Under what circumstances did you get poisoned? High Score Solicitation!

Updated on Car 2024-04-10
25 answers
  1. Anonymous users2024-02-07

    How can computer viruses be transmitted?

    Computer viruses are called viruses because of their contagious nature. Traditional channels are usually the following:

    1) Floppy disks: The most common way of infection is through the use of floppy disks that are infected from the outside world, such as system disks from different channels, software from unknown sources, game disks, etc. As a result of the use of floppy disks with viruses, the machine becomes infected with the virus and transmits it to the "clean" floppy disks that are not infected.

    A large number of floppy disk exchanges, legal or illegal program copies, and the uncontrolled use of all kinds of software on machines create a breeding ground for virus infections and proliferation.

    2) Through hard disks: Infection through hard disks is also an important channel, because the machine with viruses is moved to other places for use, maintenance, etc., the clean floppy disk will be infected and spread again.

    3) Through the CD: Because the CD has a large capacity and stores a large number of executable files, a large number of viruses may hide in the CD, and the read-only CD cannot be written, so the virus on the CD cannot be removed. In the process of producing illegal pirated software for profit, it is impossible to bear special responsibility for virus protection, and there is never a truly reliable and feasible technical guarantee to avoid the introduction, infection, epidemic and spread of viruses.

    At present, the proliferation of pirated CDs has brought great convenience to the spread of the virus.

    4) Through the network: This kind of infection spreads very quickly, and can spread to machines on the network in a very short time.

    With the popularity of the Internet, new ways have been added to the spread of viruses, and its development has made viruses possible disasters, the spread of viruses is more rapid, and the task of anti-virus is more arduous. The Internet poses two different security threats, one of which comes from files, which may contain viruses in the files that are viewed or are browsed. Another threat comes from email.

    Most Internet mail systems provide the ability to send messages with formatted documents between networks, so that infected documents or files can flood into the corporate network through gateways and mail servers. The ease and openness of the web makes this threat more and more serious.

  2. Anonymous users2024-02-06

    1. When browsing maliciously**, a Trojan horse is implanted or a malicious plug-in is installed.

    3. Plug in a storage device with poison, such as a USB flash drive mobile hard disk.

    4. Copy toxic files through LAN.

    5. Receiving unknown mail.

    6. Improper system-related security settings.

  3. Anonymous users2024-02-05

    NOD32 is recommended.

    Kaba once deleted my system files by mistake and prevented me from booting the computer.

    NOD32 Antivirus is very easy to use, but it needs to be cracked in the next patch!

    Strong bs on the fourth floor, everyone has their own thoughts, why do you say this.

  4. Anonymous users2024-02-04

    The first floor is a fart, and the front of the second floor is true, but the back is also a fart. The third floor is even more fartful, and I recommend directly checking the installation system.

  5. Anonymous users2024-02-03

    Enter the safe mode (press the F8 key to enter the boot), and use the "Super Patrol" to check and kill all the things, which comes from DSWLab Data Security Lab, professional anti-Trojan horses, epidemic viruses, backdoors, advertising programs and rootikit

  6. Anonymous users2024-02-02

    It's okay if you're quarantined. But it's still comfortable.

  7. Anonymous users2024-02-01

    Isolation is the fear of manslaughter; Or the file itself is infected, and the subsequent upgrade of the antivirus software is expected to clear the virus; If it can be judged to be a virus, go to the quarantine area and delete it again and it will be gone. It's okay to put it inside the quarantine area, it's not a big problem.

  8. Anonymous users2024-01-31

    Resolution;

    Use Win PE to boot into the system (usually ghost disks come with), and then antivirus.

    Antivirus software recommends the big spider (single file version about 13M) and Jiangmin mobile version, if you have other antivirus software installed on your computer, then you use the antivirus software installed on the machine to disinfect the virus!

    Note: The above is a personal opinion, please forgive me if there is any mistake!

  9. Anonymous users2024-01-30

    You can restore it, you don't need to reinstall it.

  10. Anonymous users2024-01-29

    Try it with Super Bunny and maybe you can modify it.

  11. Anonymous users2024-01-28

    The next 360 security guard, kill the Trojan horse first, if it doesn't work, you can only install the system.

