Computers are connected to the network every day. Nowadays, there are countless Trojan viruses on the network, and viruses will inevitably happen one day. So what should we do after the virus? The correct solution can avoid greater losses and minimize the damage caused by viruses. Let's take a look.
I. MediumVirusSymptom
When your computer is infected with viruses, the
I rarely think about linux viruses because of a few users-general Linux technology-Linux technology and application information. The following is a detailed description. Many people think that linux virus is rarely used. I don't want to talk about it.
I think you can consider this question: hackers will intrude into
that the virus is a MS Word macro virus, copy the "normal. dot" file in the C: Program FilesMicrosoft OfficeTemplates directory and all the files in the C: Program FilesMicrosoft OfficeOfficeStartup directory to the floppy disk.
If you suspect that the virus is a Microsoft Excel macro virus, copy all files in the XLST
, Internet and BBS have been widely used, making it possible for domestic and foreign viruses to spread widely and quickly. These international computer information dissemination media are potential sources of virus viruses and tubes (of course, these network systems also have a highly secure anti-virus/Anti-Virus Syst
In our network life, computer viruses pose a major threat to us. We are very concerned about how to prevent viruses. In fact, the prevention of computer viruses is not simply a few words. Some of us have very many mistakes in our understanding, next, let's take a look at the top 15 mistakes we made in the face of computer viruses.
The DIR operation on the infecte
Definition of computer virus
Computer virus is a destructive and infectious ability of the program, and other normal procedures, when a computer virus from a certain way into the person, it will automatically enter the relevant p
Many netizens like the late big game, for example: Through the FireWire, the Hero Alliance and so on, however, some of these games have more stringent requirements on the computer configuration, then, how to look at the computer configuration? How do you think your computer can play some games? Let's take a look at tod
In the network life, the computer virus has brought the big threat to us, how to prevent the virus is we very concerned about a topic. In fact, the prevention of computer viruses is not a simple word, in the understanding of some of us there is a big mistake, the following we take a look at the
Programmer's Guide". Yes, "The book is like a pink T-shirt." "It tells me I need to know how to write a silent but annoying virus like AIDS.But I have an extra challenge. I think this program is very small, only 666 bytes. My C compiler, at that time Borland Turbo C, although it allows you to write programs of various storage models, even the smallest executable file, has some overhead because of the start
1 computer virus Overview
Computer Virus (CV. It is a special program, and the problems caused by viruses are software faults. This program can infect itself to other programs and disrupt the normal operation of the computer system. If the system cannot be properly guided, t
Computer viruses generally have the following features:1. computer Virus procedural (executable) computer viruses, like other legal programs, are executable programs, but they are not a complete program, but parasitic on other executable programs, therefore, it enjoys the power available to all programs. When a
viruses exist, because most of the virus is still wiped out, so I think now can be networked avira, more comprehensive, but still safe mode, this is a Safe mode with networking features, and then again virus Avira. During this period in order to more thoroughly kill the virus, in addition to using antivirus software,
With the development of the network, the dissemination of information more and more quickly, but also to the spread of the virus to facilitate, the popularity of the internet makes the virus in the overnight spread around the world possible. Now, almost every computer user has been infected with the virus experience. E
statistics, there are already thousands of known security vulnerabilities in Windows NT series operating systems. And with the introduction of the new operating system, new vulnerabilities will be found more.
Security recommendations: For our ordinary users, we should first be to fill the loophole, operating system loopholes like an illegal channel, through this channel virus can enter the user's computer
account information.
In fact, QQ computer Butler in the boot when the system will be effective protection of the loopholes, if detected in the system, will automatically pop up the window, prompting users to repair as soon as possible to prevent malicious virus trojan intrusion. But a lot of users do not think this loophole, or too troublesome, simply ignore th
you.
I. Fault symptom
I was woken up by my cell phone in less than 8 o'clock. I'm still a little annoyed when I was dreaming about it. Since someone called so early, there must be something urgent! After receiving the call, I realized that the dedicated computer of the mobile phone store in Changping had gone on strike. The specific performance was that after the computer was started, the speed was extreme
account for surfing the Internet.
Now you have created an account for the Users Group. I don't know how to create it? Do you use XP or Vista? In the control panel, go to the user account. The "Restricted Users" in XP is enough. Log out of the system now and try again
After completing these three steps, you can find the viruses above and try again to reach your liking. Check if your computer is infected? Infected? The account will be logged out at one
in use, but the anti-virus software does not reflect it. At this time, it is the most difficult, because the user does not know the method to destroy the virus and the countermeasures. At this time, most users will think that their PC has something wrong and constantly "test" to solve it. In fact, this is very wrong!
Solution
Unless you have to, you should immed
, resulting in system crash and data loss in severe cases. The phenotype of virus programs reflects the true intention of virus designers.Features: infection, concealment, destruction, DerivationComputer Virus vigilanceBecause computer viruses are a file (Program) that can be executed by a
1. Do not reboot
Generally speaking, when abnormal process is found, unknown program is running, or the computer runs noticeably slower, even ie often asks whether to run some ActiveX controls, debug scripts, etc. Then this means that it may have been poisoned at this time.
And a lot of people feel poisoned, think the first thing to do is to restart the co
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.