In the event of a system failure or virus infection, we are most concerned with the "three major pieces" - self-starting programs, current active processes and services. The built-in tools of the system do not manage them particularly well, and several programs have to be executed, which is not convenient to operate. Starter (download) combines "three big pieces" into one interface, and powerful features make it easier for you to identify problems in the event of a system failure.
Beyond MSConfig's Self-Boot Management
Trojans and viruses often use self-starting to compromise computers, so when you suspect that you are infected with a virus, you usually have to find all the self-starting locations of the system one by one. However, there are many places in the system's self-starting position. Manual search is not convenient, but MSConfig can only be disabled and cannot be deleted. For example, the "Super Password Killer (I-Worm/Supkp.z)" has added a self-starting key value in 9 locations such as [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionRun] and [HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionunServices]. After starting the Starter, click "Start Project". In the list on the left, you can clearly see all the self-starting projects of the virus, and the different startup items are arranged according to the user and the starting position. Now hold down the Ctrl key to select the 9 self-starting key values in turn, then right-click and select "Delete" to clean these self-starting key values at once. In addition, right-click any self-starting program to select "File Properties", you can see the details of the startup process, including the path, version, etc., to make it easier to determine whether the file is safe. At the same time, select "Browse Branch Key" to quickly open the "Registry Editor" and locate the corresponding key value, unlike MSConfig just look at it.
One-click termination of all suspicious processes
Trojans are now more and more embarrassing, they often monitor each other through multiple processes, such as "Falling Star" Trojans use "internet.exe" and " Systemtray.exe" dual process protection mode. After the system's own "task manager" terminates one of the processes, another monitoring process will immediately regenerate it. Starter can end multiple malicious processes in batches. Now click the "current process" tab of the program window, and also use the Ctrl key to select the above two processes, and then terminate all malicious processes by "terminate" in the right-click menu.
Service management in one step
There are also many malicious programs disguised as system services. For example, gray pigeons will add the "Gray_Pigeon_Server" service in the registry [HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServices]. Registry service key values and system searches to complete virus killing. Now just click the "Services" tab in the Starter window, right-click "Gray_Pigeon_Server" in the service list and select "Browse File Directory". You can directly open the directory where the executable file is located to quickly find the Trojan file, and select "Browse Service Registration Key". You can quickly locate the service key-value repair system by directly locating the service registry key. In addition, you can also select "Search on the Internet" to enable the search engine to search the description of the service on the Internet. For common viruses, you can find a solution by searching.
Some WinXP users want to connect their PC to PPP (PPPoE) client, but they dont know the specific ope
WinXP system due to its many advantages, even if Microsoft has stopped serving, there are still many
The Microsoft .NET Framework is a running support environment software developed by Microsoft. 4.5 i
Windows brings us convenience at the same time, also let us have to endure the pain of the system fr
After the computer overclocking, the network card has a solution
Speed up Win XP search style becomes 2000
Mobile phone texting has been out. Try sending it with your computer
Detailed Windows XP system virtual memory optimization skills
A:GHOSTERR.TXT error occurred during GHOST operation?
How to get rid of stealth killers - computer radiation
WinRAR compressed file we should know a few points
Win XP Group Policy forbids gpedit.msc deadlock solution
Teach you how to prevent the top ten threats to network security (2)
Microsoft released Windows HPC Server 2008
Close the graphic tutorial of win8 startup item
Windows 8 touch virtual keyboard birth history
eMule eDonkey's resume and skills
How to change the power plan setting in Windows 8
What should I do if the Win7 system wireless mouse receiver is lost or damaged?
How to import WeChat emoticons to import WeChat emoticons to import WeChat emoticons method
Windows Vista ARP Entry Denial of Service Vulnerability
How to solve the ppt picture is too small? Ppt picture is too small solution
DNF exorcism brush map skills plus points DNF exorcism civilian skills plus point