What if there is a computer poisoned in the local area network, and you can t call others to kill th

Updated on technology 2024-04-04
8 answers
  1. Anonymous users2024-02-07

    If it is a LAN virus, it is very likely that all computers will be infected after one computer is poisoned, so the complete solution is to disinfect all computers in the network. In addition, the landlord needs to patch the system to avoid re-infection.

  2. Anonymous users2024-02-06

    You can just install your own killing soft and fire wall.,Nothing.,The only thing that has an impact is that the Trojan horse on his computer may occupy your internet speed.。。 However, it occupies very little and can be ignored.

    In short, the landlord asked what to do, that is, to defend well, don't let the toxic computer LAN attack succeed.

    The best active defense is China's own research and development of Dongfang Micropoint (it is said that all the servers used in the Olympic Games).

    There is the 360 series of comprehensive types.

  3. Anonymous users2024-02-05

    Categories: Computer Internet >> Anti-Virus.

    Problem description: I use two computers in the router group, each of which has anti-virus software installed (but it has not been upgraded, but it is also the latest version of the Rising ** version), why is the machine always poisoned? I'm going to have the security system in two days, what should I do? How can I prevent these viruses?

    Analysis: If Rising is a waste, it will definitely provoke the chirping of many Rising fans.

    But now the only ones I can trust now are Kaspersky and McCafe.

    There are many possible causes of poisoning, and you must pay attention to the following three points:

    1. Antivirus software should be selected correctly Choosing the wrong one is equivalent to streaking.

    2. The system patch must be played fully The newly reinstalled system does not have the latest system vulnerability patch, and the whole system must be patched, and the automatic system vulnerability detection function of the 360 security guard may be a very good choice, at least I am doing it now.

    3. The system account must be passworded and it should be slightly stronger, many viruses can invade the system by guessing the system account password (not to mention the password).

    If you still have questions, you can send me a private message.

    Cui Yanqu.

  4. Anonymous users2024-02-04

    Yes. Because of computer viruses.

    Contagious. The most basic characteristic of a virus is its infectivity, which is the criterion for judging whether a program is a rock core virus. It can be said that if it is not contagious, it cannot be regarded as a computer virus.

    The process of replication and infection of a virus can only occur after the virus program has been executed. If there is a program with a virus stored on your computer, but you never run it, then the computer virus will never infect your computer. From the user's point of view, as long as you can guarantee that the programs you are running are clean, your computer will not be infected with viruses.

    However, due to the computer system.

    The complexity of the operating system and the need to make it simple and easy to use make it happen, so there are many programs that are quietly executed without the user knowing. When the computer is started, the program instructions contained in the document are automatically executed, and when the word document is opened, some macros contained in the document are automatically executed, etc., all of which give viruses a chance to take advantage of them, and many people are not aware of the reliability of the program executed, which greatly increases the chance of virus invasion.

    When a computer virus is executed, it acquires to reside in memory to infect various programs that run later, or searches the hard drive for files that are not infected to infect them. After continuous regeneration and infection, the number of copies of the virus continues to increase, so that the virus quickly spreads to the entire hard disk and the entire network.

    Once a computer is infected with a computer virus, the virus not only spreads quickly in the system and carries out destructive effects, but also makes the system lose its ability to operate normally. Infected computers are immediately referred to as a source of infection for the virus epidemic. Through the sharing of data in computer systems, such as network connections or disk replication, viruses can spread throughout the region and the world.

  5. Anonymous users2024-02-03

    No, helping you with remote antivirus should be achieved through remote control and will not affect his computer.

  6. Anonymous users2024-02-02

    See if your remote will be used by others, and if you are used, you will be controlled by others. It's not a problem of poisoning. It's like the computer isn't your bright carry.

    You turn on the useless ones. Turn it off.

  7. Anonymous users2024-02-01

    If the remote person does a good job of protecting the corresponding fiber, he will not be poisoned in a mess, such as opening the firewall and installing the corresponding anti-virus software or security protection software.

  8. Anonymous users2024-01-31

    Yes, he is just remotely controlling your computer and performing antivirus on your computer, without any effect on his computer.

Related questions
7 answers2024-04-04

Just buy an ordinary router It's the easiest Other methods have disadvantages After connecting, it's OK to set the IP address and your laptop is a wireless network card.

16 answers2024-04-04

Hello! If you can connect to your routing modem normally, but you can't dial in the broadband normally, you can change the MAC address of your wireless network card to the MAC address of the computer's wired network card. Then give it a try. >>>More

20 answers2024-04-04

1.Use a switch.

2. If each client has its own external network and password, then the router should be set to "switch mode" or simply replace the router with a switch, so that the client can use its own external network and password to achieve dial-up Internet access. >>>More

18 answers2024-04-04

No, you can have as many as you want, and you can follow the steps below. >>>More

20 answers2024-04-04

CPU: AMD FX 4100 695 yuan.

Memory: Kingston DDR 1600 4G 145 yuan. >>>More