-
Service Host Process is a standard dynamic connection library host processing service. For services running from a dynamic connection library (DLL), it is a common host process name. The files are located under the Windows System32 folder of the system.
At startup, check the location in the registry to build a list of services that need to be loaded. This will cause multiple to run at the same time. Windows 2000 generally has two SVCHOST processes, one is the RPCSS (Remote Procedure Call) service process, and the other is one shared by many services; In Windows XP, there are generally more than 4 service processes; More in Windows 2003 Server.
It is a core process of a system, not a virus process. However, due to the particularity of the process, viruses will also invade in every possible way. You can check whether a poison is poisoned by looking at the execution path of the process.
If you suspect that your computer may be infected by a virus or that the service is abnormal, you can find the abnormality by searching for the file. Generally, only one program will be found in the C: Windows System32 directory.
If you find a program in another directory, it's probably poisoned.
-
Enter safe mode and kill with click.
-
svchost seems to be a standard dynamic connectivity library host processing service, but there seems to be a virus that disguises the file. It is recommended that you go to the next 360 security assistant.
-
For the computers in the school computer room, the most common problem is that there are many viruses and a lot of advertisements will pop up on the desktop, and the computers in the computer room are generally many with viruses. When the administrator handles it, it needs to be solved one by one, which can be time-consuming. If you want to manage the computers in the computer room in a unified manner, you can consider using themLAN monitoring software iMonitor EAMThis is a suitable for enterprises, **, education and other institutions that need to manage a large number of computers, it is very convenient to install and use, and it is necessary to install the main control and controlled programs respectively, and it can be installed in a few minutes.
To stop the Trojan from running, simply add the Trojan to the program blacklist. The steps are as follows:
1. Install iMonitor EAM software.
Just install the master on the administrator's computer and the controlled on the student's computer. Once installed, the computer will be displayed in the iMonitor EAM management list.
2. Find the Trojan process and add it to the program blacklist.
For example, the software installed in the computer room is fixed, and the processes in the administrator's task manager are very familiar, and for some unknown processes that suddenly appear, it occupies a high CPU, causing the computer to freeze. The solution is to add unknown processes to the blacklist of iMonitor EAM.
Processes in the blacklist list will be forcibly shut down and cannot run.
If you don't know which processes are viruses, you can use the antivirus software on the market to scan and kill, and for the processes that cannot be deleted by the antivirus software, you can also add them to the program blacklist list to prevent them from running.
3. Select Apply to all clients.
Many viruses in the computer are caused by the installation of unknown software, for the school computer, the software used by students is fixed, the administrator can set up the necessary software after installationAll software installation is prohibited。The setup method is the same as in the previous steps, just add the specified process name.
You can also set a software whitelist, add allowed software, and prohibit everything else.
All of the above settings can be set in the iMonitor EAM admin interface, which is very convenient.
-
After rebooting the computer, click "Isolate|" againRecover", point: "Completely delete" virus files and "unknown auto-start items"!
Then click "Repair", "Select All", and then "Repair" the file!
Again: "Recover Lost DLL Files", scan it if it doesn't work on the line!
2.Use "360 Security Guard" to "Scan Plugins" and then "Clean Plugins" to remove it!
3.Then use "360 Antivirus Dual Engine Version", "Full Scan", Virus Trojan, and then click to delete!
4.After restarting the computer, go to "Quarantine" and click "Delete completely"!
5.Use "System Repair" in "360 Security Guard", and click "One-click Repair" after scanning
6.If the above methods don't work, restart the computer, after booting, press F8, press Enter, Enter, enter the "Safe Mode", "Advanced Boot Options", "Last Correct Configuration", press down to try, and see the effect!
7.It's really not good, do a "one-click restore" system!
-
Respond to your school's information department for processing.
-
1. Hope this never happens.
2. If a college student creates a virus and breaks all the computers in the school. After the school finds out, it will call 110 to call the police as soon as possible.
3. This kind of deliberate destruction of public property is a criminal act and must be held legally responsible.
4. The People's Public Security Commission will investigate and collect evidence as soon as possible and block the scene.
5. After the people's public security discovers a suspect, it will summon him to the public security bureau for an interrogation record.
6. The evidence is conclusive and will be sentenced.
-
Your question is what happens if a college student creates a virus and breaks the computers in school? In this case, since you have broken the computer, then this situation must be a crime, and in this case, you will definitely be detained or sentenced.
-
It will become a boutique of the school. Although he broke the computer, it proved that he was a genius. It's worth cultivating. Chances are: the next hacker!
