-
I can tell you responsibly that the upstairs statement can't be completely irresponsible.
First of all, you need to know what hackers are using to hack your computer.
If it is scanned to yours with an automatic scan. He can't find you anymore after you reinstall (because he doesn't know your IP anymore).
If he uses your empty password to hack you, you still don't set a password after installing the system. You will be invaded as well.
There are too many possibilities, so I won't talk nonsense here.
Personal advice. Set the administrative password and close the ports that are easily intrusive, such as 1433 445 135
Install the shadow system.
-
Many Trojan viruses will be copied automatically, and if you don't format the whole disk, just reinstall the system, the Trojan virus will definitely still exist. You can use antivirus and anti-horse software to scan your computer thoroughly after redoing the system.
3. After the upgrade is completed, you can directly select the full sand kill.
-
Hacker attacks require a Trojan program, as long as it is fully anti-virus and the firewall is turned on, it should be fine.
-
The computer after reinstalling the system generally won't, unless you browse some phishing** again and let the hackers continue to invade.
-
I can tell you responsibly that no.
-
There are many ways for hackers to hack into a computer.
1.Hacking into a computer through a network.
2.Malware remotes control computers.
The spread of the virus on the disk is caused by the file shouting (this situation is less likely, because no one will use a USB flash drive of unknown origin).
Now that we understand how hacking works, let's get down to business.
First of all, check your home network to see if the network is seriously unstable or extremely slow, or you may find the following anomalies:
1.The network upload is abnormal, and the upload speed value is very large, which is caused by hackers stealing computer information, secretly turning on the camera to record and microphone recording, and uploading it to hackers. Try to change the name of the network, and change the strong password so that it is not easy to be cracked by hackers.
Also, installing malware can also lead to hackers taking control of the computer.
In this case, install antivirus software in the morning, 360, Kaspersky, etc., conduct a full scan, (if there is a strong mode check the strong mode), after the killing is completed, if it feels still invalid, **360 system first aid kit, open it, select the full scan, check the strong mode and process control, (check the process control, is to prevent the virus from secretly starting in the background,) After the killing is completed, process and restart the computer.
After restarting the computer, if you feel that the hacker has disappeared, use 360 to perform a normal full scan and clean up the battlefield.
-
If you are attacked by a hacker on your computer at work or at home, the hacker may encrypt the data on your computer or plant a Trojan horse.
In addition, ransomware will be installed, and only if you pay a ransom to the hacker can you recover the data, and many people will choose to pay the ransom to the hacker because they can't wait for the data to be restored and want to recover their data as soon as possible.
As a professional, I tell you never to do this, you should call the police immediately.
Because according to a foreign report, more than half of the victims will be targeted by hackers again.
About 80 percent of people who choose to pay the ransom will be attacked a second time, because these hackers will think that you are afraid to call the police, and that they have already learned the vulnerability of your computer, and it will be easier to hack again.
Even if you pay the ransom and restore access to the data on your computer, there will be all sorts of problems, and 46% of people will find that the data is corrupted and cannot be accessed at all.
What is the danger after the hacking?
Because after hackers invade your computer, they will encrypt your important data and make it inaccessible to you, but it is easy to damage the data during the encryption process, and there is another way to completely delete your data, in this case, even if you pay the ransom, the data cannot be recovered.
To sum up, the best way is to protect your computer, prevent hacker intrusion, install the necessary anti-virus software, regularly disinfect the virus, and clean the computer regularly, you should actively protect your basic rights, strengthen people's security awareness, and prevent hacker intrusion.
Legal basis: Article 200 and 85 of the Criminal Law of the People's Republic of China (the crime of illegal intrusion into computer information systems; Illegally obtaining data from computer information systems and illegally controlling computer information systems; Whoever violates state regulations by invading computer information systems or tools by intruding into computer information systems in the fields of state affairs, national defense construction, or cutting-edge science and technology, is to be sentenced to up to three years imprisonment or short-term detention.
If it's just a system.
Files other than the system disk (C drive) will not be lost. >>>More
The best way to do this is to repartition it. Could it be that your primary partition boot is faulty, or it is not activated, do you have more than 2 primary partitions? >>>More
I don't know if there is a Vista optimizer, if there is, it will be easy to do.
First, it may be the blue screen caused by the incompatible lock of your graphics card, it is recommended that you uninstall the graphics card driver in safe mode and install the driver on the free drive disk of your computer's graphics card. >>>More
Use 360 to clean up the junk and fix the system with the system first aid kit1: Start Running Enter msconfig and click "Selective Start", and remove "Process File". >>>More