-
For your 200 points, I'm typing!!
Well, I hope my answer will be used
First of all, apart from QQ, will viruses invade my privacy when I surf the Internet? Yes, absolutely! But it depends on what virus it is, and who else says that Trojans are not viruses??? He is also a kind of virus, I don't know what virus you have, you should be detailed, otherwise it is not very clear
Viruses are divided into the following types, benign viruses, malignant viruses, extremely malignant viruses and catastrophic viruses, 98 years of CIH virus is a catastrophic virus, if you get a Trojan horse, he will steal your QQ, mailbox, bank account number, etc., and Trojan horses are also divided into many kinds, different ones steal your game, there are steal your QQ, mailbox, there are also Trojans that specialize in stealing your bank account number and are specially used to open your back door.
Viruses are different, they usually cause your operating system to not boot, or not to work, or to be paralyzed, or whatever, and the most important thing is that it can't be used, like not being able to use the right button, or whatever
What you do online (I really don't know what virus you have), if it's a gray pigeon, you can definitely see it, you can see your desktop and what you type, and of course you will write down your name or card number and so on
If it weren't for this gray pigeon, he could open your port 3389 and connect to your desktop remotely, and he could still see you doing anything, and he could use your computer to post on your forum or use your computer as a springboard to do something illegal. Then the police won't arrest you.
And if you are afraid of this, it is recommended that you change your username and password, make it more difficult, and then reduce such things
And if you open QQ, you tell me, I'll help you get it, you can deal with him in turn, if it's just a QQ virus, he may just want to steal your QQ, in that case, I can help you find out the password of his mailbox
It's okay
Again, despise people who copy from somewhere else no matter what the problem!!
-
What I want to ask is, apart from QQ, will viruses invade my privacy when I surf the Internet?
Yes. What I want to ask now is that I still have viruses on my computer, and will others see me when I do other things online? For example, the name entered, the card number, and so on.
Malicious programs can log this information, such as recording your keyboard keystrokes. As for whether others will see it, it depends on the purpose of the virus maker.
If it is seen by the virus creator, will it be seen by my friends who usually know when I log in to the forum? Will those privacy issues be seen by netizens?
In some cases, virus makers have used privacy to blackmail victims.
-
Viruses don't drop any more, viruses will only make your computer system reimburse or take up your resources!
You're talking about Trojan horses!
The gray pigeon Trojan can see your screen and he can see whatever you do!
If you play the game, someone else can use a Trojan horse to get your password!
Fuel tank, QQ, you can steal anything
Protect your computer
-
You should have heard of the powerful panda incense burning virus, right? Regardless of whether the harm caused by the virus is big or small, for the sake of the security of the computer and the information in the computer, it is absolutely necessary to remove it unceremoniously, kill one by one, and don't take any chances, otherwise it is useless for you to regret it!
-
Online banking is now secure. In order to increase the level of security, many software sets up a soft keyboard to enter passwords, so that passwords are not recorded by Trojan software. However, it is also necessary to install a set of genuine antivirus and anti-Trojan software just to prevent it.
As for the Trojan scavenger above, this software is good, but this activation code can't be used. As for the privacy of logging into the forum, if you set up registration information that is not related to the individual, it is nothing. Leave the Internet record on the machine or something, the next card Internet assistant or 360-degree security guard, just clean it up in time.
-
The virus you said will not infringe on your privacy on the Internet, others will not leave a message without a virus, you can rest assured, you now have a virus on your computer when you go online, others will not see the name and card number you entered, and when you log in to the forum, it is even more unlikely that your friends who know you will see you, and you will not be seen by netizens.
Perfect answer, thank you for the score.
-
There is a computer abnormality
Freeze phenomenon: The virus opens many files or occupies a large amount of memory; Unstable operation (e.g. poor memory quality, poor hardware overclocking performance, etc.); Running a large amount of software takes up a lot of memory and disk space; used some testing software (with many bugs); Insufficient hard disk space, etc.; Frequent crashes while running software on the network may be due to a slow network, a program running too large, or your workstation hardware configuration being too low.
