There is a virus in the operating system, how to kill it, and what kind of virus?

Updated on technology 2024-05-28
24 answers
  1. Anonymous users2024-02-11

    Trojan is a Trojan virus, Worm is a worm virus, first use a good antivirus software to kill, such as Kaspersky, McFee, etc., if it doesn't work, find a special killing tool, you can search for these viruses, find a special kill, or see if there is a manual killing method. If it doesn't work, the only way to do it is to reinstall the system, which is troublesome but most effective. After reinstalling, do a ghost, and use ghost to restore it in a similar situation in the future.

  2. Anonymous users2024-02-10

    It is recommended to kill with Jiang Min 2006.

    Install Jiangmin 2006, upgrade to the latest version, boot the system to safe mode and then disinfect the virus.

  3. Anonymous users2024-02-09

    Trojan programs, find a special killing tool or manual antivirus.

  4. Anonymous users2024-02-08

    Just install a restore card and you're good to go. Only the C drive is protected.

  5. Anonymous users2024-02-07

    The virus in the memory is caused by running the files on the hard disk, the fundamental reason is that some files on the hard disk contain viruses or Trojans, formatting can completely eliminate the virus, but reinstalling the system is also very annoying, it is recommended to use antivirus software to kill the virus first, it is best to kill it, save the system from reinstalling.

    In short, it is important to remember that there is no virus that cannot be completely killed.

    If you can't find a good antivirus, you can also go for it.

    Used. Win Trojan specializes in killing tools.

  6. Anonymous users2024-02-06

    Use the Kaba driver to isolate the drug infection documents after the killing.

  7. Anonymous users2024-02-05

    It is recommended to reinstall the system.

  8. Anonymous users2024-02-04

    If your system is backed up, it's best to restore it.

  9. Anonymous users2024-02-03

    First of all, there is a small reversal of your question, not a "vulnerability attack virus", this should be looked at separately "Vulnerability attack" is a conflict between a file and the file of the XP startup program, which leads to a decrease in speed and a decrease in network speed, medium; Crash Severe: The damaged disk fails and the XP cannot be booted. These can be solved by simply reinstalling the program.

    A "virus attack" is a virus that is developed by someone who wants to get information on your computer or destroy your computer, and a "virus attack" is a software developed by a person who wants to control your computer and is attacked by a virus. For example, the toll machine in the Internet café accidentally installed the virus attack software "This software is automatic" as long as it is installed, it will automatically steal the information in your computer, as the most confidential of the toll machine is the point card transaction, it will steal all the money inside.

  10. Anonymous users2024-02-02

    Vulnerability attack monitoring is built on the operating system, and data packets must be checked by vulnerability attack monitoring before they reach the operating system. Therefore, regardless of whether the operating system is patched or not, as long as the vulnerability attack monitoring detects attack data, it will alert and block it.

    First, make sure that you have installed the system patch

    Here's how: Open the Control Panel "Add Removal Programs" and check if there are any of the following patches:

    Patch No: KB823980 (against the "Blastwave" virus) Patch No: KB824146 (against the "Blasterwave" virus) Patch Number:

    1.Open the main interface of Rising Antivirus.

    2.Click Settings to set up detailed settings

    3.Select the Computer Monitoring menu (arrow to the right of Computer Monitoring)4Select Vulnerability Attack Monitoring.

    5.Check the right side of Don't prompt the user when an attack is found

    Note: If your operating system is Windows XP and you have installed a system patch for SP2, the patches for the Shockwave and Oscillator Wave viruses are already included.

  11. Anonymous users2024-02-01

    Vulnerability attacks mean that a vulnerability in your computer is scanned for by a hacker, and then he exploits the system vulnerability to use a special tool or means to attack your home computer. But since antivirus software can show exploits, there should be no problem. Because it could mean that his attack had been intercepted.

    But be careful. Frequently patch your system and scan for vulnerabilities.

  12. Anonymous users2024-01-31

    Super Bunny Cleanup King cleans up.

  13. Anonymous users2024-01-30

    This is a drive-level virus, it can't be killed in normal mode, you record the file name and path, go to safe mode to delete files and startup items.

  14. Anonymous users2024-01-29

    Update the virus database with the antivirus software, and then check it in safe mode.

    In safe mode, the virus is inactive, like a fish under the ice, staying motionless, so it is easy to kill! The way to enter safe mode is to restart the computer and press the F8 key when the screen is black. Then use the up and down keys to type into safe mode to enter the system.

  15. Anonymous users2024-01-28

    Hello: It should be that your computer has a stubborn virus, the virus deliberately destroys the normal use of your computer, you have no way to operate normally, you can restart the system, press F8 to enter safe mode, at this time the virus is unable to run.

    You can use PC Manager's anti-virus feature to check and kill them all.

    to remove these viruses and help your computer get back to health. Tencent PC Manager has a 4+1 core comic ground killing, repair engine, of which the Little Red Umbrella local killing engine gives full play to its advantages without networking. It can better solve the stubborn Trojan virus.

  16. Anonymous users2024-01-27

    That's when something is wrong with the system or program and needs to be fixed with some tools.

    The answer has been sent to "My Messages" at the top right of the window, please use it. It works!

