-
In fact, to do this, you don't need any software to do it.
Of course, the system you use must be 2000 and XP to perform the following operations.
Right-click on the Winnt Windows folder under the C drive, click Properties, delete all users except your username and system administrator in the permission settings, and set the user's permissions to read-only, other checkboxes, such as: Write or something are canceled.
In the same way, set the system32 folder under this folder.
Of course, you can also set up the entire C drive like this, but it may be more troublesome for you to install some software yourself in the future, and it will produce you to install it!
It can set some of the details of its own monitoring.
-
With Ad-Aware SE Professional, you can both prevent espionage and monitor every move of the registry, and you can also control it manually.
-
Super Encryption 3000 adopts the internationally mature encryption calculation method and safe and fast encryption method, which can effectively ensure data security!
-
The easiest way is to set read and write permissions for hard disk partitions and folders.
-
Isn't there a UAC in Windows?,And this topic is out of scope.。
-
2. To install, the steps are very simple, and the next step is just one step.
2. Open the software, then click "Directory" and then select "Add";
3. In the new directory, add a folder you want to monitor, such as c: and check the events you want to monitor, and confirm to save;
4. After setting, a bubble will pop up in the lower right corner, C: is being monitored.
5. Next, let's try to simulate the C: folder, create a new document, and then a bubble pops up in the lower right corner, and the main interface of the software will also have a "new" record;
6. How to use it next, you should have a number of it, remember to set the software to start on, otherwise it will not be automatically monitored!
-
2.There are virus Trojans, and there are many strong Trojans that are able to automatically shut down antivirus software 3These viruses run in the background of the computer, steal the user's online game and QQ account and password, and send it to.
-
At present, most mainstream antivirus software has this function.
-
Hello PC Manager is a 2-in-1 professional antivirus software that has 16 layers of real-time protection and a series of auxiliary functions in addition to basic antivirus functions.
Among them, the 16-layer real-time protection function and the unique cloud intelligent warning function of PC Manager can meet this need, which can detect and block the sabotage behavior of Trojans at the early stage of Trojan activities, and kill the latest popular Trojans through cloud scanning and killing technology.
If you have any other questions and problems, please come to the computer manager business platform again to ask questions, and we will do our best to answer your questions.
-
2. Run msconfig to check whether there are any suspicious items in the startup item, and the rest of the operation is the same as above.
3. Right-click on my computer - Properties - Remote, and remove the (hook) in front of Remote Assistance and Remote Desktop.
How to fix company internal computer being monitored:
Key +r---cmd——— then type netstat -a -b--- and see if there is or is constantly connected to the computer, if so, the computer is being monitored.
2.Enter the netstat -a -b command a few more times, if there is always that connection instruction, it is monitored, and the way to deal with it is to install a Skynet firewall, and then block a program called rundll32 and you can't see it.
-
You can right-click on the taskbar - Task Manager and view the background processes in the Task Manager. If there is monitoring software, there must be a process, see which suspected process is like monitoring software, or directly use 360 to view the background process, there will be an explanation, if it is an unknown process.
For example, the background process of ip-guard is pcoip, and if you can terminate the process, you can turn off the monitoring software.
Of course, monitoring software like ip-guard is a bit "rogue" nature, not that they are rogue software, but they must have such functions in order to meet the monitoring needs of customers, otherwise, if you are easily terminated and uninstalled, then why do people buy your software?
If you are interested in using enterprise employee behavior management software, or information leakage prevention, system operation and maintenance software, it is highly recommended to IP-GUARD, IP-GUARD is composed of 18 modules, which can exist independently and freely combine between modules, and users can choose the modules they need according to their needs, and it is very convenient to install and upgrade. A terminal combined with multiple clients can realize multi-faceted management and control of the client host, from information leakage prevention, behavior control to system operation and maintenance, which can be well satisfied.
IP-Guard is a 13-year-old intranet security product, after 13 years of product upgrading, it has accumulated more than 15,600 enterprise users and is exported to 69 countries and regions such as Europe, America, Asia-Pacific, and Africa.
-
Enter the task manager - process to find the background process inside, many monitoring software is hidden in the background, and you stop the background run will automatically restart again, only reinstall the computer system This method can completely delete the monitoring software, but if it is a company computer, it is not recommended that you uninstall it, because imonitor eam can be reinstalled continuously if you use the same network, and the main control will show that the number of monitoring computers is not right if you uninstall it.
-
Take a monitoring software called imonitor eam that I know, for example, the client is hidden after installation, and it will not be displayed in the list of programs and functions, which is difficult to find, but the monitoring software wants to run, and there will always be traces in the detailed trust of the process of the task manager, but this process has generally been modified, and you need to know more about the computer, otherwise you can't identify it. And deletion also requires corresponding permissions.
Therefore, if the monitoring software such as imonitor is installed on the private computer, the best way is to format and reinstall the system, so that the cleaning is the most thorough, but if it is a company computer, it is recommended that you do not do this, and do not think about getting rid of the monitoring yourself, because this is likely to violate the company's rules and regulations, it is recommended to negotiate with the company's management face-to-face.
-
It's not a thing to be able to see the process, I'm afraid that something like workwin can't see the process, so I can only use the hotkey to try repeatedly.
1.Create a new bat file (How do I create a new bat file?) You can create a new notepad file and save it as, making sure to enter it in the file name"", otherwise it's still a notepad file). >>>More
When we want to replace a file that is running on the system, it is very troublesome, and sometimes we have to go into safe mode. It is useful to find a DOS command that can replace a running file under the XP system. >>>More
It is recommended to use Yitong folder lock software, which supports all Windows systems. It can encrypt folders, encrypt files, and encrypt disks, which is safe and easy to use. After installing the software, right-click the folder you want to encrypt and select Yitong Folder Encryption in the right-click menu to encrypt the software.
I've had this problem before, they say it's a virus, I'm not, it's deleting, disabling a system file, it seems to be C: Windows System32, or something related to this, I'm restoring, if you have a disc you boot from the optical drive, and then copy those files over.
Make a U disk boot disk preparation tool: (W7 system 4G U disk, XP system 2G U disk) **Computer store U disk production software, install the software, start, and follow the prompts to make a boot disk. >>>More