computer shop news
First: right click on IE browser, open the property check internet option settings “ home page & rdquo; items are modified, if Yes, please change to a blank page and empty the IE temporary folder. Second: upgrade "Rising anti-virus software" to the latest version, check whether there is a virus running in the memory (only check the memory can be killed). Third: Enter the msconfig command in the “Run” menu in the Start menu to bring up the “System Configuration Utility” and check the “Startup” item (2000 system can copy MSCONFIG.EXE from XP system, also Can be viewed using third-party software, such as Windows Optimizer). Record the file name and path of each unknown startup item, and cancel these self-starting items. Fourth: CTRL+ALT+DEL Open the task manager and check if there is a program with the same name in the startup item in the process & rdquo; and try to end the process! (Note that the name is likely to have the same name as some system programs, ie the malicious attacker pretends to be running as a system process. There may be two processes with the same name, which is probably the murderer you are looking for.) Attachment: Known camouflage process English file name taskmgr.exe Chinese name <; task manager” Phenomenon: two processes with the same name running at the same time, basically can not be distinguished. But ending the correct process will close the task manager, and ending the fake process will temporarily solve the IE automatic connection problem! Fifth: According to the file path found in the startup item, find the file of the process you just finished. Open my computer, open the “Tools & mdash;— folder option —— in the menu at the top of the window, click to select all files and folders, and cancel “ hide protected operating system. The checkmark in front of the file & rdquo; to fully check all files. (Note that the known malicious programs are deep hidden, 98 system needs to open the display hidden file function, 2000, XP system must also unhide the protected operating system file function) Sixth: After finding the target file, please right click File view properties. Pay attention to its creation time and modification time. Most of the virus files will be the same or the difference between the two times. This time is the time of your recruitment. Also, please set the view to the details. Check if there are files created at the same time under this folder. The virus may be disguised as a video or other file, don't be confused by it, and don't click to run it. Immediately compress them to other names, so that the threat can be removed, and the system files can be prevented from being deleted accidentally. (If you are prompted that the program is running, you can restart the machine and press F8 continuously to enter safe mode, then compress.) Of course, if you can confirm that it is a virus, it is best to delete it directly~ Seven: Use the menu in the Start menu. Search & rdquo; function on the hard disk to completely find the files you found, to see if there is a copy of the file and delete it in other locations. (The malicious program I encountered was disguised as a task manager and disguised as a notepad.exe Notepad program, and all the Notepad files will be opened through it, which means that you open a Notepad file at the same time malicious The program will run again.) In addition, please manually check whether the virus file with the same name exists in the windows folder, and the system and system32 folders under windows should also be carefully checked. I found that the recent virus has added its own copy to the above three. In the folder, if it is clear and unclean, it is likely to resurrect! Eighth: Restart your computer, connect to the Internet to open IE, and see if it has returned to normal. If not, please analyze it in more detail by following the above method to see if there are any omissions. Ninth: Problem Solving Don't be too happy. This malicious program-directed website is likely to carry a virus or Trojan. Please upgrade the anti-virus software to the latest version and enter the safe mode to completely kill it again to ensure security!
Computer Store News: The popular app Fenice twitter client has been pushing updates in the Win 10
Computer store news: According to foreign media reports, The Channel broke the news that Microsoft a
Computer Store News: After the first day of the Build2015 Developer Conferences keynote speech, Micr
Computer shop news: Before using VPN in Windows 10, always prompted Debugger has terminated the thre
Windows 8 boot takes only 6 seconds
Win8.1 new screenshot exposure
Microsoft's new patch: Improve Win7/Win8 automatic update client
Microsoft Win10 will push a new browser
Up to 10 reasons to upgrade Win10 Windows Store
Microsoft: Windows 10 Redstone fully supports stylus
Win10 version of QQ and WeChat have stopped developing?
Microsoft is forced to simplify the way users refuse to upgrade Windows 10
Recalling the past, those years of Windows1.0
Windows 8 Pro PC upgrade costs only $15
Win8 these pothole functions Win10 are all cut off!
Microsoft CEO is also anxious to witness Win8.1 Update next week
Proactive prevention comprehensive protection Windows XP SP2 improved complete Raiders (on)
How to Configure XP SP2 Firewall
Win10 how to set the best effect
Win7 system Zhongtong computer crash how to solve
What cleanup work needs to be done after Win7 installation?
Daren Hall: teach you to easily restore Linux password
Detecting LCD monitors in WinXP systems
How about pressing PrtScn button under Win10? PrtScn button game introduction