Although anti-virus software is already powerful enough, it still seems to be unable to withstand the intrusion of viruses and Trojans, especially the registry, where hackers or viruses can enter the system to damage our property, so be alert to the registry. Viruses and Trojans, but how to check and kill?
How is a good anti-virus software and security software made?
According to the behavior of rogue software and virus Trojans Analysis, to prevent possible exploitation of vulnerabilities or hidden places.
How is a malware Trojan that is "toxic" developed?
It was developed based on the negligence or availability of Windows systems or security software. For the veteran of the computer, everyone is recommended to use Windows7, Vista instead of continuing to use XP, why Microsoft has repeatedly recommended users to upgrade to the latest browser, because Microsoft gradually fills in and prevents these negligence in the new version of the software.
The following soft media editor and everyone is talking about the anti-virus software security software and malware are fighting each other, in the Windows registry, there are 7 dens of malware to love, more than The three caves of Rex Rabbit ——
The popularity of computers today can be said to be universal in the whole society, but the computer virus problem that has followed has become a social problem, despite antivirus The software is updated every day, and the virus grandfathers who scan against anti-virus software and detection tools are constantly updated, and some of them even turn off anti-virus software and detection tools. I have encountered a firewall being shut down and a WOW account stolen. Despite the popularity of computers, the vast majority of users know very little about software reading and writing, and it is difficult to tell where they are hiding. In this case, anti-virus software and security tools cannot run. At this time, if you want to delete the virus, you must know where it is hidden and what is the virus. Here is a list of detection locations for some common anti-killing viruses.
1. The famous AV Terminator variant program starts the dual process and shuts down the anti-virus program at boot time. In general, if the firewall is shut down, it may be that it is coming. Check if HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Run has its trace. This is a regular startup item, and many programs will be written here.
2, if the anti-virus software is difficult to clean up, or the anti-virus program is closed, it may be linked. At this time, HKLM\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\ShellExecuteHooks should be detected. A large amount of malware and viruses will be written here. Because very few normal programs are written here, the chances of viruses are very high.
3, sometimes, the security mode is also loaded, the anti-virus program is closed. This may be a new variant of the robot dog or a variant of the disk drive. Focus on HKLM\\SOFTWARE\\Microsoft\\WindowsNT\\CurrentVersion\\Windows\\Appinit_Dlls. Few normal programs write to this location, and the chances of viruses are extremely high.
4, gray pigeon is a very famous virus, and now think about its variants, and difficult to find and clean up, you can close the anti-virus program. Because the virus is written to the underlying service and the rootkits driver, it is difficult to clean up. Users can focus on checking HKLM\\System\\CurrentControlSet\\Services.
1, first right click on the computer icon under the win7 64-bit
Many users like to use visual effects, especially like to personalize the computer. The transformati
In the Windows7 system we use, we often encounter driver problems. This can be solved by loading the
MSDN and TechNet subscribers and volume licensing customers have access to Windows 7 and Windows Ser
Notebook Win7 system fast switching power mode skills
Using Windows 7 Group Policy to "slim down" the system
Solve the problem that the U disk is always full under the Win7 system.
2 methods are often detected - to ensure the stability of Windows 7 file system
The characteristics of the three system user accounts in the win7 Ultimate system
How to delete Win7 Explorer history
How to enter win7 security mode
How to turn off (disable) guest guest account protection system security under win7 system
What should I do if the win7 Ultimate PC has a preview delay?
How to find the wrong file in Win7
How to restore the display desktop button in the Win7 taskbar
Vista startup prompt Bootmgr is the perfect solution for the compressed
Steps for setting up Bluetooth pairing under Windows 8
Windows 8 official download Windows 8 development experience version download
How to restore the factory settings of Win10 system to solve serious system error problems
How to unsubscribe from calendars under Windows 10
How to solve the Win8 boot CPU usage high hard drive light flashing fault?
How does the Win7 system set up a workgroup? Method of creating a computer workgroup