System Won't Boot: A virus has modified the boot information of the hard drive, or deleted some boot files. Such as boot virus boot file corruption; The hard drive is damaged or the parameters are set incorrectly; System files are deleted artificially and by mistake, etc.
The file cannot be opened: the file format has been modified by a virus; The virus modifies the file link location. file corruption or hard drive corruption; The link location corresponding to the file shortcut has changed; The software of the original file is deleted; If it is in the local area network, it is mostly manifested that the server Chinese storage location has changed, and the workstation does not refresh the content of the server in time (the explorer is opened for a long time).
Running out of memory is often reported: viruses illegally occupy a lot of memory; Open a large number of software; Running software that requires a lot of memory resources; The system is incorrectly configured; The memory capacity is too small (the current basic memory requirement is 128MB).
Prompt hard disk space is not enough: the virus copies a large number of virus files (this phenomenon is more common, sometimes the good end of the nearly 40GB hard disk installed a Windows 2000 operating system or Windows XP operating system is said to be out of space, when installing the software will prompt the hard disk space is not enough). The capacity of each partition of the hard disk is too small; A large number of high-capacity software is installed; All software is installed in one partition; The hard drive itself is small; If the system administrator sets a limit on the space used by the workstation user's "private disk" for each user, the capacity of the "private disk" has been used up because the size of the entire network disk is viewed.
There are a large number of files of unknown origin: virus copies of files; It may be a temporary file generated during some software installation; It may also be the configuration information and running records of some software.
Data loss: Viruses delete files; Hard disk sector corruption; Overwriting the original file due to the recovery of the file; If the file is on the network, it may also be deleted by another user by mistake.
-
There will be many symptoms of computer poisoning, and I can't explain it in one or two sentences, such as slow speed, some web pages can't be opened, some programs can't be executed, some software can't be applied, and so on, there are too many, just the typical symptoms of Trojan group poisoning.
9 articles. 1. The main program of the antivirus software cannot be opened, and there is no response when double-clicked;
2. The antivirus software cannot be intelligently upgraded;
3. Click to update the intelligent upgrade to report an error, or the system blue screen;
4. Anti-virus software monitoring cannot be started normally;
5. Using flash vulnerabilities to spread viruses;
6. Tamper with system files and disguise process loading;
7. Attack system vulnerabilities and malicious security drives;
8. Hijacking and attempting to delete security auxiliary tools;
Install genuine anti-virus software, personal firewall and card Internet security assistant, and upgrade them in a timely manner, Rising anti-virus software is upgraded at least three times a day.
Use "Rising System Security Vulnerability Scanning" to patch and make up for system vulnerabilities.
Do not accept suspicious files from QQ, MSN, EMIAL, etc.
Turn on the real-time monitoring function of the antivirus software when surfing the Internet.
Add important software such as online banking, online games, and QQ to the "Rising Account Vault" to effectively protect the security of passwords.
As for saying that Rising can't be opened, you can fix the Rising software, starting from the beginning, all programs, Rising antivirus, add and remove components, repair, and then upgrade to the latest, antivirus try again.
-
You may not be poisoned yet, but the antivirus software is preventing the Trojan from entering. You now use the input software to scan the whole disk, first see if there is a virus, if there is a virus, there is more scanning prompt, just remove the Trojan horse.
-
It depends on what kind of virus it is, and if you can tolerate it, ignore it.
You know where it is deleted directly in safe mode or gridded, pay attention to back up first!
I don't know where it is, I can only install an antivirus software to check and kill!
Free to kill a lot of soft products, just uninstall it if you don't like it after killing the virus.
If you don't want to pretend to be soft, remember to patch the system often.
-
Delete it manually.,Find this file and click delete.,If it doesn't work, the next file shredder will be good.。
-
Don't have antivirus software installed on your computer?
