-
Poisoning can be summarized into three major hazards for ordinary people's personal machines: First, the password of so-and-so is stolen. Second, system resources are occupied. Three, the computer is not working.
First, it's too late for you to know, so let's pretend to be a Trojan Killer.
Second, the system suddenly slows down for no reason, so let's kill the virus.
3. If the problem is displayed, the computer cannot be used normally (after eliminating hardware problems).
-
There are many kinds of viruses, and the more common ones are like computers that often have errors, blue screen crashes, or theft of information on your personal computer.
-
It's all ctrl+c ctrl+v, so it doesn't make sense.
-
I often hear people say that they are poisoned by computers, but what is it like to be poisoned by their own computers? Let's take a look at the symptoms of computer poisoning, so that you can observe the changes in your computer at any time.
Symptoms of computer poisoning:
1. Browser windows open continuously: When some viruses are activated, an infinite number of windows will be automatically opened once the browser program is launched. Even if we close the window manually, more windows will pop up.
In such cases, you need to use antivirus software to scan and kill them.
2. The file icon in the system is modified to a unified icon: Some viruses will cause the file icon saved on the disk to be changed to a unified icon [such as panda burning incense] and cannot be used or opened. When such a virus runs successfully, the icons of all the files in the disk will be displayed as the icon of Panda burning incense.
3. Antivirus software is blocked: Antivirus software is often targeted [antivirus software can only detect and kill viruses that have been saved in the virus database, but cannot detect and kill viruses that are not in the library], so many viruses evade the detection and killing of antivirus software through camouflage. Once the virus runs successfully, the antivirus software will be blocked [the antivirus software cannot scan and kill the virus normally] Once this happens, you can only reinstall the system or use the ** anti-kill function.
4. CPU usage is always above 90%: When the CPU usage is always above 90%, we need to consider whether there is a virus in the system. This is because some viruses are constantly taking up CPU usage and system memory, and if your computer is in a dead state and your hard drive is still flashing for a long time, then it may be that the virus in your computer system has been activated.
5. The system time is modified: some viruses will automatically modify the time displayed by the system, once the virus runs, then we will display the specified time every time we start the computer, even if it is modified to the correct time, it will be restored to the time specified by the virus after restarting.
If you find that your computer has the above symptoms, you should pay attention to it, it is a manifestation of poisoning, and you should deal with it in time.
-
1. Antivirus software is unresponsive.
Sometimes, malware deliberately disables your antivirus software so that it can protect itself from being removed. At this point, you can create a malware scanner and ask the software to find out the software that exists on your computer and remove it.
2. The computer is running slowly or lagging.
When you notice that your computer is running much slower than usual, or if the software that normally runs smoothly is now stuck after opening, then it is very likely that your computer has been infected with a virus.
Even if you don't turn it on, these malware will be the other.
The software runs in the background as well. They will take up your computer's CPU, all the remaining memory, and network bandwidth, causing your computer to run much slower.
Third, a large number of pop-ups appear.
When you notice that pop-up ads that are rarely seen are now springing up, you need to pay attention to whether your computer is infected with a virus. If you just block them as some spam ads, the viruses won't be cleaned up, and you'll have the same problem the next time you boot it.
Fourth, the computer will run at night.
When you find that your computer is still running at night when you are not using it, or you are not open and some unknown program is running. At this point, there is a good chance that your computer has been infected with a virus and may already be under the collective control of a botnet.
Fifth, some system tools cannot be opened.
If some of your computer's system tools are unusable or unresponsive, especially some system maintenance or repair tools, it is likely that a virus prevents you from deleting them and does a protective mechanism. Since the system tool cannot be used and can be replaced by other software, many people may give up using the system tool and will not find out that it is the cause of the virus. In fact, some action needs to be taken to clean up these viruses at this time.
-
There are many possible types of computer poisoning; For example: browsing the Internet and browsing the web, ** software files, receiving things from others, connecting a USB flash drive to a mobile phone, putting a CD, the vulnerability is not fixed, resulting in virus invasion and so on.
It is recommended to install anti-virus software at all times, upgrade it in a timely manner, and conduct regular anti-virus treatment, and have good Internet habits.
The main hazards of computer poisoning are as follows.
1. There is no process for system loading that consumes the computer's resources: CPU, memory, etc. Slowing down with a computer.
2. Damage the resource information of the system: such as destroying the operating system, using the computer to not turn on or some functions of the system cannot be guaranteed, destroying other information on the hard disk: such as deleting your documents, movies, etc.
3. Some viruses can also damage the hardware of the computer: such as burning the motherboard, using the bottom grid hard disk for many times, making the hard disk finally unusable, etc.
4. Information theft: such as QQ theft, mailbox theft, personal information theft (**, online bank account, etc.).
5. Infect other computers: such as computers on the LAN at home or in the company, and infect friends' computers through QQ tools.
The general treatment of computer viruses is as follows:
1. It is best not to get infected, and prevention will make you lose the least than after-the-fact treatment. Commonly used methods are:
Install security software and turn on the firewall on your computer.
Regularly update the operating system for vulnerabilities, etc.
2. After poisoning, it is generally necessary to scan the entire hard disk with antivirus software, if the operating system cannot be started, it is best to repartition the hard disk after the low grid and then install the system (low grid, there is no data on your computer and cannot be restored).
Use the 360 security guard to kill the poison first
Because the virus has replaced some of the system processes,Now it looks like it has been cleaned up,But as long as you open the software will use the replaced process,The virus will be activated,Only reinstall the system,C drive is formatted directly,All the hidden files in other partitions are displayed,See if there are any files or folders you haven't seen,Delete them all,And then reinstall the system OK。
Read: Computer poisoning is a very common phenomenon, many people do not know what to do after computer poisoning, afraid of the exposure of important information in the computer, then what should we do? Let me give you a detailed introduction below! Hope it helps! >>>More
Hello: There are many reasons for computer poisoning, such as the computer receives unsafe files or **installed unsafe software is caused by computer poisoning, if your computer is poisoned, it is recommended that you use the anti-virus function of Tencent PC Manager to disinfect your computer, you can click here**The latest version of Tencent PC Manager: Tencent PC Manager**.
Install 360 Health Safe with 360 Kaspersky.
Update to the latest version. >>>More