-
Replace all account passwords from the system. First of all, when installing the system, click del to enter the DLOS interface. (Click on the first line on the right,I can't remember the specific English name.,It's to restore the DLOS to the original state.,Then press F10 to save.,And then it's okay to install the system) to put all the hard disk grids.,All from the installation.,It's going to be fine.,Supplementally,Your computer is a kind of Trojan.,All programs that can be forcibly opened。
-
First kill the virus and remove the Trojan, then disconnect the network and do the following.
Then turn off the remote control, right-click on My Computer, Properties, Remote, and then close and then modify the administrator and guest username and password, and modify it in the management tools, computer management local users and groups, and users.
If you don't worry, you can also open a firewall, 360 is not bad.
Your QQ has been hacked, and you can quickly change your password.
-
It's best to reinstall the system and format all the disks on your computer before reinstalling it, so that it will work.
-
The landlord formatted all the disks, and then installed a clean system, maybe your system was caught by someone.
There are also bad ** to go less. Install firewalls, pretend to kill soft, and pretend to be security guards. Keep your system patches up to date.
Although everyone can play computers, people who really understand computers can play with computers.
-
You have stolen the number and change the QQ password to install genuine antivirus software on the system.
If there is no antivirus software, it is recommended to install 360 + nod32 + Kingsoft Net Shield.
-
See if there is a suspicious process, update the virus database, recommend killing soft: Kaspersky, McCafe, enter the safe mode to kill, and then find some special killing tools (remote control killing) to enter the safe mode to kill, such as gray pigeon killing, etc., but now it's not good to find out which software is remotely controlling you, so...
The safest way is to reinstall the system.
-
Taking the computer windows 10 system as an example, there are about three kinds of computer monitoring performance, and the specific phenomena are as follows:
1. Sometimes you will find that the mouse is not controlled, and when you are not doing anything, the cursor of the screen mouse will move by itself, and related operations will be carried out.
2. When surfing the Internet normally, the network speed is suddenly very slow, and the light of the hard disk flashes too frequently, it may be that the attacker is trying to copy files, and when a large number of copy files are copied, the system will run slowly, and the read and write of the disk will increase significantly.
How to detect if a computer is being monitored:
1. First turn on the computer, and then press the win+r key to open the run box.
2. Then enter cmd and click OK.
3. Enter ipconfig again, click the enter key and you can see your IP address.
4. Then type netstat-an and click the enter key on the keyboard.
5. If you finally query your IP address, the computer has not been monitored, and if you have not queried, it has been monitored.
-
You can use the netstat -an command to check whether the computer is being monitored.
Operation method: 1. First, press the win+r key combination on the keyboard to bring up the run dialog box.
2. Then enter cmd in the run box and click the OK button.
3. Open the command window, enter the "netstat -an" command in it, and click the enter button.
4. In the active connection, you can see that the external address of the listening status is not displayed, which means that it is not monitored; Otherwise, it may be monitored.
For individuals, if you want to avoid computer monitoring, you can check it in the following two ways: >>>More
The registry stores the configuration information of computer software and hardware, viruses and web pages are malicious ** often to modify the registry, and the usual installation and operation of software will also change the content of the registry. When the computer is not working properly, it can often be repaired by recovering the registry. Therefore, we should always back up the registry (run regedit, export registry files). >>>More
It depends on whether you change the system item or other software, generally remember how to change it and it's fine, and then change it back if it doesn't work. If you don't understand the system items, don't change them, and nothing else will affect them. >>>More
Mouse, monitor, keyboard, host.
Direction 1: Computer Game Production.
Engaged in online game design, planning, R&D, production, game client development, game server development, game engine development, mobile game planning, development, testing, etc. >>>More