A lot of friends especially like to watch spy war films. The undercovers of both sides of the enemy and the enemy are fighting for intelligence in each other's camps. These undercovers are generally hidden. Similarly, there are a lot of "undercover" in our system, but these "undercover" sources are not the same, they are caused by our misuse, and some are software generated, There may be a back door for hackers. No matter what the situation is, "undercover" has brought great hidden dangers to our system, then we need to use tricks to find out these hidden under the system "undercover"!!
Outsole software tips in the system:
1. Clean up the machine as much as possible before using a commercial or free software tool. Run an anti-virus or anti-spyware scan and immediately remove some unusual items. There is a lot of content on this topic on the web. It should be noted that before entering the next step, Xinle Network strongly recommends using and running more than one anti-virus and anti-spyware scan in order to achieve thorough cleaning.
2. Create a checkpoint or make a backup of the system. If you're using Windows XP, it's so convenient, so you can quickly create a system recovery point (click Open: Start Menu -> Help and Support -> Use System Restore to restore changes to the system, then click Create a button to restore points). Of course, there are other ways (the only way for those who use other Windows operating systems) is to create a complete system backup, including system status information (if other methods are not feasible, you can use NTBackup.exe File; he contains information for all new versions of Windows). In this case, if something goes wrong in the next step, you can restore the system to the previous correct state.
3. Close all unnecessary applications. Some anti-spyware software looks for signs of abnormality from all threads and the registry running on the computer, so it can save a lot of time by exiting all applications and then launching the anti-spyware run check.
4. Run the anti-spyware program. In this step, use Hijack This software. Extract the downloaded Zip file to the directory you want, then double-click the HijackThis.exe executable file, and a window with the prompt “Do a system scan and save a logfile.” will pop up. By default, the log file will be saved in “My Documents", it is useful to include date and time information in the saved log file name, so that a file named hijackthis.log is renamed hijackthis-yymmdd :hh.mm.log (hh.mm is a few points of the 24-hour system). In this case, run Hijack This again at any time in the future (once you start running, it will automatically clear the previous log), you don't have to worry about losing the previous log. Therefore, time stamping is a good method, which is very useful for future log file analysis.
5. View the scan results displayed in the Hijack This results window. This result is the same as the information written to the log file, and you will find a checkbox to the left of each item. If you have selected certain items, press the “Fix Checked“ button and Hijack This will completely remove them. You'll find a lot of files that look secret, and you can quickly scan them to decide what to do at this point. In fact, the real problem is to identify which files have potential threats, which ones are necessary, and which ones are irrelevant. At this point, the analysis tool can help us a lot. Remember, don't close Hijack This's search results window now, and you don't need to check it, because it will be returned in the next steps.
How can I solve the problem that Sina mailbox cant be opened? I believe that many users have encount
I believe that many users have encountered u disk can not be deleted or can not be popped up, and pr
With the practicality and convenience of the U disk, the U disk occupies a certain weight in the use
I believe many users cant tell the difference between a flash drive and a USB flash drive. In fact,
Reloading the operating system must see 20 contents
Right-click menu troubles four ways to solve
Start notepad++ with DOS command and open a file
Command to view computer information under Windows
Loading the operating system into the removable hard disk
Teach everyone to know the hosts file of Unix system
How to solve the page script error when the computer is turned on?
What is a CC attack? How to solve this problem under Linux
How to remove the hidden danger hidden in the computer
Potential hazards in Windows XP installations
Win10 prompts "Server startup failed, port 80 is occupied" What to do
How to turn off the keyboard prompt tone under Win8 system
Win10 shortcuts can't switch windows properly.
Win10 installations have broken through 67 million, Microsoft stunned
Windwos7 comes with a "handwritten" formula introduction
How to block an IP or IP segment from accessing your site via IIS settings
Lenovo Win7 notebook disables boot sound steps through BIOS
Win10 system uninstalls the app store's own application method
Fast connection and shutdown of Windows 8 system wireless network