-
The landlord has entered the misunderstanding.,It's not that invading your computer can help you KO the virus.。
If you cooperate with me, turn off the anti-software and firewall and then tell me your IP address or give me your QQ number more directly, I can remotely control your computer as quickly as possible, but even then I can't see what is wrong with your computer for a while unless you tell me the characteristics and symptoms of your virus. And as soon as you disconnect from the network, then my remote control will not be able to use it unless you get on the machine again.
Moreover, the remote control is not cool to operate on this machine
Now it's better to go and kill the virus yourself, and don't expect others to hack into your computer. Hackers like us and remote control, making Trojan horses, how can people who steal numbers have a good intention, at least I am not replacing anyone who will browse the files on your computer, and you are not aware of it, in case there are your own private files, then they will be copied away unconsciously.
It's like I stole QQ without protection and received it [premise to have the sun], if there is protection, and it's always in entertainment, then delete all its information and friends, and change it If you like to do space, turn off the space.
-
Don't be so troublesome, if you really don't have a rut to redo the system, it's fast.
-
Find a local computer to repair it, give him 20 yuan at most, help you reinstall the system, plus antivirus, be careful of being slaughtered.
-
Just go to the next antivirus software on the Internet to kill the virus.
-
Is it necessary to be so troublesome? Or is there a lot of stuff in it that matters?
If you are infected with a variant virus, it is best to reinstall the grid.
-
= Halo Then you might as well give remote control to help you kill.
-
Hacking has become a culture, and many people want to be hackers, and they occasionally learn a few little tricks, and they always like to make fun of others and play some pranks. In fact, the highest level of hacking lies in defense, not offense. In order to prevent all the attacks of others, you must know more system knowledge than the other party, understand more system vulnerabilities, and how to make up for them.
Now the sky is full of hacking tutorials, but there are not many really useful, and the following introduces an intrusion method under win9x:
1.Obtaining the other party's IP address, such as, there are too many ways to go into detail.
2.Determine where the other party is surfing the Internet, open a DOS window and type.
tracert
Lines 4 and 5 reflect the information of the other party's internet location.
3.Get the name of the other computer, open a DOS window and type.
nbtstat
The first line is the name of the other computer.
The second line is the workgroup where the other computer's computer is located.
The third line is a description of the other computer.
4.There is a file name in the windows directory, change it to lmhosts, delete its contents, and write the other party's IP and computer name to the file in the following format:
The name of the computer. 5.Open the DOS window and type.
nbtstat
r6.Enter the name of the other party's computer in Start-Find-Computer, and click on the other computer.
Please do not use the above methods indiscriminately, I am not responsible for the trouble you cause by using the above methods, please be cautious.
The best way to deal with the attacks above is to hide your IP address.
-
Do you know his IP address? I know that I can report it, but I don't know that there is no way, you don't even know where to invade, how to invade.
Law 1Right-click on the file you want to send> send to > removable hard disk, and the file will be copied to the USB drive; >>>More
I hate this kind of profiteer the most, I have no technology, and I deceive people everywhere. I think you should bring someone to his shop! If your computer boots up with a stripe and this will not be a problem with the display and stop, it is said that even if it is a problem with the graphics card, there is no need to change the Nanqiao Stamen. >>>More
UltraISO is a powerful and convenient optical disc image file conversion tool, which can directly extract files from disc images, create disc images from CD-ROM or create ISO files from hard disks. At the same time, you can also process the boot information of the ISO file to create a bootable disc. With UltraIso, you can make as many discs as you want. >>>More
Yuan Fang, what do you think?
Yuan Fang: My lord, you have this configuration. Let's put it this first.,The processor performance is good.,The game basically doesn't have a pear.,If you have to change it.,Then x4 955 it's it.,6M's three-slow performance is more powerful than 840 2M's second-slow performance.。 >>>More
There's no point in upgrading, buy a new one.