After the antivirus, how to get it

Updated on Game 2024-05-16
12 answers
  1. Anonymous users2024-02-10

    First of all, if you want to show the hidden files, but you have been poisoned, it is estimated that it will not be displayed, you can modify the registry first. In this hkey local machine software, Microsoft Windows CurrentVersion Explorer Advanced Folder Hidden Showall, change the checkedvalue key to 1

    Correct method: Check whether the type of checkedvalue is reg dword, if not, delete it. Then right-click "New" --dword Value" and name it checkedvalue, and then modify its key value to 1, so that you can choose "Show all hidden files".

    Now you can see that D:E:F: these disks (sometimes there are and sometimes no on the C drive) have files, delete them all.

    Note that when opening other drive letters during the above operations, please do not double-click on the drive letter, but right-click to open it (to prevent the virus from being activated again). And the above operation is only the operation on the premise that the virus you are talking about has been removed. If the virus has not been cleared, the virus file should be cleaned manually and the virus file value in the registry should be cleared.

  2. Anonymous users2024-02-09

    The system file is corrupted, reopen it, and find a ghost disk for ten minutes to solve the problem.

    After installation, do not open other partitions to prevent poisoning, install anti-virus software, update the virus database, and reboot into safe mode to fully disinfect the virus.

  3. Anonymous users2024-02-08

    Just go straight to the next panda burning incense and kill it!

  4. Anonymous users2024-02-07

    Only reloaded!! If you fix it, it's time-consuming, and you can install it in ten minutes to find a ghost-optimized version of XP. (Don't double-click on all !! Open it with the right click, otherwise it will activate the virus's !

    Anti-virus upgrade after security mode anti-virus!!

  5. Anonymous users2024-02-06

    Panda burns incense? This virus has disappeared for a long, long time, why did it reappear? I remember the word hacker alliance that saw that he himself wrote the panda virus, and he wrote a special killing software.

    You can look for it and try it, if it really doesn't work, install the system, and if it doesn't work, format it in its entirety. I don't know much about the panda virus. There's no good way to help you for the time being.

    8 Excuse me.

  6. Anonymous users2024-02-05

    Well, your system has been damaged like a system, many system files have been "eaten" by the panda, kill the panda, those files can't come back, three ways:

    One: If you have a backup, you can restore the past and you can restore it.

    2. Repair the system with a system disk.

    Three: Reinstall, your system is very badly damaged.

    There is also an X disk that can't be opened, because the drive of the hard disk is damaged, and I personally recommend that you reinstall it. The panda virus is too good.

  7. Anonymous users2024-02-04

    Forget it, I said let's reload, what's it all about.

  8. Anonymous users2024-02-03

    I have a stupid trick, so I'll reinstall the system and forget it, I've also encountered your situation, I'll solve it like this, and I won't have to check it half to death.

  9. Anonymous users2024-02-02

    Repair your system with a system repair tool.

  10. Anonymous users2024-02-01

    Use Rising Card for system repair.

  11. Anonymous users2024-01-31

    The core part of an antivirus is the scanning engine, followed by the virus database. It is usually written in C to speed up the program.

    Characteristic method: This method identifies virus files based on the difference between normal and virus programs. Some people believe that this method is the simplest and most straightforward method for known viruses, and the advantages and disadvantages of this method are outstanding.

    Advantages: The accuracy of the detection is high, and the false alarm rate is low.

    Disadvantages: The detection and killing speed is slow, and the virus signature code will also increase due to the increasing number of known viruses, so the detection and killing speed will be slower and slower. Unknown and polymorphic viruses and covert viruses cannot be detected.

    This detection method is also not suitable for online antivirus software, as it consumes valuable network resources.

    Checksum method: This method calculates the checksum of the file (as long as it knows that it is an algorithm) and saves it, which can be compared periodically or when the file is called, so as to determine whether the file is infected by a virus. Although this method can detect unknown viruses, it has gradually been disused due to its high false positive rate.

    Advantages: Unknown viruses can be found.

    Disadvantages: The name of the virus cannot be reported, the false positive rate is high, and the checksum method may give false positives when the software is updated, the password is modified, or the file content is modified, because this method cannot distinguish whether the change in the file content is caused by normal program use.

    Behavior monitoring method: This method identifies viruses according to the behavioral characteristics of viruses, which requires detailed classification and research of virus behaviors, analysis of common behaviors of viruses, as well as rare behaviors of normal programs, and virus judgment and early warning according to the behavior of the program when it is running.

    Advantages: Because it summarizes and summarizes the common characteristics of various viruses, it can detect unknown viruses and is very effective for predicting most unknown viruses.

    Disadvantages: For unknown behavior viruses, it cannot be effectively detected, and there is also a false positive phenomenon, and the name of the virus cannot be identified for the unknown viruses found, so ordinary users cannot effectively remove the unknown viruses found.

    Software simulation method: This method detects virus characteristics by simulating the way the virus runs, because the signature code method can not detect polymorphic viruses, although the behavior monitoring method can find the virus, but can not determine the name of the virus, and can not kill it accordingly.

    Advantages: Unknown viruses can be identified, virus localization is accurate, and the false alarm rate is low.

    Disadvantages: The detection speed is affected to a certain extent, and the consumption of system resources is high.

  12. Anonymous users2024-01-30

    Here's how to disinfect your computer:

    1. After the Trojan virus is detected with antivirus software, it will be removed as soon as possible, generally when the Trojan is scanned, it will help you check all the Trojans, you only need to click to remove it immediately, but some Trojans need to restart the computer;

    2. If you encounter all the security software that can't be opened, you can try to hang the disk antivirus, or you can make a tool to guide the antivirus, many antivirus software has a guide antivirus tool, or reinstall the system;

    3. In safe mode, all the files in the directory are rearranged according to the modification time, and the virus and the files with the modification time and virus are deleted.

Related questions
23 answers2024-05-16

How to grill pork.

There are many ways to make roast pork, such as spiced roast pork, you need to cut the pork into long strips first, and then process the garlic sprouts, pour salt, monosodium glutamate, black pepper, five-spice powder, sugar, and rice wine into the meat strips and stir well, and then add garlic to marinate, and then prepare a bowl, add garlic puree, stir with white vinegar, preheat the oven, put the meat strips on the baking sheet, put it in the oven and take it out and cut it into slices, then prepare some white rice, spread the meat slices on top of the rice, and add some garlic seedlings, Dip in some garlic vinegar so it tastes better. >>>More

11 answers2024-05-16

Go to the cosmetic surgery department of the hospital or the beauty salon.

5 answers2024-05-16

Nowadays, it is popular to perm on the top of the head, and perm the bangs in front of the hairstyle, such a hair is called tin foil perm or fireworks perm. My object is now such a hairstyle, which is very popular now. >>>More

5 answers2024-05-16

If it is a broadband problem, please call the broadband customer service ** and ask them to check for you. If it is a router problem, please call the brand router customer service for **consultation, they have **guidance. >>>More

2 answers2024-05-16

I'll recommend you my own method You go and buy a vitamin A or vitamin B ointment for acne, and it should be very thick. At night, when you go to bed, make a small pack to cover the beanie. Use it again the next night. >>>More