-
Crime of sabotage of computer information systems
According to article 286 of the Criminal Law of the People's Republic of China, the crime of destroying computer information systems refers to the act of destroying the functions of computer information systems or the data and applications stored, processed or transmitted in computer information systems in violation of state regulations, or deliberately creating or disseminating computer viruses and other destructive programs, affecting the normal operation of computer systems, with serious consequences.
Shape up or ship out.
-
If you are caught and punished by the school, you can't escape. If you don't get it right, the college will report to the police and investigate legal responsibility.
-
Netizen 1: There are many people who use computers in the school computer room, most of them are students. When students use the computer, they are more casual and open more, especially some small ones, and some games, which will have viruses in them.
The computer in the school computer room generally does not have anti-virus software installed, and most of the operating systems are XP or Win7, which are pirated systems, unlike genuine Win10, and there is almost no problem with not installing anti-virus software. People pay attention to the security of home computers.
In addition, the computers in the school computer room are shut down after students use them, and there is almost no maintenance, let alone going to check them one by one, so there will be viruses. Of course, some school computers install protection software similar to those in Internet cafes, and there are no viruses.
Netizen 2: Many computers in the computer room do not have anti-virus software installed, and now students like to look at small**, or casual** some software, especially game plug-in software. 9 out of 10 of these plug-ins have viruses, and recently there is a domestic ransomware virus spread through the chicken plug-in, and the user will be encrypted after running the plug-in, and it will be decrypted at a cost.
Netizen 3: Many school computer room computers, there is no special person to maintain, we all know that Microsoft will issue patches every Tuesday, if you do not fix the vulnerabilities in time, then the computer has security risks, and it is easy to be "occupied" by viruses.
Therefore, Lao Tie recommends using the patching function that comes with the Microsoft system, generally this patching is relatively slow, because Microsoft servers are overseas, Lao Tie prefers to use third-party software to fix vulnerabilities, which is faster.
Netizen 4: Why are there many viruses in the computer room of the school, mainly because there are no special people to maintain them in time, resulting in more viruses on the computer, and it is related to the behavior of students.
Are all the computers in the school WinXP diskless? In the past, all software had a large number of viruses, and the solution was to replace all the computers, and then set up a protection system, so that the software would be virus-free.
Netizen five: The school computer room computer is on the Internet for all students, all kinds of viruses will spread through the U disk, and it is not excluded that students deliberately spread it, the computer room is installed in the computer room at the beginning of the freezing point stand-alone version, but it is more troublesome to restore the problem, and later changed to the online version of the freezing point, there is a problem, directly on the management machine, and the operation at the same time is a lot more convenient.
Later, I learned about hardware restoration, a very early batch of machines, about 10 years ago, are equipped with hardware restoration cards, this kind of restoration card is also not good, students will steal to dial off, or even virtual connection, many chassis are disassembled by students. Think for yourself about the consequences.
Netizen 6: Regarding the school computer virus infection, the first student may go to see some small **, the second computer room computer cannot be checked every day, it can only be checked every few months, and the third computer room computer cannot update the vulnerability in real time, and it will be repaired every few months at most (unless the student checks and repairs)?
The funds are limited, the maintenance is less, and the assembly machines are all eliminated, how can there be no viruses.
-
Register, I also have to find out, otherwise I will be outdated, because from 08 to now, my machine has not been poisoned.
-
ARP virus! The best virus in LAN!
1.First of all, you need to patch your system, because virus attacks often take advantage of your system's vulnerabilities. >>>More
I'm not a professional, so I'll give you some examples.
1. Advertising viruses are some software, and you can get 2 points and 2 yuan for the recommender (for example, setting the xx station as the home page and installing a xx assistant is a network means to make money from advertising). >>>More
Your question is done in two steps:
1. Try to change the keyboard used by others normally, the general keyboard will appear in the water You said, don't think that there is no problem with the new keyboard, if it is within the warranty period, it is just a new one (the probability of this situation accounts for more than 80). >>>More
Hackers and virus makers have never been crazier. According to a newly released "2006 Annual Report on the Epidemic of Chinese mainland Computer Viruses and Internet Security," because hackers generally use programs to encapsulate viruses, which is equivalent to encrypting and deforming viruses and realizing "mechanized production of viruses," the number of new viruses that appeared in 2006 has increased dramatically to 234211, which is almost equal to the total number of all previous viruses. >>>More
In the computer room, the teacher machine and the student machine can install Yunqing smart classroom, the teacher side and the student side respectively, and the teaching can be controlled. >>>More