I want someone to hack into my computer and get rid of the virus on my computer Thank you

Updated on technology 2024-02-09
8 answers
  1. Anonymous users2024-02-05

    The landlord has entered the misunderstanding.,It's not that invading your computer can help you KO the virus.。

    If you cooperate with me, turn off the anti-software and firewall and then tell me your IP address or give me your QQ number more directly, I can remotely control your computer as quickly as possible, but even then I can't see what is wrong with your computer for a while unless you tell me the characteristics and symptoms of your virus. And as soon as you disconnect from the network, then my remote control will not be able to use it unless you get on the machine again.

    Moreover, the remote control is not cool to operate on this machine

    Now it's better to go and kill the virus yourself, and don't expect others to hack into your computer. Hackers like us and remote control, making Trojan horses, how can people who steal numbers have a good intention, at least I am not replacing anyone who will browse the files on your computer, and you are not aware of it, in case there are your own private files, then they will be copied away unconsciously.

    It's like I stole QQ without protection and received it [premise to have the sun], if there is protection, and it's always in entertainment, then delete all its information and friends, and change it If you like to do space, turn off the space.

  2. Anonymous users2024-02-04

    Don't be so troublesome, if you really don't have a rut to redo the system, it's fast.

  3. Anonymous users2024-02-03

    Find a local computer to repair it, give him 20 yuan at most, help you reinstall the system, plus antivirus, be careful of being slaughtered.

  4. Anonymous users2024-02-02

    Just go to the next antivirus software on the Internet to kill the virus.

  5. Anonymous users2024-02-01

    Is it necessary to be so troublesome? Or is there a lot of stuff in it that matters?

    If you are infected with a variant virus, it is best to reinstall the grid.

  6. Anonymous users2024-01-31

    = Halo Then you might as well give remote control to help you kill.

  7. Anonymous users2024-01-30

    Hacking has become a culture, and many people want to be hackers, and they occasionally learn a few little tricks, and they always like to make fun of others and play some pranks. In fact, the highest level of hacking lies in defense, not offense. In order to prevent all the attacks of others, you must know more system knowledge than the other party, understand more system vulnerabilities, and how to make up for them.

    Now the sky is full of hacking tutorials, but there are not many really useful, and the following introduces an intrusion method under win9x:

    1.Obtaining the other party's IP address, such as, there are too many ways to go into detail.

    2.Determine where the other party is surfing the Internet, open a DOS window and type.

    tracert

    Lines 4 and 5 reflect the information of the other party's internet location.

    3.Get the name of the other computer, open a DOS window and type.

    nbtstat

    The first line is the name of the other computer.

    The second line is the workgroup where the other computer's computer is located.

    The third line is a description of the other computer.

    4.There is a file name in the windows directory, change it to lmhosts, delete its contents, and write the other party's IP and computer name to the file in the following format:

    The name of the computer. 5.Open the DOS window and type.

    nbtstat

    r6.Enter the name of the other party's computer in Start-Find-Computer, and click on the other computer.

    Please do not use the above methods indiscriminately, I am not responsible for the trouble you cause by using the above methods, please be cautious.

    The best way to deal with the attacks above is to hide your IP address.

  8. Anonymous users2024-01-29

    Do you know his IP address? I know that I can report it, but I don't know that there is no way, you don't even know where to invade, how to invade.

Related questions
12 answers2024-02-09

Law 1Right-click on the file you want to send> send to > removable hard disk, and the file will be copied to the USB drive; >>>More

38 answers2024-02-09

I hate this kind of profiteer the most, I have no technology, and I deceive people everywhere. I think you should bring someone to his shop! If your computer boots up with a stripe and this will not be a problem with the display and stop, it is said that even if it is a problem with the graphics card, there is no need to change the Nanqiao Stamen. >>>More

8 answers2024-02-09

UltraISO is a powerful and convenient optical disc image file conversion tool, which can directly extract files from disc images, create disc images from CD-ROM or create ISO files from hard disks. At the same time, you can also process the boot information of the ISO file to create a bootable disc. With UltraIso, you can make as many discs as you want. >>>More

15 answers2024-02-09

Yuan Fang, what do you think?

Yuan Fang: My lord, you have this configuration. Let's put it this first.,The processor performance is good.,The game basically doesn't have a pear.,If you have to change it.,Then x4 955 it's it.,6M's three-slow performance is more powerful than 840 2M's second-slow performance.。 >>>More

16 answers2024-02-09

There's no point in upgrading, buy a new one.