1, empty the Internet Explorer (IE) temporary files
Anti-virus software reports a virus if you like this path: c: \ Documents and Settings \ Administrator \ Local Settings \ Temporary Internet Files \, which usually means the virus was downloaded through the web browser, when your browser if not install a patch, then you are likely to be poisoned. For such viruses, the simplest way is to clear the IE removal of temporary files.
2, display the file extension
Show View all the files and folders (including protected operating system files), a lot of Trojan viruses using double extensions, hidden attribute camouflage, by looking at this can be no hiding place for the virus.
3, turn off "System Restore"
System Restore is to repair the system, the most convenient and efficient a tool, if you have to create a System Restore Point, the discovery of the system errors or poisoning, back to the earlier restore points are created, they can repair the system.
If you find a similar virus found in c: \ System Volume Information \ directory, note previously created restore points where the backup with a virus, clear way is to turn off or disable System Restore, then restore points will be deleted, the virus also does not exist. Wait a few minutes later, you can re-open System Restore, and then create a drug-free restore points.
4 to end the virus processes
Open the Task Manager to identify abnormal process. End of the process is a method of hand-virus.
5, modify the service "Startup Type" stop / start service
Sometimes, the virus is loaded service mode, you can use this method to close the off-virus program.
6, set the security account password
A simple password is very dangerous, hacking tools can easily be cracked, and then, a hacker can give your computer from a remote implant a Trojan horse. Even if there is anti-virus software is also loudly at things from a remote hacker can easily turn off your antivirus software. For a just a simple password, but also access to the Internet system for example, the risk is too great.
7, open the "Automatic Updates" use Windows Update
Use automatic updates, is a timely fix vulnerabilities in a good way, you can also use the clean-up experts to manually complete the Jinshan patch download and installation. For one did not pass genuine validation of computer systems, cleaning experts, provides a good solution.
8 into Safe Mode
Normal mode can not be cleared the virus, we usually will result in safe mode, killing the virus, others have also cleared the virus even in Safe Mode fails, then you ought to try to boot to Safe Mode with a command line, and
This difference between the two is that the Safe Mode with a command line, only the console (CMD) character interface, there is no resource manager (desktop), need some experience of DOS commands. You can enter the installation path of anti-virus software, the implementation of the command-line anti-virus tools. Kingsoft command line by typing kavdx, carriage return after the anti-virus.
9, close the shared folder
Local area network can be shared to write a serious risk, if not necessary, or turn off the bar.
10, use Registry Editor to simply delete / edit operations
Registry Editor greater risk, if not familiar with the case, recommended that before the amendment to create a System Restore Point, or the backup you want to modify the registry key branch, and then use the Registry Editor to modify.
No comments:
Post a Comment