Urgent! How can I get a virus into someone s computer so that it crashes?

Updated on number 2024-03-27
10 answers
  1. Anonymous users2024-02-07

    Hello: It is recommended that you do not use virus software, viruses will cause damage to your and other people's computers, if you have used such unsafe virus software, for the safety of your computer, it is recommended that you use Tencent Computer Manager to carry out a comprehensive anti-virus on your computer, open the anti-virus function in Tencent Computer Manager and choose lightning to kill or kill completely, you can click here**The latest version of Tencent PC Manager: The latest version of Tencent PC Manager**.

  2. Anonymous users2024-02-06

    This one of yours is so fuzzy. I understand how to crash other people's computers. How is the whole crash machine rectified?

    Is it a temporary or permanent crash? At least I can tell you responsibly that you probably think that hacker technology is bullish and omnipotent. I'm going to help you figure out that if a Trojan virus appears on your computer one day, there is only one reason, your computer has a vulnerability.

    The two most commonly used techniques are port scanning, using the insecure ports opened by the computer to implant Trojans. The second is that you may have some Trojans when you are usually browsing**, and as soon as you open it, the Trojan will automatically run to your computer. Causing you to plant viruses, which is mostly the case.

    Using the port is like looking for a needle in a haystack. - Having explained so much, you can also understand that hacker technology is not a panacea, and it is impossible to say that it will be assigned to a computer. Unless you have excellent skills, are familiar with multiple invasion methods, and add luck, you can complete it.

    In response to your situation, let me say two, there are many whole people on the Trojan horse. Crash Trojans are also among them, such as the ones that shut down automatically. There are a lot of files that p handles, you just need to add him as a friend, then send him and let him run.

    Or you send him an email, add some mystery to the email, and use the curiosity of the person to make him run. This will serve your purpose.

  3. Anonymous users2024-02-05

    1. To play system-wide vulnerability patches and third-party software vulnerability patches, it is best to use 360 and Kingsoft cleanup experts to patch, 360 security guards + Kingsoft cleanup experts to patch, which is more humane, and it never detects some patches that should not be played. It doesn't let go of any patches that should be hit.

    2. To install anti-virus software and firewalls, update the anti-virus software database every day. Manually define firewall rules for your situation.

    3. Use third-party browsers to surf the Internet, such as Window of the World, Myie, Firefox, and IE have too many vulnerabilities.

    4, QQ chat does not hit the ** sent by strangers in the late group, do not mess into the QQ space, because there may be Trojan horses to swim Dan pickup. Don't go to unfamiliar sites or small sites** software, listen to songs, watch movies.

    disk, ***, the use of mobile phone memory card, i.e., the spread of U disk virus. Use Kingsoft Cleanup Expert and other software to do immunity.

    7.Web Trojans, malware, advertising plug-ins, etc.

    Defense method: Use at least 360+ Kingsoft Cleanup Expert + Malware Cleanup Assistant + Windows every day

    Security tools such as Cleanup Assistant + Card Assistant clean up system junk. Many of them are green software, with no conflicts, small memory occupation, and good detection and killing effects. Upgrade to the latest version, the latest detection engine, and the latest virus database, and then switch to safe mode.

    Adding important software such as Shenchang online banking, online games, and QQ to the "Rising Account Safe" or "360 Safe" can effectively protect the password security.

    Plagiarism is prohibited, otherwise it will be reported -

  4. Anonymous users2024-02-04

    Patch the system often, many viruses are invaded from the system vulnerability shouting, but also often scan for Trojan viruses, the main antivirus software with a slow brother card or Rising, auxiliary with 360 security guard, windows cleaning assistant, don't go on the small **, but also pay attention to mobile devices, install firewalls, configure good rules, so as to greatly reduce the chance of viruses, but also reduce the risk of theft, this is the right way to prevent it.

    To prevent the harm of Trojans, the following measures should be taken:

    First, install anti-virus software and Zheng Naye's personal firewall, and upgrade it in time.

    Second, set the security level of your personal firewall to prevent unknown programs from transmitting data to the outside world.

    Third, consider using a browser and email client tool with good security.

    Fourth, if you use IE browser, you should install the card security assistant to prevent malicious ** from installing unknown software and browser plug-ins on your computer, so as not to be invaded by Trojans.

  5. Anonymous users2024-02-03

    1: Don't go into the stuffy **.

    2: Li Xiang turns on the firewall.

    3: Install the anti-virus software.

    4: Pay attention to the infection of mobile hard disks such as USB flash drives.

    5: Fix system vulnerabilities.

  6. Anonymous users2024-02-02

    This multi-engine scan** scans for viruses with multiple antivirus software.

  7. Anonymous users2024-02-01

    You restore the system first and then kill the poison, if it doesn't work, you have to reinstall the system, because the antivirus software can't be removed, there is no other way, and if you delete the virus software, it will cause some programs to be unusable.

  8. Anonymous users2024-01-31

    No, you install the restore wizard. Set it to auto-restore after restarting.

  9. Anonymous users2024-01-30

    After rebooting the computer, click "Isolate|" againRecover", point: "Completely delete" virus files and "unknown auto-start items"!

    Then click on "Repair", "Select All", and then "Repair" the file!

    Again: "Recover lost dll files", scan it, if there is no on the line!

    2.Use "360 Security Guard" to "Scan Plugins" and then "Clean Plugins" to remove it!

    3.Then use "360 Antivirus Dual Engine Version", "Full Scan", Virus Trojan, and then click to delete!

    4.After restarting the computer, go to "Quarantine" and click "Delete completely"!

    5.Use "System Repair" in "360 Security Guard", and click "One-click Repair" after scanning

    6.If the above methods don't work, restart the computer, after opening the phone, press F8, press Enter, Enter, enter the "Safe Mode", "Advanced Boot Options", "Last Correct Configuration", press down to try, see the effect!

    7.It's really not good, do a "one-click restore" system!

  10. Anonymous users2024-01-29

    On the basis of the powerful management function of the computer housekeeper, the housekeeper is given more anti-virus functions. The new version of PC Manager 2-in-1 Antivirus Edition has four powerful anti-virus engines: Little Red Umbrella Local Engine, Kingsoft Cloud Detection and Killing Engine, Manager Cloud Kill and Anti-Virus Engine independently developed by PC Manager, so that Qinchai Computer with PC Manager has strong anti-virus capabilities.

    To put it simply, installing PC Manager 2-in-1 antivirus version is equivalent to having the ability of 4 mainstream antivirus software in an instant.

Related questions
36 answers2024-03-27

Uh,The graphics card of the Internet café is better than yours.,The memory is also large.,3G memory can also be used.,Otherwise, buy a 1G.,It's not very cost-effective.,If it's an online game 3D,It's also related to the network speed.,Your graphics card is also a little low.,It's estimated that you have to sacrifice some special effects.。

16 answers2024-03-27

However, your phone brand is not very big, and you may not be able to find the game corresponding to your model directly.

13 answers2024-03-27

Hello. The steps are as follows:

This method is only suitable for users with short distances, and once the distance is too far, the hotspot will disconnect. And users who turn on the hotspot also consume the battery of their mobile phones. >>>More

12 answers2024-03-27

Establish. Passwords are useless in complexity. Many software can directly modify and delete deleted SAM files, so no matter how complex the password is, it is in vain. >>>More

32 answers2024-03-27

1. Change the initial default value. Change the original IP address of the router to another address, and change the initial username and password of the router. >>>More