  12. Anonymous users2024-01-27

    Use the 360 stubborn Trojan to check if you have been poisoned.

  13. Anonymous users2024-01-26

    If this phenomenon is also found in other partition disks except for the C drive, antivirus software will not play a fundamental role. The best thing to do is to transfer the important files on your hard drive to a portable hard drive or to another computer.

    Then, reinstall the system, in the process of reinstalling the system, then select the hard disk formatting, re-divide the partition, and finally install the system, success! Only in this way can the virus be completely removed, you try.

  14. Anonymous users2024-01-25

    You're a mutated version of Panda Burning Incense.

    Boot into safe mode and use Antivirus to start antivirus.

  15. Anonymous users2024-01-24

    Do you use antivirus???

  16. Anonymous users2024-01-23

    Press F8 to enter safe mode to kill and kill virus. If that doesn't work, go to the next offline virus database update package on another computer and upgrade the virus database in safe mode. Kill again, and then get a "Kingsoft System First Aid Kit" from another computer, test it on your own computer, and operate according to the prompts.

    Then get a big spider green version from another computer and upgrade it. Take the test on your own computer and kill the virus in safe mode. If you can't do it, you can test out the important information, format all the hard disks, reinstall the system again, install the software, back up the system, and restore it if there is a problem in the future.

    In the future, when you get a black soft, you should pay attention to whether there is a virus attached to it by others,Sometimes you may think,Some black soft itself is a virus,But be sure to pay attention to whether there are other viruses besides the black soft itself,Don't use it if you have it。 If the black soft is intercepted by the killing soft, don't turn off the killing soft, and add the black soft to the whitelist before using it. Hope your computer will be repaired.

  17. Anonymous users2024-01-22

    The most thorough and effective way to do this is to reformat all hard drives and reinstall the system.

  18. Anonymous users2024-01-21

    Rename in delete.

    If you can't delete it, you can use the shredder Rising Kaka, where it is.

    In Rising Kaka's advanced tool - File Shredding - you can select and shred files that cannot be deleted.

  19. Anonymous users2024-01-20

    Hehe. I guess your problem is caused by an antivirus conflict. It is best to install a killer soft on a machine. You try to just leave Rising to look at it.

  20. Anonymous users2024-01-19

    I only use a Rising one, but there has never been such a situation, I don't know about it, this favor must not be able to help, hehe, sorry.

  21. Anonymous users2024-01-18

    Normal phenomenon,Try to switch the input method。

  22. Anonymous users2024-01-17

    This, that's too... You can try switching input methods.

  23. Anonymous users2024-01-16

    Check whether the files used to install the system are poisonous, and also disinfect in safe mode (press it all the time when you turn on the computer to enter safe mode), so that the antivirus is more thorough.

    The ghost system disk may have a virus.

    The ghost file can't be seen with antivirus software!!

  24. Anonymous users2024-01-15

    If there is nothing important just repartition the hard drive and install the system, so it is more thorough.

  25. Anonymous users2024-01-14

    Hehehe... Restart first,Press f8 to enter safe mode,Kill the virus,If you can't kill it,It is recommended that you reinstall the system,And then install a better kill soft,(Go to the card rice forum to see it)

Related questions
4 answers2024-04-10

How Steel is Made** is an excellent work that describes the tenacious struggle of the first generation of Soviet youth after the October Revolution under the leadership of the Bolshevik Party to restore the national economy and consolidate the nascent Soviet power against internal and external enemies and all kinds of difficulties. >>>More

6 answers2024-04-10

1.on, in, at denote time.

on "on a specific day". >>>More

4 answers2024-04-10

The first thing to do is to decide if it's going to close in a specific location, or if it's going to be closed no matter where it is. >>>More

10 answers2024-04-10

Hello! There are several ways to save power:

1.Try to place the refrigerator in a shady place away from direct sunlight. Because for every 5 degrees increase in the temperature around the refrigerator, the internal power consumption increases by 25%. >>>More

21 answers2024-04-10

There are variations in both tense and mood particles. For example, if you talk to your friends and say I'm leaving, just say, go. It is also possible without the added tense. >>>More