Although now a large number of antivirus software and firewall protection for everyone as the computer, but the new viruses and Trojans, with the invasion of hackers artificial way, the computer situation is still very widespread poisoning. In particular, Internet users, they would have got one is not aware of. Tips how to prevent poisoning the article, we have seen enough. So if poisoned, how to handle it? Here's some of the talk about poisoning emergency treatment measures:
1, are Internet users, found that abnormalities should immediately disconnect the first
If you find that IE often asked is whether you run some of the ACTIVEX controls, or the floating of the documents generated and asked what the script debugging must be alert, you may have in recruited. The typical Internet was invaded in two cases:
1, is the view of some web pages with malicious code to be modified when the browser's default home page or the title is not too light; there is the experience that you can format the hard disk or the windows constantly open window, until the consumption every resource of Death - a situation much worse, you do not save and have data on the hard disk may be part or all of the losses.
2, is a potential Trojan horse hacker attack, or worm-like virus attack, so keep your machine to send your privacy to the outside world, or to use your name and e-mail address to send spam, further spread of the virus; there is the hacker manual invasion, spy your privacy or damage your files to delete.
Approach: immediate disconnect, this can reduce their losses, but also avoid online computer virus to spread more. Please do not restart the system immediately, or shut down, further post-treatment measures see the text.
Second, poisoning, they should immediately back up the transfer documents and e-mail, etc.
Poisoning, let alone run the antivirus software to remove, but to prevent anti-virus software, manslaughter, or delete documents you have processed and important messages, you should first transfer them back to other storage media. Some long file names of files and e-mail requests processed under the windows back up, so the first point where I recommend that you do not exit windows, because once the attack, may not enter the windows of the.
Regardless of whether the infected files, you should back up, with labels can be marked as unknown origin. Because some viruses are designed specifically for a certain anti-virus software, and a run would destroy the other files, so back up is just in case measure. Waiting for you to clean all hard disk of the virus, come back slowly to deal with these additional backup of the file more secure.
Third, you need to start running it under windows kill CIH software (even poisonous environment)
If it is found the CIH virus, should be careful not exactly as usual the press and the manual recommends measures to the first shutdown, cold Qidong of system to guide Zai Pan antivirus should Daidu environment also run Yici specifically kill CIH software. So doing, anti-virus software may report some files will be read and write protection can not clean up in, but the actual running infected are not aimed rid of the virus, but is the next boot time of the destruction of CIH reduced Zuidi, to prevent Ta damage the motherboard BIOS boot again the hardware, then the black screen will make your next antivirus can not.
4, requires a clean DOS boot disk and DOS the following antivirus software
Now, it should be the standard by many anti-virus software manual to progressively do that after the cold start off with a clean DOS boot disk can not boot a little; other windows as poisoning may have been destroyed some key documents, will frequently illegal operation, under the antivirus software so windows may not run. So you have to prepare a DOS antivirus software, such as the following series of KV300 to just in case.
Even in windows to run antivirus software, please use the tools of two or more cross-cleaning. In most cases, may have to reinstall windows, because virus will destroy part of the file to system slow down or appear frequently in the illegal operation. For example even if the kill CIH, Microsoft's mail program is OUTLOOK slow response. Not recommended for certain anti-virus software with a bias, because when the focus of the development of different, use different antivirus engines, various anti-virus software is its own strengths and weaknesses, and cross-use of a good effect.
5, if there GHOST and the partition table, boot sector backup, using them to restore one of the most security
If you have made in peacetime the GHOST backup windows, using them to mirror one, get the operating system is the best insurance. This does not even kill a potential Trojan horse program is also cleared the way, of course, this requires you to GHOST the backup is absolutely reliable, huh, huh, if the time of the Trojan for GHOST also "back up" the will. . . . .
6, once again to restore the system, change the password to your network-related
Including the network login user name, password, email password and QQ, etc., to prevent hackers have invaded in the course of the last to know your password. Also because many of the worm attack will randomly send out your information, so the appropriate changes are necessary.
Recommended links:
SAP Sales Drop Turmoil Spread To China, CEO To Resign
Mts converter
Convert m4a to wma
Backup And Restore Expert
Report Compilers And INTERPRETERS
New Seasonal - Screen Savers
Lists Multimedia Creation Tools
EBiz.scm Introduction
Macro and micro dogs the difference between a dog
Concerned about the anti-monopoly law enforcement agency jurisdiction overlap
ADOBE flash for ps3
Competitive Strategy: Legal Spying
"Nobunaga's Ambition 12 Innovation" 82 Hokkaido start a battlefield report
Ps3 Movie Formats
Toyota Authorized Dealer
No comments:
Post a Comment