Today, Xiaobian will share with you how to deal with Windows desktop system malware. Maybe different people have different solutions, but Xiaobian is saying that today is the emergency response. If you are in a very urgent situation, you can use it. If it is very bullish, then let's share it.
Desktop system malware emergency response seven tips:
Carry a smartphone that supports network functions
Invest in data projects. Be able to master the mobile browser and master most of its functions. Save the bookmark information. Most mobile phones can support flash cards that store additional emergency software.
2, carry a large capacity (USB interface 16GB capacity) memory stick
Carry at least one large-capacity USB storage device, save the most frequently used security tools, better The approach is to build a fully bootable operating system with security tools using a small Linux distribution such as Slax.
3, for disaster recovery exercises
Even in this attack, you are fortunate enough to avoid the consequences of data loss, understand the measures you can take when disaster recovery, still very necessary. And they need to be updated frequently.
4, frequently update bookmarks
On the network security website often contains some thought-provoking experience, they are very valuable for emergency processing. Therefore, you should always update your bookmarks on your phone.
5, timely summary after the event and recorded in the written documents
In the military field, it is called "after the summary" or AAR. After cleaning up the malware and eliminating the damage, you should use tools to analyze and summarize the incidents and create easy-to-access written documents. Record the detailed process of the entire incident. To ensure that the CEO will not encounter the same problems before giving evidence to the Congressional Subcommittee.
6, a broader inspection of the attack
Determining whether malware is a normal attack on your bad luck notebook, or just a sniper: you can use the usual remedies Dealing with it requires more attention than making the initial attack a success.
7. Fully understand the risks of existence
Follow the Hippocratic Oath of the emergency treatment industry: Do not increase damage. In other words, don't let the situation get worse. Analyze and evaluate malware to determine whether it needs to be deleted immediately, or to shut down the machine and process it in a controlled environment. Take into account the risks faced by the data and the actual needs of the equipment, and find the best treatment.
When connecting to a local area network and accessing some websites, one of them belongs to the weblog aggregation service. It selects a large number of commentaries in the active log and clicks on the comments to view them. Just a short time after I stopped to respond to the knock, a malware has started to control your Windows laptop. At this time, you can choose any of the above methods.
When the computer is used for a long time, there will be some problems, such as: Wh
Recently, many game users have reflected that just installed WinXP system can not start in the game
Graphical introduction to how to install a key GHOST and common settings. First, the installation:
With the rapid development of computer hardware, the number of peripheral devices is increasing, key
Custom printer paper problem in Windows XP
See the three recipes for the configuration of your computer hardware
WinXP system MAC address modification method
Experts help you to resolve common crashes in Windows systems.
How to change the name of WinXP recycle bin
Explain the powerful chat features of Excel
Teach you how to register fso under windows
Those Windows systems run commands large inventory
How does WinXP use the shortcut keys to display the desktop?
How to use and manage swap space in Linux
What is the difference between a 32-bit win7 system and a 64-bit win7 system?
How to import IE favorites into Edge browser in Win10 system
Tips for locating windows8 favorites
Three system library function skills Windows7 find documents faster (1)
Win10 system recording screen recording shortcut "Win+G" tutorial
Easy to get Win8 network problems
How do win7 and xp systems prevent IE browsers from popping up ad windows?
For the old machine to create a faster Win XP
How to remove the Windows 8 system icon small yellow lock restrictions