Now the computer security we use is usually dependent on anti-virus software, but anti-virus software is not omnipotent, some viruses can not be identified, we can use the naked eye to take out suspicious files to check, but some documents are often misunderstanding.
With the popularity of computers and the development of information technology, the term "computer virus" is no longer unfamiliar to everyone. Nowadays, computer viruses can be described as endless, even for the majority of computer users. Almost to the extent of "talking to toxic discoloration". There are many users who don't know much about the files under the operating system, so that they have all kinds of suspicions. The following are files that users often suspect are viruses:
First, Thumb.db file
There are three reasons why the Thumb.db file is mistaken by users as a virus:
1. The file exists in the folder with images in some operating systems;
2. Even if this file is deleted, it will be generated the next time the folder is opened;
3. The file may grow.
In fact, the Thumb.db file will be available in Windows Me or newer versions of Windows. This is Windows's cache of images (also known as buffer files), which makes it easy for users to preview images. The more this file is, the bigger it is, which is normal. In the windows xp system, you can select "#################################################################
Second, Mfm1992 file or "Mfm1992.AVB.AVB.AVB.AVB (suffix is infinite AVB)"
Mfm1992 file users mistakenly believe that the main reason for the virus should be: Files may be generated in any folder and may be regenerated after deletion.
The Mfm1992 file is a file generated by the error of the intelligent ABC lexicon. Since the vocabulary of the intelligent ABC input method has a limited capacity, this file will be generated when this capacity is exceeded. In which directory the current program runs, this file is generated in this directory. This file is typically 43KB in size. This is a bug in Smart ABC 4.0. The smart ABC 5.0 that comes with Win2000 and me has fixed this bug.
If you want to make this file no longer appear on your computer, there are two ways:
1. You can upgrade the smart ABC of 4.0 to a higher version.
2, you can delete the *.rem file in the Windows system directory, and then restart the computer.
Third, the temporary file of Word
When opening a Word document, the user will find that the same name appears in the same directory but the previous one is added with a "~( Has hidden attributes). Many users find it suspicious and think it is caused by a virus.
In fact, this is a normal phenomenon. This file is generated by Word. It can be understood as a buffer file. Its function is to save the user's right due to unexpected reasons (such as sudden crash, etc.). The modified or created Word document is lost when not saved. In fact, this file will automatically disappear after closing the Word document, users do not have to worry about deep system download.
Fourth, jdbgmgr.exe file
Unlike the above files, the file is not a temporary file or a temporary file, it is a normal system file. The user could not notice it because it exists in the system directory. But the reason many users think of it as a virus is because a deceptive email is distributed around the Internet. The e-mail, which was disguised as a virus control report, warned users who received the e-mail that the file was a virus that could damage the entire computer system two weeks after the PC was infected. This lie was distributed by many PC users who believed they had been infected, hoping to help other victims clear the virus.
The most important thing about the security of your own computer is still relying on yourself. You can't rely solely on anti-virus software. Do you have any clear questions about the suspicious files that you teach to everyone today? You can go back and check your computer, and some Do not mistake the file for a virus.
How do I open a new folder with the same folder popping up? I believe everyone has encountered this
We are using a computer to display a variety of error or failure message reminders. Then the compute
Recently, many users are unable to open the computer device manager, so what is going on? How can we
u disk is an indispensable tool in our daily life, but in the process of using u disk, some problems
How to set up your own computer disk without being accessed by others
How to find the computer ip address
Analysis of the reasons for the blue screen after the computer reinstalls the system
Practical way to open system files safely
Easily enter safe mode under dual system
A few tricks let you say goodbye to the speed of the turtle system running Win7 system
Computer boot prompt bootmgr is missing how to solve?
The reason why ntldr is missing when the computer is turned on is
Hide your own computer from being discovered
9 major methods to quickly solve the problem of computer black screen
How to optimize the WinXP system strategy
What should I do if the headphone jack on the front of the computer case cannot be used?
Windows XP power-on password is set to
Two-line server technology and its principles
High imitation WinXP system Q4OS Originally based on Linux development
Bring "mail merge" with Yongzhong Office