When the network brings great convenience to our work and study, viruses, Trojans, backdoors and hacking programs also seriously affect the security of information. A common feature of these programs that infect computers is to write information in the registry for purposes such as autorun, destruction, and propagation. The following is the author collected online, by modifying the registry to deal with viruses, Trojans, backdoors and hacking programs to ensure the security of personal computers.
1. Clean up the information left after accessing "Network Neighborhood"
Under HEKY_CURRENT_USER\\Network\\Recent, delete the following primary key.
2. Cancel automatic dialing when logging in
Modify "ldquo;autologon" in the right window under HKEY_LOCAL_MACHINE\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Network\\RealModeNet as "1 00 00 00 00”.
3. Select user when canceling login
All users have been deleted, but you have to select the user when you log in. We want to cancel the login and select the user, under HKEY_LOCAL_MACHINENetworkLogon, on the right In the window, modify the "UserProfiles" value to "0".
4. Hide the name of the user login on the computer
In HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Winlogon, create a new string "DontDisplayLastUserName" in the right window, set the value "1".
5. Prevent the destruction of the Acid Battery v1.0 Trojan
If HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices is found in the right window, the "Explorer" key is found. , the description of the YAI Trojan, remove it.
6. Prevent YAI Trojan damage
Under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices, if you find the "Batterieanzeige" key in the right window, then the description The YAI Trojan, remove it.
7. Prevent Eclipse 2000 Trojan damage
Under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices, if you find the “bybt” key in the right window, you will It is removed.
Then delete the right key value cksys” under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices and restart the computer.
8. Preventing the destruction of BO2000
If HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices is found in the right window, if the value of "umgr32.exe" is found, In the BO2000, delete it.
9. Prevent the destruction of love insects
Under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run, if you find the "MSKernel32" key in the right window, it will be delete.
10. It is forbidden to appear in the IE menu in the "Tools" column, "interner option",
renamed inetcpl.cpl under c:\\windows\\system to inetcpl. If the name is forbidden after the old or other name, the name can be changed back and it can be used again.
11. Preventing the destruction of BackDoor
If you find the “Notepad” key in the right window under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run, delete it. .
12. Preventing the destruction of WinNuke
In HKEY_LOCAL_MACHINE\\System\\CurrentControlSet\\Services\\VxDMSTCP, create or modify the string "BSDUrgent" in the window on the right, set its value to 0.
13. Prevent the destruction of KeyboardGhost
If you find the key value of KG.EXE under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\RunServices, delete it and find KG. Exe file and kg.dat file, delete them all.
14.Find NetSpy hacking program
Under HKEY_LOCAL_MACHINE\\Software\\Microsoft\\Windows\\CurrentVersion\\Run, look for the key "NetSpy" in the right window, if it exists, it means already Install the NetSpy hacking program and remove it.
Author: Zhang foreign media reports, rights management software company Avecto recently rel
I believe everyone is familiar with QQ, because we often use qq to chat with friends, sometimes we a
Recently, many users have reflected that the computer has a black screen and it prompts the Invalid
After the computer is turned on, the error code of error loading operating system appears. At this t
Prevent Windows blue screen attacks through firewalls
The computer can't fix the solution of this computer
A practical solution to completely prevent virus invasion
How to prevent hackers from attacking the system again through the Web
Parsing suspicious files that are easily treated as "viruses"
Teach you to understand the meaning of the registry key
List the ten major considerations of Vista firewall
After installing the system, the boot failure will not be able to enter the system.
Windows2003 system quick login has a high trick
Simple steps to easily get the projector connected
Win7 program is not responding, prawn is quick to help you solve
How to clear Windows 8.1 system wireless link record
How does win7 Ultimate PC set password for guest users
How to solve the problem of noise and popping in the official version of Windows10 audio headset
How to lock the specified folder to the taskbar under Win10 system
There is no option in the right-click menu of Win8.1 partition. How to solve
Windows 2008 R2 remote desktop authorization configuration graphic tutorial
Win8 tutorial: Repair Win7/Win8 dual system boot boot menu
360 how to upgrade win10? 360 one-click free upgrade win10 tutorial
Multiple choices! Win8.1 network connection problems, you can choose