I m getting image hijacking on my computer

Updated on technology 2024-03-07
5 answers
  1. Anonymous users2024-02-06

    I don't see anything wrong.

  2. Anonymous users2024-02-05

    System restore, or delete registry virus files.

  3. Anonymous users2024-02-04

    Save the following ** as: reg, double-click to execute:

    hkey_local_machine\software\microsoft\windows\currentversion\image file execution options]

  4. Anonymous users2024-02-03

    I've got a repair tool here, if no one gives you how to fix it, you can ask me to fix it for you.

  5. Anonymous users2024-02-02

    Image hijacking", also known as "iFeo" (Image File Execution Options), in WindowsNT architecture, iFEO is intended to provide special environment settings for some program executors that may cause errors when running in the default system environment. When an executable program is under the control of IFEO, its memory allocation is set according to the parameters of the program, and the system of Windowsn T architecture can use the items that match the file name of the executable program as the control basis for program loading through this registry key, and finally can set up a program's heap management mechanism and some auxiliary mechanisms. For simplicity, iFeo uses the ignore path to match the file name of the program it wants to control, so no matter which path the program is placed in, as long as the name does not change, it will run badly.

    In layman's terms, if you double-click to execute program A, but it is program B that runs (for example, you run QQ, but QQ does not get up, but jumps out of Xiangsan Foxmail), then congratulations, you should have fallen for a virus that uses IFEO technology.

    The so-called ifeo is actually an abbreviation for Image File Execution Option, which is actually a registry key:

    hkey_local_machine\software\microsoft\windows nt\currentversion\image file execution options

    Recently, many viruses have used this technology to:

    a.Prevent anti-virus software and anti-virus tools from running;

    b.Redirect some commonly used programs to virions, and once these programs are run, the virus resurgence.

Related questions
2 answers2024-03-07

The principle of image hijacking is actually quite simple. We know that the ** or ** in a web page or application is sent by the server to the client, and the client is displayed through the browser or application. Attackers can manipulate the ** or ** sent by the server to deceive users. >>>More

6 answers2024-03-07

Most of the 691 errors are due to the following reasons:

1. The broadband username or password is incorrect. Sometimes, if you don't change your password for a long time, you may not be able to log in because your password is too old. If you make this error, you can simply re-enter your username and password, and sometimes you need to delete the account and create it again. >>>More

10 answers2024-03-07

Check and kill with the latest upgraded anti-virus software to confirm that the system is virus-free, and then do other treatments! >>>More

12 answers2024-03-07

Pay attention to reading books or playing on the computer Shift your gaze often I used to be like this Dizzy Pay attention to go to bed early and get up early Don't play on the computer or read books in the short term Two or three days to slow down... There is no need to take medication.

15 answers2024-03-07

Get rid of rogue software with 360 Security Guard.

I'm sure it's fine if I fix it with 360. >>>More