If your computer has a firewall, you should use the firewall to find out it**.
If you don't have any anti-virus equipment installed on your computer.
Then install one as soon as possible. Kill as soon as possible.
-
Medium virus, too lazy to use antivirus software, very simple, two ways.
1.One-click restore, that is to say, reinstallation, this is very simple, and you will learn it.
2.First see which file is poisoned, then take a folder, and then go to someone else's home computer to copy a C drive file.
It's just the system file, 2000, XP, vista, this one is generic), it depends.
Delete the poisoned file or folder directly.,If you can't delete it, restart it and don't open anything.。
Delete directly first (Note: what after the restart.
Don't open it, because if you open it, you may reactivate the disease.
poison), and then paste the copied file in a place.
If you take care of your computer, if you want to use it for a longer time, I will give you some advice, the computer is the same as people, you have to take care of it, like me.
Self,The next super rabbit,And 360 software,Free to clean up the system junk files,Update the system patch,Both of these software are free,Use more and you will feel that the computer is very smooth,Super rabbit is recommended,Okay,I wish you a happy mood。
-
I don't want to use anti-software, install a ghost, or restore software such as wizard with one click, in case of unforeseen recovery, but the current problem is still to use anti-virus or reinstall the system and restore with past backups.
-
You're talking about the Trojan mutant. He is a type of Trojan horse. 360 antivirus software has just come out, and the functions are not perfect. Since you can find out that it's that kind of Trojan horse, you just need to kill it.
-
If the mobile phone has silent installation of unwanted software, advertising push, etc., it is generally caused by poisoning, you can use security software to detect the mobile phone, please try to follow the steps below to remove it:
Install a security software, take Phone Manager as an example, and open Phone Manager. Click on the homepage to automatically check and kill viruses in the system, and automatically and completely remove them.
If it prompts that it cannot be deleted, it is likely to be caused by insufficient permissions, viruses generally exist in the system partition, and cannot be uninstalled by normal uninstallation methods, even if the factory settings are restored, they cannot be deleted, and root privileges must be used to uninstall.
-
Try installing a security software (e.g. Phone Manager, etc.). Take Phone Manager as an example, open Phone Manager, click on the main interface of the one-click physical examination to automatically detect the problems in the phone, and give treatment suggestions, click one-click to remove the virus program.
-
Because your computer defense ability is low, just like people, if the resistance is poor, the whole body is sick, maybe you will be paralyzed by a mosquito bite, as long as you do a good job of security, ensure that the system is clean, do not browse unclean web pages and do not receive files sent by strangers can reduce the attack of viruses.
Mine is the Suteng Hand Comfort version.
Performance: Manual is slightly better than automatic, enough for urban driving, weak high-speed rapid acceleration, I ran past the actual top speed can reach 185. It would be better to maintain 2500-3000 to switch gears. In the summer, when the air conditioner is turned on, in the case of four people, it has a greater impact on the power. >>>More
It's coming to the Olympics soon, think about it, see if you can make some small red flags, make two glued together (one is a five-star red flag, the other is your company's introduction, etc., don't do one side is a red flag and one is the company's introduction), and then it can be distributed in the target crowd gathering place, I believe it will not be thrown away casually (can you think about it on this basis, think about the expansion of this aspect). You can write "China has given us many opportunities, and in future, much more opportunities" and sign the company name. >>>More
Hello, I'm glad to have your question, I still remember vividly when I was 13 years old, I went fishing in the village river with my two friends, and then drowned, I can say that I died once, thanks to the efforts of the villagers at that time to save me, but unfortunately my two friends did not wake up in the end, alas, hurt. >>>More
The degree of tension in which the muscles are at rest and relaxed is called muscle tone. Muscle tone is the basis for maintaining a variety of postures and normal movements, and manifests itself in many forms. Abnormal muscle tone can lead to a variety of symptoms. >>>More
Drive the sprites. 1. Super hardware detection ability, automatic intelligent driver update. >>>More