    After that, if the effect is not good, you can also consider system restoration (choose a restore point).

    --Someone stole the answer, but had no choice but to use this way, please understand.

  17. Anonymous users2024-01-26

    recycied system volume information

    Both of these are normal documents and are described below:

    The name of the station in the Windows operating system.

    ** Sites provides a safe net for deleting files or folders. When you delete any item from your hard drive, Windows places the item in Station and the icon for Station changes from empty to full. Items deleted from floppy disks or network drives are permanently deleted and cannot be sent to the **site.

    The Volume Information folder is a hidden system folder"System Restore"The tool uses the folder to store its information and restore points. There is a System Volume Information folder on each partition of your computer. "System Volume Information" folder, the Chinese name can be translated as "System Volume Information".

    This folder stores the backup information of the system restore.

    Causes and solutions.

    1. Insufficient space: As the user's time to use the system increases, there will be more and more restore points, resulting in less and less hard disk space, and finally it will be warned "insufficient disk space".

    2. Virus umbrella (security issue): Since the directory in the NTFS partition only has the system permission, the antivirus software does not have the right to check and kill the viruses hidden in the directory.

    3. Virus Umbrella (Security Issue) Solution: Prevent the automatic generation of the "System Volume Information" folder. (No one has been able to do it so far).

    4. Palliative solution: You can open the "System Properties" - System Restore tab in the control panel and select the checkbox of "Turn off System Restore on all drives".

    In addition, system volume information, which is indeed a hotbed of viruses, can be checked to see if there are viruses.

    If you don't want to see this thing, just turn off the display file

  18. Anonymous users2024-01-25

    Don't bother, these two are system folders, one is the ** station (each disk has one), and the other is the system restore folder, which is probably for backup. If you don't want to see it, just tick the hidden protected system folder in front of the folder options, OK, and you won't be able to see it.

  19. Anonymous users2024-01-24

    It's so funny why don't you think of the operating system as a virus.

  20. Anonymous users2024-01-23

    Trojan horses, which can be killed in safe mode. Before the antivirus, right-click on my computer -- Properties -- System Restore -- put a checkbox in front of all drivers to restore and turn it off. This is done to prevent win from reverting to it.

    Then restart the computer and press F8 to enter the safe mode to start the antivirus software antivirus, turn off the system and restore it after win, it can not be restored, and it can generally kill the virus. After the virus is killed, enter normal mode and turn on System Restore.

  21. Anonymous users2024-01-22

    The ultimate solution to the virus is as follows.

    Anti-rogue software.

    Nowadays, everyone is more and more dependent on the Internet, but the Internet is rampant, and the antivirus software is helpless against it, what should I do? Shadow systems allow rogue software to hide.

    Protection against unknown Trojan viruses.

    In the face of new viruses, we are always passively beaten. Now with the shadow system, we don't have to be afraid of this threat anymore.

    Maintenance-free system specialists.

    The shadow system gives your operating system the strongest protection. No more spending a lot of time maintaining or reinstalling the operating system.

    Try out new software worry-free.

    Trying out new software often causes our systems to be compromised, so you don't have to worry about trying out any software with a shadow.

  22. Anonymous users2024-01-21

    That is, the root cause of the virus has not been found, generally you have to look at the startup items first, turn off the useless startup items with the msconfig command, and then scan the sensitive area with antivirus software, because most of the viruses are here, mainly the windows and system32 folders of the C disk, of course, the temp folder may also have, it is best to scan the C disk together, if there is time, the whole disk is scanned, to prevent the infected files from infecting other files. However, the most important thing is to open antivirus software, most of the current antivirus software comes with active defense and is updated in time. If you are not sure, you can use the next mobile version of the antivirus software as a backup.

    This is what I personally think is effective, but I also need to have some common sense of viruses to be able to identify basic viruses.

  23. Anonymous users2024-01-20

    Install a Kingsoft Antivirus Bully and upgrade your antivirus software to the latest version at any time.

    Open Internet Explorer, click on the Tools Options menu, Internet Options, and then click Delete Files, and then click Delete All Offline Files.

  24. Anonymous users2024-01-19

    Update your antivirus software to the latest version.

    Safe mode.

Related questions
8 answers2024-05-28

First of all, there is a small reversal of your question, not a "vulnerability attack virus", this should be looked at separately "Vulnerability attack" is a conflict between a file and the file of the XP startup program, which leads to a decrease in speed and a decrease in network speed, medium; Crash Severe: The damaged disk fails and the XP cannot be booted. These can be solved by simply reinstalling the program. >>>More

25 answers2024-05-28

Depending on how many bits your operating system reaches, you can use whichever one.

5 answers2024-05-28

nicolasff/phpredis/downloads2.**After there are two modules in it that are compiled by VC6 and VC9, we need to know whether our PHP is VC6 or VC9: create a new one and click (here) to collapse or open 3 >>>More

24 answers2024-05-28

Snipping Tool in the attachment

Click "Start" - >Attachments" - >"snipping tool"Open Snipping Tool. >>>More

5 answers2024-05-28

It's not a network operating system, before Windows came out, all computers were DOS interfaces, and they all used instructions to make the computer work, until Windows came out, and the computer became the current graphics mode, making it suitable for all ages, simple and easy to understand!