkit into an exe file and how to solve the 360 false positive Trojan. For more information, see node-webkit for the latest project. It handles the compatibility of ancient users and the 'data security' issues in their minds.
1. Download node-webkit
2. Create an appName. nw file.
3. copy/B nw.exe + appName. nw Test
Computer appears in the title of the problem, click on the properties of My Computer pop-up a dialog box said "Can't find C:windowssystem32rundll32.exe", and later want to open some installed software program but pop-up a will you choose to open the way of the dialog box, Later discovered that the anti-virus software also disappeared, even more surprised me is incredibly cannot install the
Recent projects require the use of node-webkit. Deal with the compatibility of old-level users and their "data security" issues.
1, Download complete Node-webkit
2, the production of APPNAME.NW documents
3, copy/b NW.EXE+APPNAME.NW TestAppName.exe
So far, TestAppName.exe files have been generated in the directory, and double-clicking is perfect.
But, directly will TestAppName.exe change a directory, but can not open.
Google + Baidu's solution: Use the Enigma Virtual box tool, packaged into
Because the running program is protected by Windows, even if the virus is detected, it is often killed and cannot be deleted. What if anti-virus software kills the virus? In the past, it was generally recommended to kill in security mode or DOS mode. There is now a new method called "specify the debugger in the Image File
Today, I visited a company website and suddenly found that the webpage was incorrect. Right-click to view HTMLCodeIFRAME is a website JS file. Needless to say, it must have been infected.
Go to the server and read the file.Source codeThe IFRAME Code does not exist, but the IFRAME code is automatically added to all websites on the server.
My first response was that the IIS ing was modified. I checked it.
Nothing was modified in it.
Suddenly
svchost.exe), right-click-> to end the process tree.
Second, show the hidden system files
Start-> Run-regedit-input
Hkey_local_machine\software\microsoft\windows\currentversion\explorer\
Advanced\folder\hidden\showall
Delete the CheckedValue key value, right-click the new->dword value-> named CheckedValue, and then modify its key value of 1 so that you can select Show all hidden files and show system files.
Third, remove the virus
Click the right mou
Author: Zhuang Xiaoli (liigo), 2010/7/12
This article first address: aspx "> http://blog.csdn.net/liigo/archive/2010/07/12/5727859.aspx
Reprinted please indicate the source: http://blog.csdn.net/liigo
Purpose of this article: in a specified LIB or OBJ file, search for a piece of executable code (X86 Instruction Set) and determine the function to which it belongs.
Reason: assume that the software we write is falsely reported as a
Author: Zhuang Xiaoli (liigo), 2010/7/12
This article first address: http://blog.csdn.net/liigo/archive/2010/07/12/5727859.aspx
Reprinted please indicate the source: http://blog.csdn.net/liigo
Purpose of this article: in a specified lib or OBJ file, search for a piece of executable code (x86 Instruction Set) and determine the function to which it belongs.
Reason: assume that the software we write is falsely reported as a
The Thunderbolt "after downloading completes the anti-virus" function, to most Reyou is an unusual function. In fact, we can small use of it, let Thunderbolt has the same as the Express "automatic file classification function."
Here I want to use the artifact of the "Batch processing":
1. We want to create a new text document, and then enter the following content, and save as "automatic
McAfee identifies the suspect virus file, but the virus definition is not available in the library, and the file name extension is named Vir or VXE, which establishes the batch file and uses the restored EXE
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.